IT | Security

Absolute DLP Tracks and Prevents Data Breaches

By: Absolute Editorial Team | 1/7/2014

Absolute Software acquired Palisade Systems in 2013, in the process adding on data security and data loss prevention (DLP) assets. Our new DLP capabilities fit in well with our existing endpoint GRC offering, Computrace, offering expanded GRC offerings to not only remotely invoke security commands to prevent and mitigate data breach scenarios, including data delete, data retrieval and device freeze, but also to now proactively monitor and manage data at risk on the endpoint.

Out of this acquisition, we now offer Absolute DLP, which has already been recognized by Gartner, entering the Magic Quadrant for Content-Aware Data Loss Prevention (DLP).

Absolute DLP allows organizations to track and prevent the movement of sensitive and confidential records from leaving the enterprise network including data in use, in motion or at rest. It provides users with the ability to analyze data moving across the network, in real-time, and across all network protocols including: email, social media, web traffic, and file transfers.

Absolute DLP optimizes performance through a unique 3-layered filtering approach:

  • Protocol filtering to block the use of unwanted applications and protocols
  • Web filtering to block harmful websites
  • Content analysis to screen confidential data

Confidential information is protected by either logging it when it leaves the network, blocking it outright, quarantining it for subsequent examination, or automatically routing the data through encryption. All of this activity occurs without disruption to normal business processes. The Absolute DLP appliance resides between the corporate firewall and the internet to monitor all traffic on the network. An Absolute DLP agent is installed on each component, from workstations to servers to other storage devices. If there is suspicious or non-compliant activity, IT administrators can be alerted.

Absolute DLP comes with ready-to-use templates to help you support your internal information handling protocols. With our guidance and best practices, you can learn to manage and remediate DLP violations when the occur. Of course, the use of our data and reports can also prove that content was properly managed and secure to meet with regulatory compliance requirements.