Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

D ATA S H E E T

Industry-Leading
Data Loss Prevention (DLP)
Enterprise-grade security solution
for any industry

h al od ata . a s ia
Our advanced Data Loss Prevention (DLP) solution puts an end to data leaks and data theft while offering
control of portable storage devices and ensuring compliance with data protection regulations.

+VKUFGUKIPGFVQRTQVGEVEQPƒFGPVKCNFCVCCICKPUVKPUKFGTVJTGCVUYJKNGOCKPVCKPKPIRTQFWEVKXKV[CPFOCMKPI
work more convenient, secure, and enjoyable.

Endpoint Protector is an enterprise-grade DLP software for Windows, macOS and Linux computers, Thin
Clients and Desktop-as-a-Service (DaaS) solutions. The solution is an ideal choice for companies running
on multi-OS networks and it has a modular format that allows them to mix and match the right tools to
UGTXGURGEKƒEPGGFU

By deploying it, organizations can safeguard personal information and meet compliance requirements for
regulations such as the GDPR, HIPAA, LGPD, CCPA, PCI DSS, etc. Endpoint Protector also offers protection
to the company’s intellectual property and trade secrets.

Device Content Enforced eDiscovery


Control Aware Encryption
Protection

Lockdown, control, and Monitor and Control data Automatically secure Scan data at rest on
monitor USB and in motion, deciding what data copied on USB network’s endpoints and
peripheral ports to stop EQPƒFGPVKCNƒNGUECPQT storage devices with AES apply remediation actions
data theft and data loss. cannot leave the 256bit encryption. such as encrypt or delete
Set Rights per company. Filters can be Cross-platform, KPECUGEQPƒFGPVKCNFCVC
Device, User, Computer, set per File Type, password-based, easy to KUKFGPVKƒGFQP
Group or Globally. #RRNKECVKQP2TGFGƒPGF WUGCPFXGT[GHƒEKGPV unauthorized computers.
and Custom Content,
Regex and more.

Windows / macOS / Linux Windows / macOS / Linux Windows / macOS Windows / macOS / Linux

h al od ata . a s ia
-G[$GPGƒVU

Easy to install 2TGFGƒPGFEQORNKCPEG Cross-platform


and manage RTQƒNGU protection
Endpoint Protector can be up and 9KVJVJGRTGFGƒPGFFCVCRTQVGEVKQP The solution offers the same security
running in 30 minutes. It is easy to run RQNKEKGUKVKUGCU[VQƒPFTGIWNCVGF features and level of protection for
by both technical and non-technical data and to ensure compliance Windows, macOS and Linux
personnel. requirements of the GDPR, CCPA, computers. It also supports Apple
HIPAA, PCI DSS and more. devices with Arm-based M1
processors.

Detailed reports of Flexible deployment Granular


user activity options policies
With Endpoint Protector it is possible Endpoint Protector can be deployed in Granular access rights for removable
to track, report and get valuable multiple ways, depending on the needs devices and peripheral ports, as well as
insights about what sensitive data is and existing infrastructure of the security policies for users, computers,
being transferred where and by whom. company. CPFITQWRUECPDGGCUKN[FGƒPGF

DLP for Enterprises


In the age of digital transformation and workstream collaboration platforms (WSC), addressing the risks of data loss and
PQPEQORNKCPEGKUCOWUVHQTGPVGTRTKUGUCUVJGEQPUGSWGPEGUQHFCVCDTGCEJGUKPENWFGPQVQPN[JGHV[ƒPGUDWVNGICN
problems and reputational damages also.
Endpoint Protector Enterprise comes with a more effective data security solution on the market, enabling enterprises to
continuously identify, monitor, and control the data that they need to protect, wherever they are.

User remediation Management console Seamless integration


Endpoint Protector Enterprise flavor Data loss prevention policies can be Our solution offers integration with
adds more flexibility to security easily set for the entire network from Active Directory (AD) integration, and
policies. Through the user remediation Endpoint Protector’s centralized Security Information & Event
feature, end-users are allowed to dashboard that offers an enhanced Management (SIEM) technology.
self-remediate, meaning that after user experience. Integration with SIEM allows to
VJG[LWUVKƒECVGVJGKTCEVKXKV[VJG transfer activity events to a SIEM
VTCPUHGTQHURGEKƒEUGPUKVKXG server for analysis and reporting. With
KPHQTOCVKQPKUCNNQYGFHQTCFGƒPGF AD large deployments can be simpler.
amount of time.

