https://store-images.s-microsoft.com/image/apps.47453.043d9731-6efa-4f58-974f-7f517cdbb809.f3790f52-8e6b-42bf-962f-e0f6872f8913.e3816d42-964e-4dd4-85d3-c6294e411755

eScan Enterprise Data Leak Prevention (DLP)

Microworld Technologies, Inc.

eScan Enterprise Data Leak Prevention (DLP)

Microworld Technologies, Inc.

eScan Enterprise DLP: Safeguard sensitive data, and enforce security policies effectively.

The crucial information of the business will be shielded from unauthorized access by the eScan Enterprise Data Leak Prevention. Its primary objective as a data security solution is to stop end users from sending sensitive or important data outside the organization's network utilizing a variety of techniques, tools, and methods. It monitors, detects, and blocks sensitive data while In Use, In Motion by monitoring, identifying, and preventing potential data breaches and data exfiltration attempts.


Key Features

File Attachment Block

eScan-DLP Attachment block feature lets you control attachment flow within your organization. You can block/allow all attachments that a user tries to send through specific pre-defined processes. You can exclude specific domains/sub-domains that you trust, from being blocked even if they are sent through the blocked processes mentioned above.


Content-Aware Controls

This superlative feature enables the administrator to monitor & control the type of information which can be sent outside of the endpoint. Sensitive/Confidential Information, also termed as PII, which many a time are controlled by government regulations (GDPR, for instance) can be broadly categorized.


Workspace Application

Make sure user can login only corporate profile and no personal profile logins. For Eg ..Application or domain like gmail.com, O365, One drive etc..


Printer Access Control

eScan-DLP manages the printing activity of sensitive documents. Printer Access Control options can define which data can be printed on specific printers and by whom. One advantage of this technical solution is that in the event of unauthorized activity, the DLP system logs the incident, notifies the user about the risks, and can also block the print.


Wi-Fi Access Control

Wi-Fi Access Points come with a default SSID and password that must be updated, although default passwords are frequently kept in place. This makes it simple for an attacker to log in and take control of the router, configure settings or firmware, load malicious programs, or even change the DNS server to send all traffic to an attacker's IP address.


File Activity Monitoring (Local/Network/Storage Devices)

The File Activity module displays a report of the files created, copied, modified, and deleted on managed computers. Additionally, in case of misuse of any official files, the same can be tracked down to the user through the details captured in the report. The Administrator can select and filter the report based on any of the details captured.


Session Activity

This sub module monitors and logs session activities of managed computers. It displays a report of the Operation type, Date, Computer name, Group, IP address and event description. With this report, the administrator can trace the user Logon and Logoff activity, along with remote sessions that took place on all managed computers.


Application Access Report

The Application Access Report module gives a detailed view of all the applications accessed by the endpoints which are part of Managed Computers. The log displays a list of applications executed and the time duration for which the app was active. Options for Filtering or Exporting the log in desired formats are also present on the same interface.


Disable Print Screen

This will block any screen-shot and/or screen-grab process, like the windows snipping tool, from capturing desktop screen images. This feature will ensure that users cannot capture sensitive information as an image and transfer it outside. Hence it is an important aspect of DLP.


Sensitive File Protection

This feature will ensure that sensitive data cannot be accessed using any other application except the default application specified. Once a folder is classified as "Sensitive", its contents cannot be changed / deleted in any way. The files can be accessed using only the associated apps and any kind of editing is blocked to avoid data modification.


Screen Capture

Screen Capturing makes it easier to take desktop screen-shots. As a business owner, it becomes crucial to be aware of the activities of employees, especially in the case of customer service or help-desk teams. Employees may work hard but to clearly understand their productivity, screen capturing gives you a detailed insight into the work being done.


Languages Supported:
English, German,French, Nederlands, Italian, Portuguese, Spanish, Turkish, Chinese Simplified,Chinese Traditional, Greek, Korean, Norwegian, Russian,Polish, Latin Spanish, Czech, and Slovak.

https://store-images.s-microsoft.com/image/apps.18485.043d9731-6efa-4f58-974f-7f517cdbb809.f3790f52-8e6b-42bf-962f-e0f6872f8913.4a74d6d4-9dad-43fe-b513-cb87b4d03263
https://store-images.s-microsoft.com/image/apps.18485.043d9731-6efa-4f58-974f-7f517cdbb809.f3790f52-8e6b-42bf-962f-e0f6872f8913.4a74d6d4-9dad-43fe-b513-cb87b4d03263
https://store-images.s-microsoft.com/image/apps.18939.043d9731-6efa-4f58-974f-7f517cdbb809.f3790f52-8e6b-42bf-962f-e0f6872f8913.5539d288-6467-41aa-bf71-d1a8da6b9388
https://store-images.s-microsoft.com/image/apps.64528.043d9731-6efa-4f58-974f-7f517cdbb809.f3790f52-8e6b-42bf-962f-e0f6872f8913.86df5399-215f-4d1e-915f-2051ec01a7af