The Effortless And: Data Loss Prevention Insider Threat Protection
The Effortless And: Data Loss Prevention Insider Threat Protection
People and data are the fuel for modern The average cost of a data breach is
companies. When sensitive $3.86 million.*
data is lost or stolen, a company’s
reputation, competitive 60% of small companies go out of
advantage, and profitability all suffer. business within 6 months of a major
data breach.**
*2020 Cost of Data Breach Report, Ponemon Institute; ** National Cyber Security Alliance, October 2012
www.safetica.com
© Copyright All rights reserved, 2021
Key Data Security scenarios
Data flow discovery and risk detection Data protection & employee guidance
Safetica audits and records any attempt to Anyone can make a mistake which could put
intentionally or unintentionally leak the data, no your business at risk. With Safetica ONE, you
matter where the sensitive information is stored, can analyze insider risks, detect threats, and
or who has accessed it. Safetica's risk analysis mitigate them swiftly. Notifications about how to
helps you detect and investigate how your data treat sensitive data can help raise awareness
could be leaked or stolen. around data security and educate employees.
• customer databases
• payment-related data,
Safetica ONE Safetica ONE Safetica ONE
such as credit card
Discovery Protection Enterprise
numbers
• intellectual-property –
Safetica UEBA
modules
Optional
www.safetica.com
© Copyright All rights reserved, 2021
Reference Architecture
3rd party 3rd party
Integrations classification
Polices
Alerts
Detect
Notify
Safetica Management Console & Server Company devices with Safetica Justify
Block
The physical or virtual server runs a All actions are recorded and security Sensitive data is protected throughout
database with endpoint activity and policies are applied on desktops, all channels.
security records. The Safetica laptops and other remote or even
Management Console enables admins offline mobile devices (smartphones
to manage security policies and display MDM only) with a Safetica Client.
the collected information.
Cloud Removable
storage
Teams Skype Slack Bluetooth Firewire Copy and Paste Screen capture
Drag and Drop
www.safetica.com
© Copyright All rights reserved, 2021
Discovery Key
Benefits
Safetica ONE Discovery audits and classifies all
data flows in your organization. It identifies
sensitive information and security risks using
content inspection with optical character
recognition (OCR). Get a quick overview of what
is happening in your workspace in real time.
Better understand all internal activities,
processes and data risks to enhance your data
security and internal efficiency.
Get insight into data security incidents Audit and classify your sensitive data Get instant notifications and actionable
and regulatory compliance violations to flows in any channel or activity to find management reports with easy-to-read
be able to respond and mitigate their out where your data is at risk of loss or risk level evaluation and incident
impacts theft overview
Discover and remove unwanted or Easy-to-deploy solution with one-click Objectively analyze user activities in
unnecessary software, cloud services, integration with Microsoft 365 respects your environment and determine if
or hardware/peripherals established processes and provides company equipment and network are
first reports within days used properly
Key highlights
Identify how company data is used and where it
is stored and sent, no matter where it resides or
flows.
www.safetica.com
© Copyright All rights reserved, 2021
Protection Key
Benefits
Safetica ONE Protection identifies risks,
educates your employees, and prevents
people's mistakes and malicious acts to protect
your data. Combination of data analytics, data
classification, and data loss prevention (DLP)
with insider threat protection creates a secure
environment while maintaining efficient business
operations.
Have full control over Get regular security reports Use Safetica Zones for Create Shadow Copy of
sensitive data flows and and real-time incident simplified high-level data leaking data to keep forensic
internal risks based on notifications security evidence for further
behavior analysis & content investigation
inspection
Set clear policies for all users and data channels Empower employees to work with sensitive data
Set up security policies for specific groups or individuals. Display educational notifications to employees when there’s a
Select the desired workflow with configurable actions from risk of policy violation to let them know or decide. Enforce
silent auditing, through user notifications to strict blocking. specific processes to protect the most valuable data.
Detect potential threats and analyze internal risks Get all devices under control, online and offline
Respond to threats even before a major incident happens Restrict the use of portable peripherals or unauthorized
thanks to early discovery of behavior anomalies and data media. Control corporate mobile devices and keep track of
flow risks in your organization. Safetica ONE uses advanced data that leaves Microsoft 365. Safetica remains fully active
content classification and OCR for sensitive data detection in regardless of network connection. All collected records are
image files and scanned PDF documents. synchronized when connection is restored.
Key highlights
Based on content inspection, internal risk
analysis, and clear policies set up for all data
channels, Safetica ONE Protection can
recognize when somebody makes a mistake or
takes chances with your sensitive data.
Depending on which mode Safetica ONE is
operating in, it can either block the risky activity,
notify the admin, or remind the employee about
the organization’s security guidelines. Safetica Management Console enables detailed but easy
configuration of DLP policies, data categories, or reports.
www.safetica.com
© Copyright All rights reserved, 2021
Enterprise Key
Benefits
Safetica ONE Enterprise extends data loss
prevention and insider threat protection by
additional workflow control, automation, and
seamless integration with 3rd party network
security solutions, SIEMs, and data analytics
tools. Built your enterprise IT security stack with
ease.
