Features

Exceptional visibility, supporting 400+ content types

Only classify data that needs additional protection

Determine policies to be applied across the environment

Monitor data usage to detect inappropriate activity

Prevent data sharing based on policy

Users who attempt to violate information-sharing policies receive instant coaching

Products

Trellix DLP for Endpoints

Device control

  • Prevent unauthorized device installation
  • Deploy policies for content-based monitoring, filtering, and blocking
  • Available as a stand-alone or included in Trellix DLP Endpoint Complete

Endpoint Complete

  • Find and classify data using content, context, and fingerprinting
  • Prevent data exfiltration from most common leak vectors
  • Instant education if a user attempts to violate policy
  • Out-of-the-box compliance features, including reporting
  • Includes Trellix Device Control features

Trellix DLP for Network

DLP monitoring for networks

  • Scan and analyze network data in real time
  • Detect anomalies in network traffic to speed up investigations
  • Supports multiple protocols including SMTP, IMAP, POP3, HTTP, LDAP, Telnet and FTP

DLP prevention for networks

  • Create actions in the email gateway to quarantine, encrypt, or block emails
  • Allow the collection of information to support policy development and investigations
  • Apply intranet policies to prevent users from sending unauthorized information
  • Integration with email products and web portals that support the SMTP/ICAP protocol

Trellix DLP explored

  • Analyze, identify and fix potential data leaks
  • Inventory, copy and move files
  • Categorization support for over 400 content types
  • Scan SQL, MySQL, SharePoint, Oracle, Box, DB2 and other database stores to identify and protect sensitive data

Leave contact
and we can advise you

We are happy to share advice and guide you with ideas about the service you need most