Zgate PRODUCT OVERVIEW
Zgate is the most comprehensive data loss prevention (DLP) product available, enabling companies to monitor all forms of outbound network traffic and online communications to identify sensitive information and prevent it from leaving the network. Since its first release in 2008, Zgate has gathered than 400 thousand users.
Zecurion Zgate uses hybrid content analysis – combining digital fingerprints, Bayesian algorithms, templates, dictionaries, OCR and other techniques – to filter outbound traffic and detect confidential data with unmatched precision. Email, webmail, social networking, instant messaging and other online channels provide ample opportunity for the compromising of sensitive information, whether intentionally or through honest error.
Zgate offers a reporting and analytical module through Zecurion Reports. It supports virtualization through programs like VMware and Microsoft Hyper-V. It detects information posted on video and photo hosting services such as YouTube, Picasa, Panoramio, forums, blogs, and job search services.
Monitors social networks and instant messengers
Blocks leaks Archives e-mail
Zgate contains its own proxy server but can also be integrated with most popular proxy servers to capture and analyze most protocols, including HTTPS. This allows the blocking of sensitive information or the limiting of access to some Internet resources such as social networking.
Zgate offers full support for Outlook Web Access (OWA) and cloud environments.
Zecurion’s data loss prevention (DLP) solution is an easy-to-use system that secures confidential data at rest, in motion, at the endpoint, in the network and in the cloud. It complies with regulations. With pricing and configurations friendly to SMBs as well as large enterprises, Zecurion’s DLP is quick and easy to integrate into existing IT infrastructures. The solution supports network, endpoint and agent-based discovery functions. Zecurion is continuously developing solutions, including those addressing risk of leaks through social and mobile applications.
Minimum System Requirements
All components can be deployed on virtual machines.
Enables the full control and monitoring of all USB ports, removable media, and peripheral devices at the endpoints.
Software-based backup and server storage security solution offering transparent encryption to protect your data.
Scans all stored data in corporate networks, conceals confidential information, and determines violations of security policies.