The CFSA applies machine policy and user policy to protect your data in the following ways:
The CFSA detects attempts to copy files onto removable devices, primarily USB flash drives, or to network locations such as shared folders, or to burn files to CD or DVD. It then applies machine policy in real time to block unauthorized saving or copying, based on the device or application being used, or the target network folder. It can also apply Data In Motion triggers to analyze files being copied—see below.
The CFSA can apply Data In Motion triggers in real time to files being copied to removable devices or network locations or burnt to CD or DVD. To do this, it channels users into using policy-enabled applications (Windows Explorer or DOS commands) to copy or burn their files by blocking other applications. It can then apply Data In Motion triggers based on a file’s properties or text content. It uses the results of policy processing to allow or block the copy operation, or simply to warn the user, or to categorize the file being copied.
Finally, it can run scheduled scans of the local hard disk and apply Data At Rest policy to targeted files. For example, it can categorize files based on their text content, and delete, replace or move unauthorized files.
| Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |