Data Leakage Prevention.

Helping businesses to realise effective Data Leakage Prevention through the introduction of intelligent technologies.

Data leakage is now a fundamental concern for IT professionals who are tasked with monitoring an accumulating number of information transmission avenues.

The scope for data leakage is broad, and the implications of unauthorised leakage can often be catastrophic to enterprise, posing a long-term threat to legal and regulatory compliance, profit, customer retention and business reputation.

Common causes of data leakage.

The four most common information leaks in a commercial environment are:

  1. Confidential information
  2. Intellectual property
  3. Customer data
  4. Staff data

In many instances, the main cause of data leakage is failure to apply the appropriate preventative technologies and security policies.

Breach of data can be inadvertent and not always malicious, but regardless of cause, the effects have the potential to be far-reaching and detrimental to the long-term stability of any sized organisation.

Unified threats to unauthorised data leakage include:

  • Instant messaging
  • Email
  • Optical and flash media
  • Social media
  • VoIP
  • Hacking
  • Malware and phishing
  • Mobile devices (BYOD)
  • Cloud services
  • Formal employees & contractors

What solutions do we provide?

Through product intelligence and the introduction of dedicated third party technologies, Complex IT helps businesses to leverage the following powerful suite of applications that will mitigate data leakage at source, avoiding the inevitable ramifications of a terminal data breach.

Safend-logoSafend. Endpoint security.

Endpoint security and control for enterprise. Safend allows for the granular restriction of devices by type, model and serial number.  Storage devices can be blocked and permissions can be changed to read only.  Device data can be encrypted, monitored and blocked. As an additional layer of security, Safend allows you to track downloaded or read files, inspecting files by type as they are transferred to/from external storage devices, enforcing policy definition.

Safend encryption.

For the application of an enterprise-wide encryption policy, mitigating unauthorised loss of sensitive data through a unique encryption technology.

  • Windows login authentication
  • Integration with Microsoft Active Directory domain password reset process
  • Centralised management and storage of encryption keys
  • Full visibility and audit trail
  • Anti-tampering agent
  • Media tracking – tracking offline access

GFI-endpointGFI EndPoint Security.

GFI EndPoint Security reduces risk of data leaks and other malicious activity through intelligent data leakage risk assessment, data awareness and access control technologies.

GFI EndPoint Security looks to thwart the risk of data leakage presented by the introduction of a Bring Your Own Device policy (BYOD) in the workplace through proficient risk assessment capabilities that will quickly identify the sources of data leaks.

Through an intelligent access control module, endpoint security introduces an additional layer of protection by seeking common file types that are prone to data leakage, contributing to data loss prevention compliance.

GFI EndPoint Security access control.

  • Temporary network or workstation access
  • Scheduled access to portable devices
  • Block devices by class, device type, port or file extension

Secure-towerSecure Tower.

Created specifically for the purpose of resolving network security issues and the analysis of personnel efficiency. Through the implementation of multifunctional tools, company data flow can be controlled at every level of enterprise.

Through intelligent employee activity monitoring and screenshot capturing capabilities, staff performance can be monitored, assisting your HR department by providing accurate statistics on application usage at user level, presented in dynamic reports.

Types of data controlled by Secure Tower.

  • E-mail messages including Exchange server, other mail servers and external email clients
  • Web traffic including forum messages and other web-services using HTTP protocol
  • Social network activity
  • SaaS including Microsoft Office 365
  • Instant messengers
  • Files transferred through multiple protocols
  • SSL traffic transmitted through encrypted protocols
  • MS SQL Server and MySQL database
  • Data transferred to external devices
  • Data printed on local and network printers

We’re trusted accredited Network Security consultants.

Complex-accreditations

Speak with a client manager today.

For initial consultation, speak directly to a client manager and find out more about our Data Leakage Prevention solutions today by calling us on 020 8501 7645. Alternatively, click below to submit your details online.

DLP

Want more information? Get in touch with us, or use the quick contact form below.

Get in touch.

Submit your details below to request a callback from a professional IT consultant. You are welcome to upload a project outline or schedule of requirements.
  • This field is for validation purposes and should be left unchanged.