This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Adding "Data Control" destinations

Hi all,

We are currently trialing Sophos, particularly for the Data Control features. However, I've run into a couple of limitations and I'm hoping someone might be able to help.

Out of the box, floppy drive, optical drive, removable storage, email clients, web browsers etc. are included, but are we able to add additional "destination is" places? Particularly I would like Sophos to pick up files that are being copied to an FTP site, being copied over SSH etc.

Has anyone had an success with this? Or is this a limitation of the feature?

Apologies if I've missed this posted somewhere else.

Any help is much appreciated!

Cheers,

Jay

:26941


This thread was automatically locked due to age.
Parents
  • Hi Jay,

    Qc has already provided a good response but I'll also add my product manager thoughts. The endpoint data control functionality is primarily designed as a education tool for end users. On the endpoint it excels at providing a relatively simple control to monitor common data exit points, checking the file content and flagging up to an end user if the content looks sensitive (the user can then make an audited call on whether to proceed or not). As a by product of this analysis data control will often uncover broken business processes or poor data management practices... and occasionally deliberate malicious mishandling or extraction of data. On the email gateway the most common use case for data control is to enforce file based encryption for sensitive data being sent out of the organization (usually deployed with an Outlook plugin that enables manual marking of files for encryption).

    We are constantly reviewing our definition of "common data exit points" and have recently added support for additional monitored applications (Chrome, Skype,Lync). We've also had quite a bit of internal discussion about cloud storage services like DropBox replacing the role of USB keys (so three years ago!) and the need to make it easier for our customers to allow controlled use of these services. So we're open - positively welcome - customer suggestions on improving what we look for and where we look for it. 

    There are tools out there that will enable you to monitor for sensitive data within FTP and SSH protocols today but they are often very expensive and complex to set up. If you have the time I'd recommend raising a request to monitor these protocols via our UTM (network security gateway) on the Astaro feature request forum: http://feature.astaro.com/forums/17359-astaro-security-gateway-feature-requests. The UTM is the place we'd be most likely to add this functionality.

    Best regards,

    John

    Product Manager

    :26957
Reply
  • Hi Jay,

    Qc has already provided a good response but I'll also add my product manager thoughts. The endpoint data control functionality is primarily designed as a education tool for end users. On the endpoint it excels at providing a relatively simple control to monitor common data exit points, checking the file content and flagging up to an end user if the content looks sensitive (the user can then make an audited call on whether to proceed or not). As a by product of this analysis data control will often uncover broken business processes or poor data management practices... and occasionally deliberate malicious mishandling or extraction of data. On the email gateway the most common use case for data control is to enforce file based encryption for sensitive data being sent out of the organization (usually deployed with an Outlook plugin that enables manual marking of files for encryption).

    We are constantly reviewing our definition of "common data exit points" and have recently added support for additional monitored applications (Chrome, Skype,Lync). We've also had quite a bit of internal discussion about cloud storage services like DropBox replacing the role of USB keys (so three years ago!) and the need to make it easier for our customers to allow controlled use of these services. So we're open - positively welcome - customer suggestions on improving what we look for and where we look for it. 

    There are tools out there that will enable you to monitor for sensitive data within FTP and SSH protocols today but they are often very expensive and complex to set up. If you have the time I'd recommend raising a request to monitor these protocols via our UTM (network security gateway) on the Astaro feature request forum: http://feature.astaro.com/forums/17359-astaro-security-gateway-feature-requests. The UTM is the place we'd be most likely to add this functionality.

    Best regards,

    John

    Product Manager

    :26957
Children
No Data