Description
Protect Your Data—from Endpoint to Cloud
Now more than ever, your data is on the move—whether it’s on a laptop, flash drive, or moving across physical, virtual, and cloud infrastructures. At any point along the way, your financial data, customer information, intellectual property, or trade secrets could be lost or stolen. Securing this data is further complicated by several growing risk factors:
• Rapidly evolving compliance regulations and mandates
• Continued growth of workforce mobility
• Employees using their own mobile devices and consumer apps for work
• Rising frequency of advanced persistent threats (APTs) and data breach incidents
Integrated DLP allows you to deploy data security for a fraction of the cost and time of traditional enterprise DLP solutions.
Strengthens Data Protection and Control
• Offers granular device control, including the ability to create specific rules based on vendor and serial number of the device
• Empowers IT to restrict the use of USB drives, USB attached mobile devices, CD/ DVD writers, and other removable media
• Detects and reacts to improper data use based on keywords, regular expressions and file attributes
• Educates employees on corporate data usage policies through alerts, blocking or soft-blocking and reporting
Supports Compliance
• Simplifies regulatory compliance with out-of-the-box compliance templates
• Speeds audits and enforcement with forensic data capture and real-time reporting
Streamlines Administration, Lowers Costs
• Simplifies deployment and maintenance with a lightweight DLP plug-in
• Improves visibility and control with a fullyintegrated, centrally-managed solution
• Reduces resource demand and performance impact with a single agent for endpoint security, device control and content DLP
Integrated DLP on Network Gateways
Strengthens Data Protection and Control
• Inspects your network 24x7 with real-time monitoring
• Tracks and documents sensitive data flowing through network egress points
• Identifies risky business processes and improves corporate data usage policies
• Detects and reacts to improper data use based on keywords, regular expressions and file attributes
Supports Compliance
• Aids in compliance with out-of-the box compliance templates
• Speeds audits and enforcement with forensic data capture and real-time reporting
Streamlines Administration, Lowers Costs
• Simplifies deployment with a DLP plug-in, requiring no additional hardware or software
• Improves visibility and control with a fullyintegrated, centrally-managed solution
• Automates response to policy violations with options to log, bypass, block, encrypt, alert, modify, quarantine, or delete data
Central Point of Visibility and Control
Trend Micro Control Manager™ provides a convenient centralized security management console that consolidates policy, events and reporting across multiple iDLP solutions. This powerful security management tool lowers costs by simplifying security management, providing enterprise-wide visibility into managed products down to the individual user level. Control Manager also includes access to threat statistics from the Trend Micro Smart Protection Network™ cloud-based security infrastructure. Administrators gain insight into both the global threat landscape and the protective power of Trend Micro security in their own environment.