Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Network DLP for Mail

In-depth email content security awareness and protection

Network DLP for Mail Overview

Network DLP for Mail is an independent security gateway device, through pure transparent proxy, forward and reverse proxy, bypass monitoring, MTA and other deployment forms for enterprise employees to send content in the content of the email for in-depth content perception, can be based on keywords, regular expressions, fingerprint database, data identifier, file attributes, machine clustering and other detection conditions to build data security protection strategy for email outgoing content into in-depth detection, identification and audit protection. Effectively prevent employees from consciously or unconsciously sending out the core sensitive data assets of the enterprise in the form of emails, resulting in information leakage.

Activity & Announcement
Advantages
In-depth and comprehensive message content identification

Support content analysis of all email parts such as message header, body, attachment, sender, recipient, and Bcc address, and conduct in-depth email content identification for personal privacy data protection parts involving the core confidential data of the enterprise or personal privacy data protection parts stipulated in regulatory policies such as the Network Security Law, Data Security Law, and data export. Based on deep content recognition technology and industry-leading OCR optical character recognition engine, it supports 1000+ document types and 30+ image format recognition, 300+ kinds of document content extraction, and supports the identification of encrypted attachments, compression nesting behaviors, and a small number of sporadic email outgoing data leakage behaviors in emails.

Comprehensive monitoring of sensitive data flows

The system monitors the flow behavior of emails containing sensitive information in real time, records the key elements such as the IP address, email address, transmission mode, sensitive content, sending time, and policy hits of the sender and receiver during the transmission of the illegal emails, and supports the visual display and analysis of various elements of the violation events. Help users grasp the full picture of email data leakage events, form a full record of sensitive data flow life cycle, and provide an important basis for compliance audit, traceability and accountability.

Response mechanism for message leakage behavior

When Network DLP for Mail detects the illegal transmission of sensitive data, it can timely perform various data security protection response actions such as blocking the sending, audit records, alarm notifications, content encryption, quarantine approval, etc., to ensure that the employees' email transmission behavior complies with the organization's security regulations.

Application
Scenario

Network DLP for Mail are deployed in the upstream and exit of the enterprise's internal mailbox server in the form of concatenation, bypass or MTA, so as to control the scope of email outreach, the types of external mailboxes involved, and external mailbox accounts, control and control the behavior of sending emails through internal mailboxes, and monitor, audit and alarm on risky outgoing emails, unencrypted outgoing emails, Un desensitized outgoing emails, and email account permissions without permissions.

Issues Resolved
  • Effectively control the confidential behavior of email content and reduce the threat and risk of leakage of core secrets of enterprises to the Internet through email. (In the scene of sending out the email, the parentheses are deleted)
  • Prevent the leakage and spread of data of core departments to personnel of other unrelated departments and units, standardize the sending behavior of emails with confidential content within the company, and reduce the risk of cross-department circulation of sensitive data (internal email sending scenarios, bracketed content deleted)
  • Comprehensive audit identifies sensitive content in emails, blocks the sending of illegal emails, and ensures the security of enterprise data assets.
  • Avoid leakage of core data assets due to improper email behavior, which will bring immeasurable losses to enterprises and organizations
Scenario

Network DLP for Mail are deployed in series or bypass at the internal core switch of the enterprise, each security domain isolation node, and multi-level scene node, monitoring the data transmitted by the employees of the enterprise to each other, and clearly defining important data, personal information, and business sensitive data in advance, when employees in the internal network environment, sending sensitive data through the mail system and other illegal data transmission behaviors, the leakage prevention system is based on the sensitive data information in advance, filtering sensitive data in mail transmission. The transmission behavior of sensitive data is recorded, and the transmission behavior is recorded, and the email transmission behavior with high risk level can be blocked.

Issues Resolved
  • Effectively control the confidential behavior of email content and reduce the threat and risk of leakage of core secrets of enterprises to the Internet through email. (In the scene of sending out the email, the parentheses are deleted)
  • Prevent the leakage and spread of data of core departments to personnel of other unrelated departments and units, standardize the sending behavior of emails with confidential content within the company, and reduce the risk of cross-department circulation of sensitive data (internal email sending scenarios, bracketed content deleted)
  • Comprehensive audit identifies sensitive content in emails, blocks the sending of illegal emails, and ensures the security of enterprise data assets.
  • Avoid leakage of core data assets due to improper email behavior, which will bring immeasurable losses to enterprises and organizations.
Value to Customers
Comprehensive protection against email data leakage

The built-in in-depth content recognition engine monitors the data transmission behavior of mail circulation in real time, helps establish a comprehensive email information security guarantee system, reduces the risk of data leakage in the email business, and reduces the information security incidents of enterprises.

Business compliance with ease

Meet the detection of multi-dimensional sensitive data, prevent confidential information from leaking in the form of emails, provide a basis for internal compliance management and external audit, and easily respond to the requirements of the audit department.

Reduce the risk of reputational damage

Prevent the negative impact of information leakage on the company's reputation caused by employees' conscious or unintentional use of sensitive data sent by email and improve employees' security awareness.

Visualize the flow of mail data

Sensitive email content violations can form detailed audit logs and reports, including the time, email sending address, email receiving address, transmission mode, and violation content, so that security personnel can timely grasp and understand the violations of internal email data.