In the current release, CA Data Protection has extended its Data In Use protection capabilities and can now prevent unauthorized file syncing. By default, CA Data Protection can apply policy to files being synced to:
File sync providers typically provide two sync methods:
CA Data Protection provides Data In Motion protection for both file sync methods.
If the user drags a file into their sync folder in Windows Explorer, the CFSA applies machine policy in real time. Machine policy settings determine whether the file sync application is under policy control. If it is, the CFSA applies Data In Motion triggers to analyze the file being synced.
If the user uploads a file to a file sync website, the CFSA applies Data In Motion triggers immediately.
In both cases, you can configure Data In Motion triggers to block the file sync operation. Alternatively, if the user is using a file sync application, you can set up triggers to warn the user. Or you can allow the file sync operation but categorize or encrypt the file (the user must supply a decryption password).
Note: For full details about CFSA integration with file sync applications, see the Endpoint Integration Guide.
Copyright © 2015 CA Technologies.
All rights reserved.
|
|