Mobile agent installations include A policy engine Secondary fingerprint

Mobile agent installations include a policy engine

This preview shows page 11 - 15 out of 46 pages.

through an edge device that acts as a reverse proxy to the mobile agent. Mobile agent installations include: A policy engine Secondary fingerprint repository (the primary is on the management server) What is the integration agent? The integration agent allows third-party products to send data to Forcepoint DLP for analysis. Third parties can package the integration agent inside their own installer using simple, industry standard methods that are completely transparent to end users. When the third-party product is installed on a users system, it needs to register the integration agent with the management server. This can be done transparently through the installation process or using a command-line utility. The integration agent works on Windows Server, 64-bit machines.
Image of page 11
Overview 8 Forcepoint DLP The system treats third-party products that use the integration agent as it does any other agent. It supports all relevant views and capabilities, including: Incident Management and Reporting Quarantine and Release of emails Traffic log view Load balancing capabilities For information on configuring the integration agent, see “Configuring the integration agent” in the Forcepoint DLP Administrator Help.
Image of page 12
2 Forcepoint DLP Deployment Guide 9 Planning Forcepoint DLP Deployment Before installing Forcepoint DLP, analyze the existing resources to make a comprehensive security plan, using the following steps: 1. Deciding what data to protect , page 9 2. Determining where confidential data resides , page 11 3. Determining information flow , page 12 4. Defining the business owners for the data , page 12 5. Deciding who will manage incidents , page 12 6. Planning access control , page 12 7. Analyzing network structure , page 13 8. Planning network resources , page 14 9. Planning a phased approach , page 25 Deciding what data to protect What data does the organization need to protect? What data privacy laws, regulations, and compliance concerns and obligations does the organization have? Consider the factors described below to define the scope of what needs to be protected. Geographical factors Each region may have its own regulations or laws that require protecting various types of sensitive information, such as personal, financial, and medical data. Global enterprises may be bound to multiple laws if they have branch offices in different regions. (For example, they may have to abide by different state laws if they have offices in several different states) Industry Each type of industry may have its own laws and regulations. For example: GLBA for Finance and Banking
Image of page 13
Planning Forcepoint DLP Deployment 10 Forcepoint DLP HIPAA for Healthcare and Pharma Organizations that develop new technologies may need to protect intellectual property and trade secrets (such as designs, software code, drawings, or patent applications).
Image of page 14
Image of page 15

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture