Prevent leakage and manage data
Through the trinity of abnormal user behavior analysis, intelligent identification of sensitive data, and outbound full-channel management and control capabilities, we can solve the data leakage risks faced by enterprises and establish a governance system for global data security and operations for enterprises.
Customer issues/challenges
- Remote working increases the risk of data breaches, with 5,358 data breaches known to have occurred in 2021The transfer and leakage of core data assets of enterprises often occur in office settings. Affected by the epidemic, remote working has become the norm for enterprises, further exacerbating risks. According to the 2021 IBM Data Breach Report, remote working has increased the security protection costs of large companies by an average of US$1 million.
- The internal files of the enterprise are complex, and internal leakage is the most serious channel for data leakage.There are many and complex internal documents in an enterprise, and identifying, classifying and grading sensitive data requires a lot of work. Best practices vary widely among different industries. On the basis of traditional IM chat tools such as USB and outgoing emails, SaaS applications such as cloud notes and cloud disks bring new challenges to enterprises.
- 85% of data breaches involve human factorsAccording to the Verizon 2021 Data Breach Investigation Report, 85% of data leaks involve human factors. How to intercept and block outgoing data in a timely manner while finding at-risk employees as early as possible at the source within the enterprise and obtaining evidence in a timely manner is The focus of enterprise data security construction.
Aquila XDLP
- Built-in rich sensitive data templatesIt has built-in 10 major categories of sensitive data templates, supports the identification of 111 rule types, and can customize enterprise-unique sensitive elements through machine learning.
- Automated data mapping and identification of at-risk employeesThe built-in data map automatically scans the distribution of the company's sensitive data assets, allows one-click search for the distribution of sensitive files, and supports one-click generation of employee-dimensional risk reports.
- Supports nearly 100 types of data channel auditing and interceptionIt supports data auditing of nearly a hundred data channels in 13 categories such as IM channels, network disks, computer peripherals, mailboxes, and cloud notes. It also supports interception of IM communications and remote control channels.
- Data outgoing screenshots and certificatesSupports multi-channel screenshot forensics to record employees’ behavior when sending sensitive data in files, which can be used for retrospective investigation of data leakage incidents.
Product advantages
Integrated protection closed loop
Integrating EDLP, NDLP and UEBA into one, eliminating the need to deploy multiple sets of products and reducing the workload of IT operation and maintenance personnel
Intelligent classification and grading
Intelligent identification and automatic classification of sensitive data help enterprises quickly identify and distinguish sensitive data within the enterprise
Self-learning of enterprise sensitive data
Develop enterprise-unique sensitive elements through machine learning and customization
All-channel control without dead ends
It supports a large number of control channels, controls the outgoing transmission of sensitive data through all channels, and effectively and comprehensively controls the outgoing sending of sensitive data.
Traceability and evidence collection are simple
The entire process of sending out sensitive employee data records can be automatically screenshotted and saved, making it easier to trace the source and retain evidence afterwards.
Automated identification of at-risk employees
Supports one-click generation of employee-dimensional risk reports and one-click search for the distribution of sensitive files
Get a free demo of Aquila’s platform and solutions.
Please take a moment to explore our free product demo, where you can experience the key features and intuitive user interfaces firsthand.