Data Security Plus datasheet
Data Security Plus datasheet
www.datasecurityplus.com
Solutions offered by
DataSecurity Plus
Detect and prevent sensitive data leaks Track your organization's web traffic, Download now
via USB devices, emails, web scrutinize the use of shadow web
applications, printers, and more apps, and enforce policies to block
Free, 30-day trial
through real-time endpoint security inappropriate or malicious web
monitoring. content.
www.datasecurityplus.com | 2
Audit all file activities, including create, delete,
rename, and permission changes, along with
details on who modified which file, when, and
from where.
File Server
Auditing with Ensure file integrity by keeping track of unwanted
file modifications and suspicious data transfers with
DataSecurity Plus
real-time notification and response capabilities.
Supported environments:
Windows file servers, failover clusters, workgroups,
and NetApp CIFS server environments www.datasecurityplus.com | 3
Analyze disk space usage and trigger alerts when free
space falls below preconfigured values.
Manage ROT data, i.e., find and purge duplicate, stale, non-business,
and other unneeded junk data from your storage repositories.
Delete duplicate files and reclaim disk space. Compare file name,
File Analysis with last modification time, and size to identify identical copies accurately.
DataSecurity Plus Find orphaned files such as those owned by disabled, deleted, and
expired users to reduce the risk of data theft.
Download now
Identify at-risk data such as files with broken or improperly inherited
permissions, files corrupted by known ransomware variants, and
Free, 30-day trial
more.
Gain insights into file storage with details on file ownership, type,
and location. Selectively track files that are currently open, hidden,
Supported environments:
and more.
Windows file servers, failover clusters, and workgroup
environments. www.datasecurityplus.com | 4
Discover sensitive personal data—such as PII, ePHI, and PCI—
using regular expressions and by matching keywords.
Data Risk
Identify and secure critical data using predefined data discovery
and classification rules, and comply with mandates like the GDPR,
the CCPA, HIPAA, and the PCI DSS
Assessment with
DataSecurity Plus Enable proximity scanning to reduce instances of false positives and
increase accuracy in detecting business-critical information.
Free, 30-day trial Expedite your incident response with options to move, delete, or
quarantine sensitive data using custom scripts.
Audit removable storage devices and gain insight into who transferred
what file to the device, when, and from where.
Data Leak Enable file copy protection to detect and disable high-risk file copy
activities across local and network shares.
Prevention with
DataSecurity Plus
Use application control to obstruct employees from running malicious or
non-vetted executables with block lists.
Annual plan starts at $345 Employ safe email practices by scanning email attachments for
confidential files and preventing users from sharing them.
Download now
Trigger instant messages using on-screen pop-ups to warn employees
Free, 30-day trial regarding possible data leak prevention policy violations (Outlook).
Use cloud app discovery to gain app, domain, and user-based insights on
the accesses made by users in your network.
Filter URLs by sanctioning or banning apps directly from the report interface
Cloud or by using custom parameters, thereby mitigating overall risk.
Protection with Audit file uploads made to various storage applications, including
Microsoft 365, Google Workspace, Zoho Suite, and DropBox.
DataSecurity Plus
Deploy Cloud DLP policies to granularly block risky file uploads based on
domains, URLs, application suites, and other parameters.
*Free add-on of the
Data Leak Prevention module Scrutinize shadow IT cloud services based on the category of apps
accessed and risk score, and correlate these insights with the top
actors who use them.
Learn more about Cloud Protection
WWW
Assess the reputation scores of domains based on real-time data
from integrated threat analytics, and ensure that only business
Supported environments:
-critical applications are sanctioned for use.
Cloud applications: Box, Dropbox, Microsoft 365 (OneDrive,
Sharepoint, and Exchange Online), and more.
Network protocols: HTTP and HTTPS
Browsers: Chrome, Firefox, Internet Explorer, and more www.datasecurityplus.com | 7
A unified data visibility and security platform
A two-pronged solution to fighting insider threats, preventing data loss,
and meeting compliance requirements
Download now
Personalized demo
Architecture
www.manageengine.com/data-security/demo-form.html
Pricing details
Help center
www.manageengine.com/data-security/pricing-details.html