Endpoint Protector DLP for data at rest (eDiscovery) scans and identifies the confidential information in organizations’ endpoints and allows Administrators to take remediation actions like encrypting or deleting data at rest. It addresses both internal and external threats – unauthorized employees storing sensitive data on their computers and attackers which manage to bypass the network defense and try to get a hold of company’s records.

 

For organizations collecting and managing data like Credit Card Numbers (CCNs), Personally Identifiable Information (PII), Social Security Numbers (SSNs), and other employees’ records as well as business records and Intellectual Property (IP), it is imperative to ensure information protection and to make sure that confidential data is safely stored.

eDiscovery is available as a module within Endpoint Protector and does not require separate installation, being easily activated within the management console. A single endpoint agent is deployed for both Content Aware Protection (DLP for data in motion) and eDiscovery.

 

How it works

1. Create sensitive content policies

2. Start clean or incremental scan

3. Take remediation actions: encrypt or delete identified sensitive data

Organizations implementing Endpoint Protector eDiscovery can achieve regulatory compliance with HIPAA, PCI-DSS, GDPR, and others, avoiding fines and other damages imposed by regulatory entities.

 

Take remediation actions: encrypt or delete identified sensitive data

Whitelists based on file type and file name exclude from scanning specific files, like pictures, video files and others, reducing scan time and consumed resources. Blacklists are based on file types, predefined content, custom content (dictionaries) and file name, allowing IT Administrators to build policies according to the type on sensitive data stored on users' workstations.

Cross-platform eDiscovery solution

eDiscovery from Endpoint Protector scans data on Windows, macOS, and Linux endpoints for complete data protection. Administrators can choose to perform a clean scan to cover all repositories or an incremental scan to start scanning from where the last scan stopped.

Quick access to scan

results and remediation actions

The eDiscovery section offers visibility into scans, the matched sensitive items, the precise location of the discovered data, and remediation actions such as encrypt data and delete data at rest, for immediate reaction in case non-compliant data is identified.

Intuitive scanning setup

With a few simple steps, scans can be setup based on specific time, recurrence, and entities to be included in the scan. A list with previous scans is also available.

Benefits & capabilities

Ready to scan sensitive data stored on your
Windows, Mac and Linux endpoints?

PROUDLY ASSOCIATED WITH

sgtech.png
iapp.png
PIKOM-HugeLogo-01.png
unnamed (1).jpg
Singapore

Halodata International Pte Ltd​

No. 1 North Bridge Road #B1-03 High Street Centre, Singapore 179094

Contact:

+65-6336-7537

Email:

sgsupport@halodata.biz

  • Facebook
  • LinkedIn
Image by Patrick Langwallner

PT. Halodata Indonesia

HQ Office :
Ruko Marinatama E-23,

Jl. Gunung Sahari Raya No. 2,
Jakarta 14420, Indonesia

 

Wisma GKBI 39th Floor, Jl. Jend. Sudirman No. Kav. 28 Bendungan Hilir,

Jakarta 10210, Indonesia

Contact:

+6221-641-2784

Email:

its@halodata.biz

Image by Afif Kusuma

Halodata Infokom Sdn. Bhd.

Suite 15, A-3-2, Block A, Plaza Arkadia, Jalan Intisari Perdana, Desa Parkcity, 52200 Kuala Lumpur, Malaysia.

Contact:

+60-374-935-093

Email:

mysupport@halodata.biz

© Copyright 2020 Halodata International Pte Ltd. All Rights Reserved.