...
DLP | How it Works | Key Concepts |
---|---|---|
Policy Gateway (currently in place) | All data (email, web traffic, ftp traffic) flows through a central policy gateway. The service reviews and alerts on CIBC specified keywords and document profiles. |
|
End-Point Desktop | Installed on user machines, End-Point Desktop watches and alerts users and management on policy breaches in real-time. End-Point Desktop can also automatically provide remediation such as encrypting emails orencrypt files or provide a dialog box to notify management of reason for exception. In addition End-Point Desktop can interact with devices (USB, printers, etc). |
|
Data Discovery Services | Scan data repositories (network shares, websites, desktop computers and databases) and identify improperly protected files. Sensitive files are identified by CIBC specified keywords and document profiles. |
|