Beijing Guotai Network Information Technology Co., Ltd
Home>Products>Data leakage prevention system
Firm Information
  • Transaction Level
    VIP member
  • Contact
  • Phone
  • Address
    303, 3rd Floor, Building B, Four Seasons Science and Technology Innovation Center, Zhongguancun Science City, No. 51 Kunming Hunan Road, Haidian District, Beijing
Contact Now
Data leakage prevention system
Data leakage prevention system
Product details

Product Overview

The Data Leakage Prevention System (GTECH-DLP) is built on the latest generation of 64 bit multi-core hardware platform, using advanced core intelligent algorithms such as content fingerprint matching, computer vision, semantic analysis, etc., combined with advanced multi-core high-speed packet concurrent processing technology, to perform network monitoring, network protection, data discovery, email protection, terminal security, etc. for customers. Through deep content analysis and transaction security association analysis, it identifies, monitors, and protects static, mobile, and in use data, executes protective measures according to pre-defined policies, and achieves the goal of protecting sensitive data.

Features

Multiple conventional detection techniques:Support multiple detection techniques such as keyword recognition, regular expression, dictionary detection, script detection, data identifier, etc., accurately identify sensitive data, and perform prohibition or alarm operations.

Core technology of intelligent content recognition:Support core technologies such as content fingerprint matching, computer vision (OCR, facial recognition, stamping, etc.), and advanced semantic analysis to achieve comprehensive insight and protection of sensitive data. And supports recognition of over 1000 document types and 30+image formats; Support the identification of data leakage behaviors such as encryption.

Traffic management control function:In order to ensure that the services established by the device (such as file services and email relay services) maintain the appropriate bandwidth and prevent abnormal network interface traffic, the system provides a traffic monitoring and control module, which can comprehensively control the network traffic entering the gateway.

Enrich data security module:Support seven major security modules including network monitoring, network protection, data discovery, email protection, terminal security, and application system protection. Through in-depth content analysis and transaction security correlation analysis, identify, monitor, and protect static, mobile, and in use data to meet customers' comprehensive security needs.

Comprehensive mobile monitoring:Detailed monitoring of the data transmission process can support visual display of various elements, such as the distribution of sensitive data of different types and levels, data transmission methods, data source IP, destination IP, etc; Based on comprehensive monitoring, protective measures can be quickly taken against sensitive information leakage that violates security policies; Audit analysis can be conducted on the usage behavior of sensitive data, security incidents, policy execution, and other related content.

典型部署

The product is deployed in the company's network gateway using a bypass method. Administrators only need to mirror the relevant traffic from the switch to the data monitoring interface of the network monitoring module, and then the network data analysis and restoration engine efficiently, real-time, and completely reassembles the IP layer, TCP layer, and application layer of the mirrored packets to identify the data and files in the network traffic.

Online inquiry
  • Contacts
  • Company
  • Telephone
  • Email
  • WeChat
  • Verification Code
  • Message Content

Successful operation!

Successful operation!

Successful operation!