h al od ata . a s ia
Device Control
for Windows, macOS and Linux
USB Drives / Printers / Bluetooth Devices / CD & DVD / External HDDs / Teensy Board /
Digital Cameras / Webcams / Thunderbolt / WiFi / Network Share / FireWire / iPhones /
iPads / iPods ZIP Drives / Card Readers / Android Smartphones / USB Modems / OTHERS

Set Rights Granularly File Tracing


&GXKEG4KIJVUECPDGEQPƒIWTGFINQDCNN[RGT 4GEQTFCNNƒNGVTCPUHGTUQTCVVGORVUVQXCTKQWU
group, computer, user and device. Use default USB storage devices, providing a clear view of
settings or adjust as needed. users’ actions.

&GXKEG6[RGUCPF5RGEKƒE&GXKEG File Shadowing


Set rights - deny, allow, read only, etc. The rights %TGCVGUJCFQYEQRKGUQHƒNGUVTCPUHGTTGFVQ
can be applied to a type of device or can be authorized devices for detailed audits.
FGXKEGURGEKƒE DCUGFQP8+&2+&CPF5GTKCN
Number).

Custom Classes Offline Temporary Password


Apply device rights based on Vendor ID and Temporarily allow device access to computers
Product ID to make management easier for disconnected from the network. Ensure security
devices from the same vendor. and productivity.

Outside Hours Policies Create E-mail Alerts


Device Control Policies can be set to apply when Get real time e-mail alerts for various events
outside normal working hours. Business hours related to removable media usage on company
start & end time and working days can be set. computers.

Outside Network Policies Dashboard and Graphics


Outside Network policies can be set to apply For a quick visual overview of the most
when outside the company’s network. important events and statistics, graphics and
Enforcement is based on FQDN and DNS IP charts are available.
addresses.

Active Directory Sync Reports and Analysis


Take advantage of AD to make large Monitor all activity related to device use with a
deployments simpler. Keep entities up to date, powerful reporting and analysis tool. Logs and
reflecting the network groups, computers and reports can also be exported.
users.
Users and Computers Information Transfer limit
Gain better visibility with information such as .KOKVVJGPWODGTQHƒNGUQTVJGƒNGUK\GVJCVECP
Employee IDs, Teams, Location, accurate be transferred within a set time interval. Include
contact details and more (IPs, MAC Addresses, or exclude transfers through devices, online
etc.) applications, and network shares.

Enforced Encryption
for Windows and macOS
256bit AES military grade encryption / Anti-tampering techniques / Centralized password
management / Send messages to users / Remote wipe / Password policy settings / OTHERS

USB Enforced Encryption Complex Master and User Passwords


Authorize only encrypted USB devices and The password complexity can be set as needed.
ensure all data copied on removable storage The Master Password provides continuity in
devices is automatically secured. circumstances like users' password resets.

Automatic deployment and Read Only Password management and remote wipe
Both automatic and manual deployment is Change user passwords remotely and wipe
available. The option to allow Read Only rights encrypted data in case of compromised devices.
until encryption is needed is also possible.

h al od ata . a s ia
Content Aware Protection
for Windows, macOS and Linux
Email Clients: Outlook / Thunderbird / Apple Mail / Web Browsers: Internet Explorer / Firefox
/ Chrome / Safari / Instant Messaging: Skype / Slack / WhatsApp / Cloud Services & File
Sharing: Dropbox / iCloud / OneDrive / BitTorrent / AirDrop / Other Applications: iTunes /
FileZilla / SFTP / Total Commander / TeamViewer / OTHERS

Exit Points Denylists User Remediation


Filters can be set based on a large list of Empowers users to safely override a DLP policy
monitored applications. USB storage devices, and offers options to justify data transfers.
network shares and other exit points can be Helps to Increase end-user accountability and
monitored. awareness of sensitive data transfers in the
organization.

File Type Denylists SIEM Integration


File Type Filters can be used to block Leverage Security Information and Event
FQEWOGPVUDCUGFQPVJGVTWGV[RGQHVJGƒNG Management products by externalizing logs.
even if users change the extension. Ensure a seamless experience across security
products.

Optical Character Recognition Threshold for Filters


Inspect content from photos and images, #FXCPEGF%QPVGPV&GVGEVKQP4WNGU&GƒPG
FGVGEVKPIEQPƒFGPVKCNKPHQTOCVKQPHTQOUECPPGF complex conditions for content scanning by
FQEWOGPVUCPFQVJGTUKOKNCTƒNGU combining multiple criteria (PIIs, dictionary
words, regular expressions, etc.) using logical
operators (AND/OR).

