fbpx
Contact us

DLP 12: KNOW MORE. RISK LESS.

People-centric approach: 360° protection from insider threats.

WHAT’S NEW?

01.

Dark theme

More interface options for a better user experience.

02.

Improved intuitive menu

Main sections list is now on top of the page, while navigation is on the left for ease of use.

03.

Enhanced policies

Quick search, editing, channels visibility, including optional DCAP Active Directory.

04.

Expanded access granularity

Access control per organizational unit (OU) enriches reports with total visibility of organization structure.

05.

Messengers under control

The system blocks messages, containing sensitive data in Telegram and Whatsapp.

ZECURION NEXT GENERATION DLP 12

MORE THAN A DATA LOSS PREVENTION

SCREEN PHOTO DETECTOR

This unique AI-based feature changes the game, stopping the insiders that were previously not being able to catch. Whenever someone tries to photograph a screen by the smartphone, Zecurion DLP immediately detects it via webcam and blocks the computer. The revolutionary technology uses 2 neural networks to ensure reliable smartphone detection and flags cybersecurity incidents in a blink of an eye (from 0.06 seconds).

STAFF CONTROL

Staff Control keeps track of working hours, logs employees' actions at workplaces, and evaluates the efficiency. The module checks the activities of personnel for compliance with corporate standards and safety policies.

  • Employee card. Each dossier contains detailed information on efficiency and activity at the workplace in dynamics. The Administrator can also review staff incidents in a convenient format.
  • Report designer with 15 indicators. Now reports include a table with fast filters, groups, and data from up to tens of thousands of PCs.
  • Resource usage and timesheets. Suggests detailed information on websites, applications running, and activity period.

INVESTIGATION WORKFLOW AUTOMATION

This module simplifies investigations and shortens the incident response cycle. It minimizes the cybersecurity team workload by providing a 360° view of actual tasks with all the statuses, data on the investigation stage, executants, and deadlines. During the investigation, cybersecurity team members can leave comments on the task and discuss progress with other participants (from CISO to analyst), attach documents and incidents as proof.

WHAT’S NEXT?

Contact us to consult with our experts, see demo or request extended presentation.