The product claims to provide full control and visibility of data leaving endpoints via email, instant messaging, printed documents, USB drives and CD-ROMs along with monitoring data manipulated, copied, pasted, compressed, or encrypted.
According to Bell, if a file is re-named it will pick it up and capture the action while logging and keeping it as evidence. Furthermore, the data protection technology continues to work remotely when laptops are disconnected from the corporate network.
“Many organisations don’t know what information is confidential so we suspect many organisations will be rolling it out in monitor mode to start tagging data, said Bell.