Safetica Auditor and DLP

Perfect overview of what is happening in your company. Safetica offers two important products in the field of data protection – Safetica Auditor and Safetica DLP.

  • Safetica Auditor

    Safetica Auditor gives you a perfect overview of what is happening in your company. It will detect low employee efficiency and alert you to data leaks in time. You will save on personnel costs, protect sensitive data and avoid wasted resources. Safetica Auditor proactively searches for potential dangers and warns you about them in time. It’s a security tool that protects your business from day one after installation.

  • Safetica DLP

    Safetica DLP (Data Loss Prevention) prevents data leakage, makes it easy to meet the legislative standards required in your industry and protects your business from human error. Safetica DLP is easy to use, fast to implement and available not only for large but also for small and medium-sized enterprises.

Safetica Auditor

Does your employees use their working time productively? Get an overview of your employees’ activity. With Safetica, you can detect any activity your employee is doing outside of their job.

Monitoring activity on company workstations:

Safetica DLP

Does your employees use their working time productively? Get an overview of your employees’ activity.

DLP is a system for detecting emerging and preventing potential data leakage from the company. Not only do we prevent sensitive data from being copied to external storage sites, we also prevent screen capture using print screens or the Snipping Tool.

Safetica Data Loss Prevention

It is implemented by an agent on the end station that integrates into the system and controls data handling.

It enables the following functions:

  • Marking sensitive files by content

    If a file contains the defined data (e.g. a birth number in a text).

  • Marking sensitive files by context

    If they are on a specific storage site (e.g. a shared drive), if they have been downloaded from a specific site (e.g. the intranet), or if they are the output of a specific application (e.g. SAP).

  • Set policies for working with marked data

    Set up zones for peripherals and objects such as USB keys, printers, network paths and objects, e-mail, Bluetooth and more.

  • DLP protocol

    Logging of work with marked data.

Safetica DLP keeps your data protected across a multitude of channels and platforms, wherever it is located

Additional features

  • Disk guarding

    Allowing or disallowing access to specific storage sites (e.g. generally disallowing access to personal OneDrive, but allowing access to OneDrive for business).

  • Device manager

    Rules for working with external devices (e.g. allowing your phone to be connected to your computer for charging, but not allowing your phone to be used as storage).

  • Supervisor

    You can restrict access to websites, applications launching or set print quotas.

Architecture and licensing

The Safetica client is installed on each protected computer (PC or Mac), so that it can be protected even when working outside the corporate network. The activity reports are uploaded to the server and the DLP rules are updated the next time it connects. Installation of the server parts requires the MS Windows Server operating system and is possible both on the physical server(s) and in a virtual environment. For smaller installations, the installation includes the MS SQL Server Express database server. For large installations, the customer needs an appropriately sized full-featured MS SQL Server. If it does not have the necessary environment, we will deliver it together with the solution. Safetica Auditor and DLP are licensed according to the number of protected endpoints. The other components of the solution are not licensed.

Safetica and IXPERTA

Safetica Technologies is a leading global manufacturer of DLP solutions based in the Czech Republic. IXPERTA is the first and long-standing implementation and sales partner for Safetica with the highest partner status – Platinum partner.

Why join forces with us

  • We address security in the context of your business

    Network security is one piece that should fit into the overall puzzle of your IT security. We can tailor it to fit the specifics needs of your company.

  • We won't let you down

    Information security is not a status that you achieve it once and are finished. We will be on hand to help you to continuously improve your security so you can face the latest types of threats.

  • We focus on real benefits

    We will design measures that are tailored to you and do not cost more than the data they are designed to protect.

Contacts

We don’t play games – we only do what we understand perfectly

Write to us

We process the information sent via the contact form in our legitimate interest, see information about data protection.

References

Trusted by companies around the world