2TGFGƒPGFCPF%WUVQO%QPVGPV&GP[NKUVU Transfer Limit


(KNVGTUECPDGETGCVGFDCUGFQPRTGFGƒPGF 5GVCVTCPUHGTNKOKVYKVJKPCURGEKƒEVKOGKPVGTXCN+V
content such as Credit Card Numbers or Social can DGGKVJGTDCUGFQPVJGPWODGTQHƒNGUQTƒNG
Security Numbers and custom content such as size. E-mail alerts when the limit is reached are
keywords or expressions. available.

File Name Denylists Contextual Content Scanning


(KNVGTUDCUGFQPƒNGPCOGUECPDGETGCVGF6JG[ Enable an advanced inspection mechanism for
ECPDGUGVDCUGFQPVJGƒNGPCOGCPFGZVGPUKQP more accurate detection of sensitive content
just the name or just the extension. such as PIIs. Context customization is available.

File Location Denylists and Allowlists Offline Temporary Password


(KNVGTUDCUGFQPƒNGU NQECVKQPQPVJGNQECN*&& 6GORQTCTKN[CNNQYƒNGVTCPUHGTUQPEQORWVGTU
6JGUGECPDGFGƒPGFVQKPENWFGQTGZENWFG disconnected from the network. Ensure security
subfolders. and productivity.

Regular Expressions Denylists Dashboards, Reports and Analysis


A powerful tool to identify a sequence of /QPKVQTCEVKXKV[TGNCVGFVQƒNGVTCPUHGTUYKVJC
EJCTCEVGTUVJCVFGƒPGCUGCTEJRCVVGTP powerful reporting and analysis tool. Get
graphic reports for C level executives.

Outside Hours and Outside Network Compliance (GDPR, HIPAA, etc.)


&GƒPGCPFUGVHCNNDCEMRQNKEKGUVJCVYKNNCRRN[ Become compliant with industry rules and
when outside working hours or outside the regulations like PCI DSS, GDPR, HIPAA, etc.
network. #XQKFƒPGUCPFQVJGTRTGLWFKEGU

Domain & URL Allowlists DLP for Printers


Enforce company policies but allow employees Policies for local and network printers to block
the flexibility they need to do their work. Enable RTKPVKPIQHEQPƒFGPVKCNFQEWOGPVUCPFRTGXGPV
the DPI feature and create allowlists company data loss and data theft.
portals or email addresses.

Print Screen and Clipboard Monitoring DLP for Thin Clients


Revoke screen capture capabilities. Eliminate Protect data on Terminal Servers and prevent
data leaks of sensitive content through Copy & data loss in Thin Client environments just like in
Paste / Cut & Paste, enhancing the data security any other type of network.
policy.

Additional features are available. Find out more by requesting a demo on EndpointProtector.com

h al od ata . a s ia
eDiscovery
for Windows, macOS and Linux
(KNGV[RG)TCRJKE(KNGU1HƒEG(KNGU#TEJKXG(KNGU2TQITCOOKPI(KNGU/GFKC(KNGUGVE
2TGFGƒPGF%QPVGPV%TGFKV%CTFU2GTUQPCNN[+FGPVKƒCDNG+PHQTOCVKQP#FFTGUUGU550U
IDs / Passports / Phone Numbers / Tax IDs / Health Insurance Numbers / etc. / Custom
Content / File Name / Regular Expression / HIPAA / OTHERS

Encrypt and Decrypt Data File Type Denylists


&CVCCVTGUVEQPVCKPKPIEQPƒFGPVKCNKPHQTOCVKQP File Type Filters can be used to discover
can be encrypted to prevent unauthorized FQEWOGPVUDCUGFQPVJGVTWGV[RGQHVJGƒNG
employees’ access. Decryption actions are also even if users change the extension.
available.

Delete Data 2TGFGƒPGF%QPVGPV&GP[NKUVU


If clear violations of the internal policy occur, (KNVGTUECPDGETGCVGFDCUGFQPRTGFGƒPGF
delete sensitive information as soon as it is content such as Credit Card Numbers, Social
detected on unauthorized endpoints. Security Numbers and many more.

