Data In Motion triggers can control attempts to copy files to removable devices, network locations, and sync folders. They can also control files leaving your corporate network for the Internet and files arriving from the Internet. In addition, these triggers can control HTTP requests, such as attempts to post files or comments to web sites.
Data In Motion triggers can analyze such details as: the names of removable devices or printers, file names and paths or URLs, file properties, whether a file is encrypted or password-protected, and the text content of a file.
The following CA Data Protection agents use Data In Motion triggers:
Copyright © 2015 CA Technologies.
All rights reserved.
|
|