It detects valid Social Security number ranges, as well as valid numbers of major credit cards (for example, Visa, MasterCard, and American Express) for all responses with Content-Type:text/*.įor the purpose of intensive, global data leakage prevention policy enforcement, which also inspects the content of downloaded files from the secured application or when the Content-Type header is not “text”, you can configure AppWall to forward the downloaded content to the DLP server, which supports ICAP protocol, for data leakage inspection. The SafeReply Security Filter screens outbound responses to determine if they expose sensitive information, such as credit card numbers, Social Security numbers, or custom patterns. The second rule is “inappropriate emojis” which contains a list of emoticons that could be used in a bullying or sexual harassment scenario such as, kiss, swear, in-love, heart, broken heart, hug, wink, grin, devil, head-bang, and punch.SafeReply Security Filter is one of AppWall’s security mechanisms. The first rule is “Badwords” which contains a list of profanities that would be used in a bullying or sexual harassment scenario.
#ICAP DLP FULL#
The DLP engine inspects the content going through Skype for Business IM and binary files, preventing content from exiting the network based on a set of out-of-the-box and configurable rules detecting content such as credit card numbers, social security numbers, and others.Ĭontent is scanned “on the fly” and action is taken – depending on the policy defined – blocking the full content, masking the forbidden text or notifying the DLP team.įor companies looking to prevent harassment issues among employees, SphereShield uses the DLP Rules in the AGAT DLP infrastructure which implements two separate rules that together create the Anti-harassment and Workplace Safety Policy compliance. SphereShield built-in DLP engineįor companies that do not have an existing DLP product, SphereShield offers a built-in DLP engine. This includes blocking the content, masking sensitive parts, sending an IM message warning notification to the sender, or just monitoring and alerting. The DLP module modifies the messages according to incident response from the DLP provider. In addition, SphereShield offers a built-in DLP engine for customers that do not have an existing DLP commercial solution in place.
The adapter can be configured to work with DLP commercial vendors, such as Symantec DLP or ForcePoint (Websense), or any standard DLP vendor that supports ICAP. The solution is based on a content inspection module with an adapter that is able to send the content via ICAP protocol to a DLP provider. The concept is based on a server side inspection and therefore covers all of the channels possible by Skype for Business infrastructure regardless of the client in use. Skype for Business offers a new approach for content and data transfer inspection outside the regular inspection areas of most vendors.
Preventing data leaks from going through Skype for Business is a challenging undertaking because of the variety of mobile, web and desktop clients that Skype for Business services, and because of the SIP protocol in use by the clients.
This arises from the fact that data flow between parties is very accessible and easy to use at any time, in any place, and by any device. At the same time, however, most of them fail to cover the data going through unified communication channels such as Skype for Business (Lync).Īs the usage of Skype for Business extends outside the network boundaries, enabling communication with external parties via federation meetings poses some serious security and data protection risks. By doing so, they cover the main content channels such as email and Web services. Many companies invest significant effort and resources in their Data Loss Prevention (DLP) systems.