Scan Location Denylists Custom Content Denylists


(KNVGTUECPDGETGCVGFDCUGFQPRTGFGƒPGF Filters can also be created based on custom
locations. Avoid redundant scanning for data at content such as keywords and expressions.
rest with targeted content inspections. Various Denylist Dictionaries can be created.

Automatic Scans File Name Denylists


In addition to the Clean and Incremental Scans, (KNVGTUDCUGFQPƒNGPCOGUECPDGETGCVGF6JG[
Automatic Scans can be scheduled – either one ECPDGUGVDCUGFQPVJGƒNGPCOGCPFGZVGPUKQP
time or recurring (weekly or monthly). just the name or just the extension.

Scan Results Regular Expressions Denylists


Monitor logs to scanning data at rest and take A powerful tool to identify sequence of
remediation actions as needed. Logs and EJCTCEVGTUVJCVFGƒPGCUGCTEJRCVVGTP
reports can also be exported to SIEM solutions.

Scanning Status File Allowlists


Easily check the current status of your scan. The 9JKNGCNNQVJGTCVVGORVGFƒNGVTCPUHGTUCTG
scan status is displayed in the format 0-100%. blocked, allowlists can be created to avoid
redundancy and increase productivity.

Threshold for Filters MIME Type Allowlists


&GƒPGVJGPWODGTQHRQNKE[XKQNCVKQPUCƒNGECP Avoid redundant scanning at a global level by
contain for the security policy to be applied and excluding content inspection for certain MIME
VJGƒNGTGRQTVGFVQVJGUGTXGT Types.

Compliance (GDPR, HIPAA, etc.) SIEM Integration


Become compliant with industry rules and Leverage Security Information and Event
regulations like PCI DSS, GDPR, HIPAA etc. Management products by externalizing logs.
#XQKFƒPGUCPFQVJGTRTGLWFKEGU Ensure a seamless experience across security
products.

Additional features are available. Find out more by requesting a demo on EndpointProtector.com

h al od ata . a s ia
100% Deployment Flexibility
Our products are enterprise-grade and continually evolving to best serve any type of network and industry. With a client-server
architecture, they are easy to deploy and are centrally managed from the web-based interface. Besides the Virtual Appliance, the
server can be hosted by us and in major cloud infrastructures like Amazon Web Services, Microsoft Azure or Google Cloud.

Multiple login options, including local accounts, on-premise Active Directory (AD) authentication, Azure AD and OKTA Single Sign-on
(SSO) are available, are available, allowing simpler and easier control for admins. Multi-factor authentication (MFA) is also possible.

Device Control, Content Aware Protection, Enforced Encryption, and eDiscovery are available for computers running on different
Windows, macOS and Linux versions and distributions.

Virtual Appliance Cloud Services Cloud-Hosted


Amazon Web Services
Microsoft Azure
Google Cloud

Highly-rated in Gartner Peer Insights for enterprise


data loss prevention solutions.

Protected Endpoints

Windows Windows 7 / 8 / 10 (32/64 bit)

Windows Server 2003 - 2019 (32/64 bit)

Windows XP / Windows Vista (32/64 bit)

Apple Silicon M1

macOS 13.00 Ventura

macOS 12.00 Monterey

macOS 11.00 Big Sur

macOS 10.15 Catalina

macOS 10.14 Mojave


macOS
(kext and kextless agent) macOS 10.13 High Sierra

macOS 10.12 Sierra

macOS 10.11 El Capitan

macOS 10.10 Yosemite

macOS 10.9 Mavericks

macOS 10.8 Mountain Lion

Linux Ubuntu n/a

OpenSUSE / SUSE n/a

CentOS / RedHat n/a

Fedora n/a
*For more information on supported versions and distributions please check EndpointProtector.com/linux

h al od ata . a s ia
H A LODATA OF F I C E S

SINGAPORE MALAYSIA INDONESIA

Halodata International Pte Ltd Halodata Infokom Sdn. Bhd. PT. Halodata Indonesia
100 Pasir Panjang Road #05-09 Level 28, The Gardens South Tower, Ruko Marinatama E-23,
Singapore 118518 Mid Valley City, Jl. Gunung Sahari Raya No. 2,
Lingkaran Syed Putra, 59200 Jakarta 14420, Indonesia
Tel: +65-6336-7537 Kuala Lumpur, Malaysia
Email: hello@halodata.asia Tel: +6221-641-2784
Tel: +60-3-2298-7369 Email: hello@halodata.asia
Email: hello@halodata.asia

FO LLOW U S ON @HalodataGroup | www.halodata.asia

You might also like