NETWRIX ENDPOINT PROTECTOR EDISCOVERY
DLP scanning for sensitive data on all endpoints

Shield Your Sensitive Data from Theft and Misuse with data at rest DLP Scanning

Netwrix Endpoint Protector's eDiscovery solution provides a robust and comprehensive approach to identifying and protecting sensitive data stored on endpoints across Windows, macOS, and Linux platforms. Its advanced content and contextual DLP scanning capabilities ensure that sensitive data is not overlooked, even when embedded within other files or compression techniques. With Common Criteria EAL2 certification, Netwrix Endpoint Protector eDiscovery DLP scanner demonstrates its commitment to the highest security standards, safeguarding your organization's valuable assets.

Main Features

Feature Icon 0
Flexible policies based on whitelists and blacklists
Whitelists based on file type and file name exclude from scanning specific files, like pictures, video files and others, reducing scan time and consumed resources. Blacklists are based on file types, predefined content, custom content (dictionaries) and file name, enabling IT Administrators to build policies according to the type of sensitive data stored on users' workstations.
Feature Icon 1
Quick access to DLP scan results and remediation actions
The Netwrix Endpoint Protector eDiscovery section provides visibility into DLP scans, the matched sensitive items and the precise location of the discovered data. It also offers remediation actions such as encrypting data and deleting data at rest, which can be taken immediately in case non-compliant data is identified.
Feature Icon 2
Cross-platform eDiscovery solution
Netwrix Endpoint Protector eDiscovery scans data on Windows, macOS, and Linux endpoints for complete data protection. Administrators can choose to perform a clean DLP scan to cover all repositories or an incremental scan to start scanning from where the last scan stopped.
Feature Icon 3
Intuitive scanning setup
With a few simple steps, DLP scans can be set up based on specific time, recurrence, and entities to be included in the scan. A list with previous DLP scans is also available.
FAQ Image
What is data at rest?
Data at rest is static data stored on a hard drive, laptop, flash drive, or archived in some other way. It is inactive data that is not being transmitted across a network or actively being processed. Data at rest is a complement to the terms of data in motion and data in use which together define the three states of digital data.
What are the threats for data at rest?
Data at rest is at risk of loss, leakage, or theft. Sensitive data stored on a device or backup medium can be easily attacked if it is invisible or improperly managed. Threats for data at rest include both insider and outsider attacks - such as unauthorized employees storing sensitive data on their computers and attackers which manage to bypass the network defense and try to get a hold of the company’s records.
How to protect data at rest?
Data at rest protection refers to security procedures that help organizations ensure that stored data is not exposed to hacking or other unauthorized access. Usually, conventional antivirus software and firewalls are used to protect data at rest. Hardware encryption is another commonly used method to safeguard stored data, but it does not guarantee protection against insiders. Data Loss Prevention (DLP) solutions can help companies to mitigate insider threats by discovering sensitive data at rest and offering remediation actions such as encrypting or deleting.
What is data discovery?
Data discovery implies the identification of sensitive data such as Personally Identifiable Information (PII) and Intellectual Property (IP) for adequate protection or secure removal. It is an essential step to ensure compliance with different data protection regulations. Data discovery enables organizations to assess the complete data picture and implement security measures to prevent the loss of sensitive data.