Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

WatchGuard Integrates DLP Into its UTM Platform

WatchGuard Technologies has integrated a Data Loss Prevention (DLP) solution into its Unified Threat Management (UTM) platform, in an effort to help organizations simplify compliance with regulatory standards.

WatchGuard Technologies has integrated a Data Loss Prevention (DLP) solution into its Unified Threat Management (UTM) platform, in an effort to help organizations simplify compliance with regulatory standards.

According to WatchGuard, with the newly integrated DLP features, customers can select from a pre-configured library of more than 200 rules that monitor multiple file types, standards and sensitive data. Examples of sensitive data that can be identified by the solution include credit card numbers, addresses, health information, and more.

The DLP technology scans email and web pages, along with 30 common document types including Excel, Word, Visio, PowerPoint, and PDFs.

Furthermore, for customers with a current XTM Data Loss Prevention (XTM DLP) subscription, the integrated rule sets are updated monthly to help customers stay current with data definitions and compliance mandates around the world.

“With our DLP’s broad range of pre-configured rule sets, we instantly take the risk of misconfiguration out of the equation for our customers,” said Roger Klorese, director of product management at WatchGuard. “And more importantly, because we protect against losing such a broad range of data types, we help address one of the key security concerns among customers – accidental loss from well-intentioned employees.”

According to recent research conducted by WatchGuard, 65 percent of companies said they still do not have a Data Loss Prevention solution in place, despite the potential for organizations to be penalized millions of dollars for losing sensitive data.

More information on the DLP solution is available from WatchGuard

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...