The CFSA applies machine policy and user policy to protect your data in the following ways:
The CFSA detects attempts to copy files onto removable devices, primarily USB flash drives, or to network locations such as shared folders, or to burn files to CD or DVD. It then applies machine policy in real time to block unauthorized saving or copying, based on the device or application being used, or the target network folder. It can also apply Data In Motion triggers to analyze files being copied—see below.
The CFSA can apply Data In Motion triggers in real time to files being copied to removable devices or network locations or burnt to CD or DVD. To do this, it channels users into using policy-enabled applications (Windows Explorer or DOS commands) to copy or burn their files by blocking other applications.
The CFSA can then apply Data In Motion triggers based on a file’s properties or text content. It uses the results of policy processing to allow or block the copy operation, or simply to warn the user. Alternatively, you can configure Data In Motion control actions to categorize or encrypt the file being copied.
Note: Data In Motion control actions can only encrypt files being copied to removable devices. They cannot encrypt files being copied to network locations or CD.
Finally, it can run scheduled scans of the local hard disk and apply Data At Rest policy to targeted files. For example, it can categorize files based on their text content, and delete, replace or move unauthorized files.
|
Copyright © 2012 CA.
All rights reserved.
|
|