Zscaler Blog

Erhalten Sie die neuesten Zscaler Blog-Updates in Ihrem Posteingang

Produkte & Lösungen

The Zscaler Data Protection Tour: How to Find and Stop Sensitive Data Loss


In this blog series, we are taking our readers on a tour of various challenges to enterprise data security. As we do so, we will detail the ins and outs of each subject, describe why they all matter when it comes to keeping sensitive information safe, and explain how your organization can thoroughly and easily address each use case with Zscaler technologies—like its cloud access security broker (CASB), data loss prevention (DLP), and more.

In each installment of this series, a brief video will accomplish the above while presenting a succinct demonstration in the Zscaler user interface, concretely showing how you can protect your data. 

Prior topics include shadow IT, risky file sharing, SaaS misconfigurations, and noncorporate SaaS tenants. This blog post’s topic is:

Cloud data leakage

The advent of the cloud has fueled greater enterprise productivity and collaboration, but it has also given new opportunities for sensitive data to be leaked either carelessly or maliciously. SSL can obfuscate data loss in traffic destined for the cloud, but legacy appliances are incapable of inspecting encrypted traffic at scale. Likewise, cloud resources typically house some form of previously uploaded, sensitive information, but native SaaS security measures lack the granularity to identify and protect it. Managing disjointed point products or security policies to address these challenges only serves to burden administrators by demanding more and more of their time. 

Zscaler DLP circumvents these problems by allowing administrators to configure a single policy that is enforced consistently across cloud data channels. Zscaler’s leading cloud architecture powers SSL inspection at scale, while API integrations are used to classify data at rest. Predefined and customizable DLP dictionaries and engines can identify sensitive information while considering contextual factors like user group, device, and location in policy decisions. 

To see Zscaler DLP in action, watch the demo below.

form submtited
Danke fürs Lesen

War dieser Beitrag nützlich?

dots pattern

Erhalten Sie die neuesten Zscaler Blog-Updates in Ihrem Posteingang

Mit dem Absenden des Formulars stimmen Sie unserer Datenschutzrichtlinie zu.