Features
Exceptional visibility, supporting 400+ content types
Only classify data that needs additional protection
Determine policies to be applied across the environment
Monitor data usage to detect inappropriate activity
Prevent data sharing based on policy
Users who attempt to violate information-sharing policies receive instant coaching
Products
Trellix DLP for Endpoints
Device control
- Prevent unauthorized device installation
- Deploy policies for content-based monitoring, filtering, and blocking
- Available as a stand-alone or included in Trellix DLP Endpoint Complete
Endpoint Complete
- Find and classify data using content, context, and fingerprinting
- Prevent data exfiltration from most common leak vectors
- Instant education if a user attempts to violate policy
- Out-of-the-box compliance features, including reporting
- Includes Trellix Device Control features
Trellix DLP for Network
DLP monitoring for networks
- Scan and analyze network data in real time
- Detect anomalies in network traffic to speed up investigations
- Supports multiple protocols including SMTP, IMAP, POP3, HTTP, LDAP, Telnet and FTP
DLP prevention for networks
- Create actions in the email gateway to quarantine, encrypt, or block emails
- Allow the collection of information to support policy development and investigations
- Apply intranet policies to prevent users from sending unauthorized information
- Integration with email products and web portals that support the SMTP/ICAP protocol
Trellix DLP explored
- Analyze, identify and fix potential data leaks
- Inventory, copy and move files
- Categorization support for over 400 content types
- Scan SQL, MySQL, SharePoint, Oracle, Box, DB2 and other database stores to identify and protect sensitive data