Automated third-party Policies for workflow control Support for Active Directory Custom branding of user
integration and features for on company endpoints in multi-domain security notifications on
advanced use cases. environments endpoints
Native integration with Microsoft 365 or Fortinet With workflow control, you can enforce a specific
network appliances provides extended control over secure process and block all other ways of
unknown devices and creates a robust endpoint-to- performing an action.
network security solution.
Workflow control includes application DLP policies to
All audited incidents and logs can be automatically manage behavior of various types of applications like
sent to SIEM solutions e.g., Splunk, IBM QRadar, CRM or IM and DLP policy rules with custom
LogRhythm, or ArcSight for further investigation. configurations applied to different networks, local
REST API provides collected data to tools like Power paths, or exclusive access for privileged users.
BI or Tableau for advanced analysis.
Key highlights
Windows and macOS support
One-click integration with Microsoft 365 Data Analytics Tool
approaches
www.safetica.com
© Copyright All rights reserved, 2021
UEBA Module
Key Benefits
Knowledge is the first and most important step
in understanding your company’s workflow,
employees’ work habits and productivity. Enrich
any Safetica ONE product with User and Entity
Behavior Analytics module to see user activities
in detail and uncover their behavior anomalies.
Ensure smooth business operations, even when
working remotely.
Recognize undesirable user activities Get deeper insights in email Track changes in user behavior
with work activity audit and automated communication with overview and visualization of
labelling and categorization of apps with records of all incoming and trends and changes in user behavior in
used and websites visited by specific outgoing emails with respect to your network over time
users employee's privacy
Audit resource usage Get comprehensive reports and real- Audit job searches
to get precise overview whether time alerts to identify job portals visited by
purchased hardware and software about individual user activities, even specific users, who might pose a future
licenses are distributed and used when working remote, such as via data security risk
efficiently remote desktop etc.
Data protection on mobile devices Overview of user and device status Centralized remote management
Separate work-related apps and data Monitor device security and Use enhanced app management to
into a protected workspace, identify connectivity, track and find lost control app settings and behavior, set
harmful apps on particular devices, and devices with remote localization. security policies for device groups and
remotely block or wipe lost or stolen automatically configure and manage
devices. them from a single place.
Secure and manage all mobile devices Audit incoming files on Android
Check all company devices and discover security Get an overview of where your data is stored also on
risks in a single glance. Set up device policies and corporate mobile devices (available for Android 6-10).
even Wi-Fi accounts remotely. Utilize Android EMM Using Safetica Mobile with WebSafetica, you can spot
and iOS Managed Apps to create a separate security incidents in single pane of glass, whether
workspace on company devices and use them for they happen on your phone, computer, or in the
remote work and private purposes. Microsoft 365 cloud.
Anti-theft protection
Loss of company mobile devices and employee
fluctuation are common issues that may your sensitive
data at risk. Safetica Mobile can find corporate mobile
devices and remotely wipe them if unreachable. This
helps you to secure your infrastructure and keep
critical data as your property.
www.safetica.com
© Copyright All rights reserved, 2021
Detailed Features List I
Safetica
Compatible with Safetica ONE Safetica ONE
ONE
Windows, macOS, Microsoft 365, Android, iOS Discovery Protection
Enterprise
Security Audit ✓ ✓ ✓
Data-flow security audit
Security audit of data-flow in all channels, including
external devices, web upload, email, instant messaging, ✓ ✓ ✓
print, and cloud drives.
Content inspection
Classify sensitive files and emails by powerful content
inspection with predefined templates or custom rules and ✓ ✓ ✓
dictionaries.
www.safetica.com
© Copyright All rights reserved, 2021
Detailed Features List II
Safetica
Compatible with Safetica ONE Safetica ONE
ONE
Windows, macOS, Microsoft 365, Android, iOS Discovery Protection
Enterprise
Safetica Zones
Easy management of safe data perimeter with unique Safetica
Zones, which significantly reduce the number of data protection × ✓ ✓
policies.
www.safetica.com
© Copyright All rights reserved, 2021
Tech Specs and Requirements
Server macOS Client
• 2.4 GHz quad-core processor • 2.4 GHz quad-core processor, 2 GB RAM and
more
• 8 GB RAM and more
• 10 GB of available disk space
• 100 GB of available disk space
• macOS 10.10 and higher (for full DLP feature
• A shared or dedicated server, support of
set recommend 10.15 and higher).
virtual machines and cloud hosting
virtual machines and cloud hosting. It can • Member of ESET Technology Alliance
be hosted with Safetica server together.
• Member of the Fortinet Technology Alliance
Windows Client
• 2.4 GHz dual-core processor, 2 GB RAM and
more
www.safetica.com
© Copyright All rights reserved, 2021
400 000
+
who
we are
protected devices
+
120
countries Safetica is a Czech software company that
provides Data Loss Prevention and Insider
+ Threat Protection solutions to organizations of
80 all shapes and sizes. Here at Safetica, we
security experts believe everyone deserves to know that their
data is safe.
Technology alliances
Excellent
@safetica
Data Protection
Made Easy