Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

WatchGuard Integrates DLP Into its UTM Platform

WatchGuard Technologies has integrated a Data Loss Prevention (DLP) solution into its Unified Threat Management (UTM) platform, in an effort to help organizations simplify compliance with regulatory standards.

WatchGuard Technologies has integrated a Data Loss Prevention (DLP) solution into its Unified Threat Management (UTM) platform, in an effort to help organizations simplify compliance with regulatory standards.

According to WatchGuard, with the newly integrated DLP features, customers can select from a pre-configured library of more than 200 rules that monitor multiple file types, standards and sensitive data. Examples of sensitive data that can be identified by the solution include credit card numbers, addresses, health information, and more.

The DLP technology scans email and web pages, along with 30 common document types including Excel, Word, Visio, PowerPoint, and PDFs.

Furthermore, for customers with a current XTM Data Loss Prevention (XTM DLP) subscription, the integrated rule sets are updated monthly to help customers stay current with data definitions and compliance mandates around the world.

“With our DLP’s broad range of pre-configured rule sets, we instantly take the risk of misconfiguration out of the equation for our customers,” said Roger Klorese, director of product management at WatchGuard. “And more importantly, because we protect against losing such a broad range of data types, we help address one of the key security concerns among customers – accidental loss from well-intentioned employees.”

According to recent research conducted by WatchGuard, 65 percent of companies said they still do not have a Data Loss Prevention solution in place, despite the potential for organizations to be penalized millions of dollars for losing sensitive data.

More information on the DLP solution is available from WatchGuard

Advertisement. Scroll to continue reading.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.