SAFETICA® - DATA LOSS PREVENTION

Protege a sua organização de perdas de dados e custos desnecessários

110m+
utilizadores

400k+
clientes empresariais

200+
países e territórios

13
centros de I&D

Safetica - Data Loss Prevention

Previne fugas de dados perigosas e dispendiosas e permite à sua organização:

Checkmark icon

Evitar todas as fugas de dados

Checkmark icon

Identifica tendências e atividades suspeitas

Checkmark icon

Poupa os custos de lidar com uma fuga de informação

Checkmark icon

Reduce personnel costs


Prevents data loss

Safetica safeguards key data inside your company. BYOD security keeps employee-owned devices under control. No data in a company’s protected zone can sneak out on these devices. Employees are prevented from utilizing key data to start their own business or give vital information to a competitor.

Safeguards misdirected files

It prevents misdirected important files from getting into the wrong hands, either inside or outside an organization and alerts management to potential dangers.

Detects attacks

Safetica identifies socially engineered attacks and blackmail attempts at the initial stages, preventing them from damaging your company.

Encrypts data to prevent misuse

Important data is protected even if laptops & thumbdrives are lost or stolen on the road. The whole disc or selected files remain encrypted and unreadable by the thief.

Manages resources

Safetica controls printer use, applications and limits excessive online activities. It identifies changes in productivity to reveal potentially dangerous trends on a timely basis.

Mitsubishi logo

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

Canon logo

protected by ESET since 2016
more than 14,000 endpoints

T-com logo

ISP security partner since 2008
2 million customer base

The Safetica difference

Comprehensive DLP solution

The capabilities of Safetica Data Loss Prevention cover a wide range of events and areas, helping your organization to stay clear of unwanted incidents.

Reporting and activity blocking

Reports all file operations, long-term trends, short-term fluctuations in activity, all websites, emails & webmails plus instant messaging, printers, screen activity and keylogging.

Data Loss Prevention events and areas

Extends to all hard drives, network file transfer, emails, SSL/HTTPS, printers, Bluetooth, CD/DVD/BluRay readers & recorders, control of Application File Access, and cloud disk detection and restriction.

Safetica scheme

1. Safetica Endpoint Client

Records actions on PCs and laptops and enforces policy rules via a small agent application (optionally hidden from the user).

2. Safetica Management Services & SQL database

Data is automatically transferred from network computers to the server. Laptop data is synchronized upon connecting to the network. Client settings are synced in reverse order.

3. Safetica Management Console

All data can be viewed or visualised from the management application. All settings and outputs can be adjusted here as well.

4. WebSafetica

Analytical tools provide an online overview of all gathered data. WebSafetica runs in every web browser, both in PC and mobile.

SAFETICA - DATA LOSS PREVENTION

Make an enquiry

Leave us your contact details to receive an offer tailored for your company´s needs. No commitment.

System Requirements

  • Safetica Endpoint Client (Agent software)
    MS Windows 7 and higher, 32-bit and 64-bit systems
  • Safetica Management Service (server component)
    MS Windows Server 2012 R2 and higher, 32-bit and 64-bit systems
  • MS SQL (server component for standard installation)
    Shared or dedicated server, MS SQL 2012 R2 and higher, eventually MS SQL 2016 Express and higher

For detailed operating system support see Product Overview (PDF).

Looking for the complete security of your network?

Related bundled solutions

ESET Targeted Attack Protection solution icon

ESET Targeted Attack Protection

  • Security Management Center
  • Endpoint Protection Platform
  • Cloud Sandbox Analysis
  • Endpoint Detection & Response
ESET Identity & Data Protection solution icon

ESET Identity & Data Protection

  • Two-factor Authentication
  • Endpoint Encryption
ESET Dynamic Mail Protection solution icon

ESET Dynamic Mail Protection

  • Security Management Center
  • Mail Security
  • Cloud Sandbox Analysis
ESET Secure Business solution icon

ESET Secure Business

  • Security Management Center
  • Endpoint Security
  • File Server Security
  • Mail Security

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

Android challenges Apple’s iOS for a higher seat in security reputation

Traditionally, Apple’s iOS built-in security features have always been regarded as light-years ahead of Android’s, but Google’s revelations have shown a few chinks in Apple’s armor.

Gamers need to know where the real fragging is happening

Hardware rigging or cloud gaming? As Google moves forward its new Stadia cloud gaming service, home gamers might be thinking again about where they can play to achieve the most fragging.

See more

We Live Security blog

Inside consumer perceptions of security and privacy in the connected home

The ESET survey polled 4,000 people to get a sense of their attitudes towards the privacy and security implications of smart home technology

Needles in a haystack: Picking unwanted UEFI components out of millions of samples

ESET experts describe how they trained a machine-learning model to recognize a handful of unwanted UEFI components within a flood of millions of harmless samples