Clearswift Critical Information Protection (CIP) Management Server and Agent
Designed to enable users to securely collaborate by applying centralized information management policies on the endpoint. It also supports additional security features – including device control, deep content inspection, remediation actions, encryption and comprehensive auditing. Running in the background, utilizing advanced throttling techniques, the agent silently discovers critical information without interrupting end user activity. This provides unprecedented insight into potential data protection risks that exist on your networks and systems. Fully integrated with the Clearswift SECURE Exchange, Web and Email Gateways.
Endpoint Information Protection
Ensure consistent polices across all egress points with out-of-the-box policies to comply with regulations, including GDPR, HIPAA and PCI).
Discover Critical Information at Risk
Automatically move, encrypt or delete critical data wherever it is stored on desktops, notebooks, servers, network and cloud shares.
Control all device connections to the endpoint, protect against insecure or unauthorized file copying.
Unparalleled Endpoint Inspection
Utilizing the Clearswift Deep Content Inspection Engine, The Critical Information Protection Agent discovers critical information wherever it is stored on desktops, notebooks, servers, network and cloud shares. The transfer of critical information can be logged, blocked or encrypted and the solution provides automated policy-based remediation. Granular organizational policy provides the necessary flexibility to permit multiple behaviors, depending on the user and destination of file operations.
Automated Discovery and Protection
Detect and secure critical information based on content or regulation, including cloud and file server storage. Mitigate the risk based on policy, including moving the files to more secure storage.
Granular Device Control
The Critical Information Protection Agent also provides a fine level of granular control over removable media devices, including USB sticks, CDs and DVDs. Granularity can restrict use to specific device manufacturers or to individual devices to ensure only authorized devices are used.
Security that Doesn't End
Uprecedented layer of real-time monitoring, inspection and sanitization bolts onto an organization existing security infrastructure to extend beyond its perimeter and provide the agile defense upgrade needed to future-proof protection from unknown threats.