top of page
Cellopoint_bg_phishing.png

Products/ Outbound Email DLP/ Data Loss Prevention (DLP) 

Data Loss Prevention (DLP)

Protect your confidential data with Cellopoint Data Loss Prevention (DLP) against both accidental and intentional data loss

Secure your sensitive email data with Cellopoint's DLP

Cellopoint Data Loss Prevention (DLP) is an outbound email DLP solution offering email auditing, Optical Character Recognition (OCR), and encryption. It identifies outbound emails containing confidential data and applies appropriate actions such as auditing, blocking, forwarding, notifying, or encryption to prevent data from being misdirected, leaked, or accessed by unintended individuals. Cellopoint DLP helps organizations prevent data loss, streamline risk management, and ensure regulatory compliance, whether they use cloud services such as Microsoft 365 and Google Workspace, or on-premises platforms like Exchange and Zimbra.

DLP_web_en.png

Top 1 data breach vector

Email accounted for 85% of data loss incidents in 2021

Common

More than 35% of employees have mistakenly emailed the wrong person 

Costly

$4.24 million in global losses were attributed to data breaches in 2021 

Gateway-based Outbound Email DLP

Data Protection & Compliance

Protect your sensitive data from accidental and intentional loss and ensure legal or regulatory compliance

License with Maintenance Model

Customers pay an upfront fee for first-year license access, with maintenance (renewal) fees afterward

Flexible Deployments

Deployable on on-premises hardware or VMs and public clouds like AWS, GCP, and Azure

CODLP features at a glance

DLP offers three modules: Auditing (AUD), Optical Character Recognition (OCR), and Encryption (ENC), which can be flexibly selected based on your requirements and budget. Suitable for organizations preferring to manage their own on-premises infrastructure or deploy in a public cloud.

Auditing (AUD)

Using pre-defined policies, it scans all outgoing email content and attachments in real time to identify emails containing sensitive personally identifiable information (PII) like ID numbers and credit card numbers, as well as emails containing custom keywords defined by each organization. Upon identifying a potential data loss incident, it promptly enacts an appropriate action such as blocking, notifying, or forwarding, and encryption. This helps organizations effectively monitor outbound email messages and prevent inadvertent or intentional data leaks. 

Optical Character Recognition (OCR) 

Optical Character Recognition (OCR) is an add-on OCR engine for the CODLP solution. It extracts and recognizes texts from images embedded in emails, delivering the extracted texts to Cellopoint’s policy engine for scanning. Subsequently, it enforces pre-defined DLP policies or personal information protection policies and applies appropriate actions, such as undergoing an auditing process, encrypting emails (ENC), or automatically adding digital signatures (SIG) to prevent data loss. 

The OCR engine supports image recognition for images embedded in email attachments or within email content, covering various formats and languages: 

  • Document files containing images: pdf, rtf, Microsoft Office (doc, docx, xls, xlsx, ppt, and pptx) 

  • Image files: jpg, jpeg, jpc, jpe, gif, png, bmp, tif, and tiff 

  • OCR recognition languages: English, numbers, Traditional Chinese, and Simplified Chinese 

  • Compressed files containing images: encrypted compressed files such as rar, tar, tgz, gz, gzip, bzip2, 7z, xz, and zip 

  • Deployment: Supports hardware-based appliances, allowing horizontally scaling out for multiple OCR engines, enhancing processing efficiency and response time 

Encryption (ENC)

When a DLP policy triggers encryption, COENC automatically encrypts the email to mitigate the risk of emails being transmitted in plaintext over the Internet, ensuring the secure delivery of your sensitive data and effectively preventing data loss. COENC provides four types of email encryption, including HTTPs encryption, S/MIME encryption, PDF encryption and ZIP-file encryption to encrypt data. Additionally, we provide multiple options for recipients to access an encrypted email, including providing a randomly generated password, giving the password designated by the sender or the recipient, or reading the message via a notification hyperlink.

Request a demo with an email security expert

bottom of page