Overview
Now more than ever, your data is on the move—whether it’s on a laptop, flash drive, or moving across physical, virtual, and cloud infrastructures. At any point along the way, your financial data, customer information, intellectual property, or trade secrets could be lost or stolen. Securing this data is further complicated by several growing risk factors:
- Rapidly evolving compliance regulations and mandates
- Continued growth of workforce mobility
- Employees using their own mobile devices and consumer apps for work
- Rising frequency of advanced persistent threats (APTs) and data breach incidents
To avoid the embarrassment, reputation damage, regulatory fines, and revenue loss, today’s enterprise must be able to identify, track, and secure all confidential data from multiple points within the organization without impacting employee productivity and performance. In the past, many organizations tried traditional data loss prevention (DLP) solutions but found they were too intrusive, too complex to manage, and too costly to acquire, deploy, and maintain.
Reduct the cost and complexity of DLP
Trend Micro Integrated DLP minimizes the complexity and cost of data security by integrating DLP functionality directly into your existing Trend Micro solutions and management consoles. With a lightweight plug-in, you can quickly and easily gain visibility and control of your sensitive data and prevent data loss via USB, email and web. The DLP plug-in requires no extra hardware or software, and it leverages built-in regional and industry-specific templates to simplify deployment. Integrated DLP allows you to deploy data security for a fraction of the cost and time of traditional enterprise DLP solutions.
Advantages of Integrated DLP
- Protect your data—today
Deploy DLP immediately and gain visibility and control of your data right away
- Lower DLP costs
Save on deployment and maintenance costs compared to traditional DLP
- Protect privacy
Identify, monitor, and prevent data loss— on or off network
- Comply with regulations
Implement controls for protection, visibility, and enforcement
- Educate users
Notify employees of risky behavior or enforce user controls if necessary
Features
Integrated DLP on Endpoints
Strengthens Data Protection and Control
- Offers granular device control, including the ability to create specific rules based on vendor and serial number of the device
- Empowers IT to restrict the use of USB drives, USB attached mobile devices, CD/ DVD writers, and other removable media
- Detects and reacts to improper data use based on keywords, regular expressions and file attributes
- Educates employees on corporate data usage policies through alerts, blocking or soft-blocking and reporting
Supports Compliance
- Simplifies regulatory compliance with out-of-the-box compliance templates
- Speeds audits and enforcement with forensic data capture and real-time reporting
Streamlines Administration, Lowers Costs
- Simplifies deployment and maintenance with a lightweight DLP plug-in
- Improves visibility and control with a fullyintegrated, centrally-managed solution
- Reduces resource demand and performance impact with a single agent for endpoint security, device control and content DLP
Integrated DLP on Network Gateways
Strengthens Data Protection and Control
- Inspects your network 24x7 with real-time monitoring
- Tracks and documents sensitive data flowing through network egress points
- Identifies risky business processes and improves corporate data usage policies
- Detects and reacts to improper data use based on keywords, regular expressions and file attributes
Supports Compliance
- Aids in compliance with out-of-the box compliance templates
- Speeds audits and enforcement with forensic data capture and real-time reporting
Streamlines Administration, Lowers Costs
- Simplifies deployment with a DLP plug-in, requiring no additional hardware or software
- Improves visibility and control with a fullyintegrated, centrally-managed solution
- Automates response to policy violations with options to log, bypass, block, encrypt, alert, modify, quarantine, or delete data
Central Point of Visibility and Control
Trend Micro Control Manager provides a convenient centralized security management console that consolidates policy, events and reporting across multiple iDLP solutions. This powerful security management tool lowers costs by simplifying security management, providing enterprise-wide visibility into managed products down to the individual user level. Control Manager also includes access to threat statistics from the Trend Micro Smart Protection Network™ cloud-based security infrastructure. Administrators gain insight into both the global threat landscape and the protective power of Trend Micro security in their own environment.
Protect Data at Rest, in Use, and in Motion
Data at rest with wide coverage of file types
Trend Micro Integrated DLP can recognize and process over three hundred file types including most email and office productivity applications, programming languages, graphics, engineering files, and compressed or archived files. Discovery capabilities scan the endpoint, file server, mail store, or SharePoint repository to see where compliance data is located.
Data in motion control points
Integrated DLP gives you visibility and control of data in motion—whether it’s in email, webmail, instant messaging, and most networking protocols such as FTP, HTTP/ HTTPS, and SMTP.
Data in use control points
Integrated DLP provides visibility and control of data that’s being used in USB ports, CDs, DVDs, COM & LPT ports, removable disks, floppy, infrared and imaging devices, PCMCIA, and modems. It can also be configured to monitor copy and paste and print screens.
Simplify DLP with Policy Templates
To help you quickly deploy data protection, Trend Micro Integrated DLP ships with wide range out-of-the-box templates, including (but not limited to):
- PCI/DSS—International standard for data security for credit cards. Any company accepting credit cards are bound by these rules.
- HIPAA—The Health Insurance Portability and Accountability Act sets standards for any healthcare organization in the US.
- GLBA—Gramm Leach Bliley Act—Also known as the Financial Services Modernization Act, sets privacy regulations for banking, insurance, and investment companies.
- SB-1386—Refers to state data breach laws. This particular law conforms to the California law which is the standard for most other U.S. states.
- US PII—Refers to personally identifiable information for US. This is a general catch-all for U.S. organizations concerned with protecting customer and employee data.
Data Identifiers
In addition to templates, Trend Micro Integrated DLP includes a granular list of truly international identifiers to identify specific data by patterns, formulas, positioning, and more. Identifiers can also be created from scratch.