Check Point DLP Software Blade combines technology and processes to revolutionize Data Loss Prevention (DLP), helping businesses to pre-emptively protect sensitive information from unintentional loss, educating users on proper data handling policies and empowering them to remediate incidents in real-time.
Check Point UserCheck
Check Point UserCheck empowers users to remediate incidents in real time. This technology alerts users of suspected breaches for instant remediation and allows quick authorization of legitimate communications.
Protect against data breaches both externally and internally
Check Point DLP controls sensitive information from leaving the company. DLP also inspects and controls sensitive emails between departments with Microsoft Exchange support. An agent is loaded onto the Microsoft Exchange server that intercepts outgoing messages. The message is redirected to the Check Point Gateway, is inspected by the active DLP Software Blade, and then sent to the internal recipient by the Exchange server. Policies can be defined to prevent confidential data from leaking to the wrong departments.
Inspect SSL encrypted traffic
Scan and secure SSL encrypted traffic passing through the gateway. When traffic is passed through, the gateway decrypts the traffic with the sender's public key, inspects and protects, then re-encrypts, sending the newly encrypted content to the receiver.
Check Point MultiSpect
The Check Point MultiSpect data classification engine combines users, content and process into accurate decisions. Check Point DLP delivers exceptionally high accuracy in identifying sensitive data including Personally Identifiable Information (PII), compliance-related data (HIPAA, SOX, PCI, etc. ) and confidential business data.
Network-wide protection coverage
The Check Point DLP Software Blade is an in-line, advanced data loss prevention solution for data transmitted over networks. It offers wide coverage of traffic transport types, including deep application awareness that protects data in motion, such as SMTP, HTTP and FTP data. DLP policies are created to define what to prevent and how to prevent it, by policy, by network segment, by gateway and by user-group.
Central policy management
DLP Software Blade is centrally managed with Check Point security management via a user-friendly interface. Centralized management offers unmatched leverage and control of security policies and enables organizations to use a single repository for user and group definitions, network objects, access rights and security policies across their entire security infrastructure. Unified access policies are enforced automatically throughout the distributed environment, empowering them to securely provision access from anywhere.
Separating the needle from the haystack, SmartEvent for DLP monitors and reports only what is important and offers: real-time and history graphing, incident correlation, graphical incident timelines, custom views, event/incident management workflow.
Rapid and flexible deploymentProduct Highlights
Organizations of any size can be protected from the start with pre-configured templates for immediate data loss prevention. A wide range of built-in policies and rules are included for common requirements, including regulatory compliance, intellectual property and acceptable use.
- UserCheck technology allows for real-time user remediation
- MultiSpect combines users, content and process for unrivaled accuracy
- Educates and alerts users without involving IT/security personnel
- Inspect and control sensitive emails both leaving the organization and between departments
- Centralized management of security policy via a single console
- Pre-configured policies allow for immediate data loss prevention
- Broad support for file formats and data types