- About Us
- Solution Areas
- Mobile Security & Collaboration
- Advanced Persistent Threats (APT's)
- Cloud Security Services
- Data Protection and Encryption
- Anti-Malware, Anti-Virus, Anti-Spam
- Agentless A/V for VMware
- EMC Storage Anti-Malware
- Email Server Anti-Malware
- Endpoint Anti-Malware Suites (Physical Desktops & Laptops)
- NetApp Storage Anti-Malware
- Perimeter Anti-Spam and Anti-Malware
- Server (Physical) Anti-Malware
- SharePoint Anti-Malware
- SmartPhone Anti-Malware
- VDI (Virtual Desktop) Anti-Malware Suites
- Virtual Server Anti-Malware
- Data Center, Virtualization & Cloud Security
- Citrix Xen Anti-Malware and Security
- File System Integrity Monitoring
- Microsoft Hyper-V Anti-Malware and Security
- Server (Physical) Anti-Malware and Security
- System and Security Platform Management
- Two Factor Authentication
- VDI (Virtual Desktop) Anti-Malware and Security
- VMware Anti-Malware and Security
- Virtual Patching
- Laptop/Desktop Privacy & Security
- Perimeter Security-UTM
- Cloud Services
- Webinars & Events
- Knowledge Base
- Escalade IT Blog
DLP is a very overused and often misunderstood term in today's marketplace. It can refer to any technology that is used to protect data from "leaking" from corporate assets. This could be anything from email encryption, instant messaging, USB sticks, webmail, all the way up to the more traditional DLP solutions which look at data classification and the restrictions of use of that data.
In this particular area of our solution portfolio we are focused on traditional DLP located at the endpoint. There are solutions available that provide traditional DLP at the network level and they provide some very strong benefits, but there are many that believe the best place for DLP is at the endpoint itself. We are not here to argue these points but rather to discuss the benefits of each and review your business requirements in order to make the best recommendations.
Traditional Endpoint DLP uses an endpoint agent to enforce proper usage and transmission of corporate data. A process of data classification must occur within a corporate environment which involves the review and "fingerprinting" of documents and files. These "fingerprints" include information about what can be done with the data including restrictions around the ability to print, email, offload to USB or CD. Both Endpoint and Network DLP are very strong IP protection strategies but will require a great deal of executive support as the project is not a small one. There is a substantial investment in time and resources required to go through the process of data discovery, review, policy definition, data classification, rollout and user awareness and training. There are thousands of organizations using enterprise DLP today and have successfully invested the time and resources to add some significant fortification to the protection of corporate data.
For more information on our Endpoint DLP solutions please click the "Request a Sales Presentation."
If you are interested to explore some DLP Point Solutions that provide only some of benefits of Enterprise DLP but that are widely being used as stepping stones to moving to full DLP please visit our DLP Solution Area under "DLP- Point Solutions."