We will contact you shortly
Guide to data classification
A document that will help you understand, evaluate, and start implementing data classification in practice.
Fortra experts have prepared a comprehensive guide to help you understand where to start with data classification and how to improve its security. The information in this guide is the basis for developing a data strategy that will help make this process meaningful, controlled, and most importantly, effective.
Powered by AWS, Digital Guardian provides easy deployment and flexible scalability to increase security ROI. It can be deployed in your infrastructure
Support for Windows, macOS, Linux, or VMware/Citrix virtual environments at the system kernel level
Granular and flexible configuration of security policies for logging, monitoring, and blocking
DG ANALYTICS & REPORTING CLOUD (ARC)
A module for deep and detailed analytics and reporting of incidents, for a quick and effective response to data leakage threats, both internal and external, regardless of their type.
DG ENDPOINT AGENT
The agent is the basis of the platform, it is deeply integrated into the OS kernel (Win, Mac, Linux) and, thus, ensures the transparency of the employees actions at the end station. Guaranteed to provide control over the movement of information, including the prevention of its leakage, at the process level. Includes the following core functionality: monitoring, prevent, auto data classification by content and context, device control, app control, data discovery, USB encryption, EDR
DG NETWORK APPLIANCE
An agentless data leak prevention solution aimed at controlling transit traffic, both web and email, focused on rapid deployment. Acts as a single virtual device, including the mode of welcome, monitoring, date of discovery, and OCR (image recognition)
An additional module for capturing a user's monitor image for a DLP incident, it can also record employee keystrokes (keylogger)
USER DATA CLASSIFICATION
Custom data classification to visualize the level of data sensitivity and protection based on a visible label for the user