How eDiscovery Works?
Description
eDiscovery scans and identifies the confidential information in organizations’ endpoints and allows Administrators to take remediation actions like encrypting or deleting data at rest. It addresses both internal and external threats – unauthorized employees storing sensitive data on their computers and attackers which manage to bypass the network defense and try to get a hold of the company’s records
Transcript
Hi! My name is Natalie, and I am here to present you the eDiscovery module of Endpoint Protector.
The eDiscovery module is used for scanning data at rest. You can scan the files residing on the computer for sensitive content. It works based on an eDiscovery policy, where you define what you want the Endpoint Protector client to scan for. Similar to a Content Aware Policy, the sensitive data can be defined based on file type or based on content. For instance, if you want to check if an employee has any files that contain Credit Card Numbers on their computer, you will have to create an eDiscovery policy with Credit Card Numbers defined as sensitive data, and apply the policy to that user’s computer. Then, you run the scan by selecting the “Start clean scan” action. After the scan has been 100% completed, you can inspect the found items, and take remediation actions, if necessary. You can either encrypt the detected file, or delete it entirely from that computer.
That was the eDiscovery module of Endpoint Protector.
Thank you for watching!
Other data security videos
How eDiscovery Works?
eDiscovery scans and identifies the confidential information in organizations’ endpoints and allows Administrators to take remediation actions like encrypting or deleting data at rest. It addresses both internal and external threats – unauthorized employees storing sensitive data on their computers and attackers which manage to bypass the network defense and try to get a hold of the company’s records
How eDiscovery Works?
eDiscovery scans and identifies the confidential information in organizations’ endpoints and allows Administrators to take remediation actions like encrypting or deleting data at rest. It addresses both internal and external threats – unauthorized employees storing sensitive data on their computers and attackers which manage to bypass the network defense and try to get a hold of the company’s records
How eDiscovery Works?
eDiscovery scans and identifies the confidential information in organizations’ endpoints and allows Administrators to take remediation actions like encrypting or deleting data at rest. It addresses both internal and external threats – unauthorized employees storing sensitive data on their computers and attackers which manage to bypass the network defense and try to get a hold of the company’s records
How eDiscovery Works?
eDiscovery scans and identifies the confidential information in organizations’ endpoints and allows Administrators to take remediation actions like encrypting or deleting data at rest. It addresses both internal and external threats – unauthorized employees storing sensitive data on their computers and attackers which manage to bypass the network defense and try to get a hold of the company’s records
How eDiscovery Works?
eDiscovery scans and identifies the confidential information in organizations’ endpoints and allows Administrators to take remediation actions like encrypting or deleting data at rest. It addresses both internal and external threats – unauthorized employees storing sensitive data on their computers and attackers which manage to bypass the network defense and try to get a hold of the company’s records
How eDiscovery Works?
eDiscovery scans and identifies the confidential information in organizations’ endpoints and allows Administrators to take remediation actions like encrypting or deleting data at rest. It addresses both internal and external threats – unauthorized employees storing sensitive data on their computers and attackers which manage to bypass the network defense and try to get a hold of the company’s records