- Covers all data leak channels.
- Saves the cost of repairing a data breach.
- Identifies suspicious activities before they result in lost time and money.
- Reduces personnel costs by identifying productivity issues and improving work performance.
Data loss prevention
Safetica keeps key data inside your company. Employees can’t take important information to a competitor or start their own businesses
Misdirected files
Safetica prevents important files from getting into the wrong hands, either inside or outside the company, and warns management of potential dangers.
Productivity fluctuations
Safetica helps identify changes in productivity and reveal dangerous trends in time.
BYOD security
Safetica keeps employee-owned devices in the company under control. No data in a company’s protected zone can sneak out on these devices.
Social engineering
Safetica can detect socially engineered attacks and blackmail attempts at the initial stages, preventing them from damaging your company.
Lost laptops & flash drives
Important data is protected by Safetica even if lost on the road. The whole disc or selected files remain encrypted and unreadable by the thief.
Resource management
Safetica can control printer use, applications and limit excessive online activities.
Data Loss Prevention
- All hard drives, USB, FireWire, SD/MMC/CF cards, SCSI drives
- Network file transfer (unsecured, secured)
- Emails (SMTP, POP, IMAP, Microsoft Outlook/MAPI protocols)
- SSL/HTTPS (all browsers & applications with standard certificate management)
- Copy/Paste, Clipboard, Drag & Drop
- Virtual, local & network printers
- Bluetooth, IR/LPT/COM/Parallel ports
- CD/DVD/BluRay readers & recorders
- Control of Application File Access
Cloud disc detection and restriction
- Screenshot creation
- Upload and download in web browsers
Reporting and activity blocking
- All file operations
- Long-term trends, short-term fluctuations in activity
- Websites (all browsers supported including HTTPS traffic) – active and inactive time
- Emails & webmails (virtually any provider)
- Searched keywords (majority of engines supported, Windows Search supported)
- Instant messaging (application independent – all protocols)
- Application usage with both active and inactive time
- Virtual, local & network printers
- Screen activity (intelligent capturing)
- Keylogging