Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Cloud DLP

Content-aware cloud data security and leak prevention

Cloud DLP Overview

Cloud DLP supports virtualization deployment, deeply adapts to public cloud and private cloud platform environments, uses forward/reverse proxy technology to monitor and protect data and business applications on the enterprise cloud platform in real time, and can carry out in-depth detection, identification and audit protection of data on the enterprise cloud platform based on the data security protection strategy built by the industry's advanced content recognition capabilities, and realize the whole process of monitoring, protection and access control of data transmission between the endpoint and the cloud. Effectively protect the security of core data assets and applications in the cloud.

Activity & Announcement
Advantages
Accurate and comprehensive content recognition technology

Based on deep content recognition technology and leading OCR engine, it supports 1000+ document types and 30+ image format recognition, 300+ document content extraction, encryption, compression and compression nesting, a small number of multiple data leakage and other behavior recognition, timely interception of illegal outgoing data, leaving no hidden danger of leakage.

Built-in rich industry policy templates

The data leakage prevention system is preset with multiple industry-specific data security protection policy template libraries, and enterprises can easily and quickly configure applicable security policies according to industry characteristics. At the same time, enterprises can also flexibly set custom policies according to their actual demand scenarios, and the policies can be dynamically adjusted, which is closer to the actual needs of users and reduces the investment of labor costs.

Flexible incident reports for a clear picture of data breaches

Data leakage incidents can form detailed reports, and incident reports can be sent to information security management personnel according to policies, severity levels, and periodic intervals, so that the security dynamics are fully controlled.

Application
Scenario

Through forward and reverse proxy deployment, full-traffic auditing and monitoring of sensitive business applications on the cloud platform is carried out to ensure that sensitive business systems are accessed, operated, and used in accordance with the security requirements of enterprises and organizations.

Issues Resolved
  • Filter the information in the network transmission traffic on the cloud, or record it in full quantities, and intercept high-risk access and transmission behaviors to prevent application data on the cloud from being used and transmitted in violation of regulations.
Scenario

Through forward and reverse proxy deployment, sensitive data assets stored on the cloud platform are identified and protected, and access and download behaviors of users are audited and protected.

Issues Resolved
  • Ensure the storage security of enterprise data on the cloud platform.
  • Effectively prevent unauthorized browsing, use, and external data theft, including APT attacks.
Value to Customers
Content-level cloud platform data protection capabilities

Using industry-leading deep content recognition technology, it can deeply and comprehensively identify and protect static data, dynamic data and circulating data in the enterprise cloud based on keywords, regular expressions, data identifiers, file attributes, natural language, digital fingerprinting, intelligent learning, image recognition and other detection conditions, perform protection response actions for non-compliance of sensitive data, and audit the flow status of data. Prevent the leakage of core data of enterprise cloud platforms in a way that violates security policies.

Multiple cloud platform data transmission control capabilities

Based on the flexible and rich sensitive data response protection action mechanism of data leakage prevention, such as auditing, alarming, blocking sending, encrypted content, email approval, removal of content, etc., it endows the cloud platform with multiple data security access control capabilities, fully records the data access operation behavior on the cloud platform, intercepts high-risk access and transmission behavior, prevents cloud application data and stored data from being abused in violation of regulations, and effectively regulates the data operation behavior of the cloud platform in multi-user high-frequency scenarios. Reduce potential security risks to enterprise cloud platform data assets.

Comprehensive cloud platform data behavior logging

All sensitive data leakage behaviors of the cloud platform will be automatically monitored, tracked, and recorded. The details of the offending user will be accurate to the account, email address, IP address, etc., and the breach will be received and handled in a timely manner through the management platform, email, Ding Talk, SMS, etc.