Zscaler, Inc.
Data owner controls in DLP
Last updated:
Abstract:
Systems and methods include receiving an index of data for exact data matching, wherein the index includes Personally Identifiable Information (PII); receiving policy related to actions to perform for any violations associated with the exact data matching; loading the index and the policy into memory; monitoring traffic for violations, wherein the violations include detection of any values in the index in the traffic; and performing an action responsive to any violations and associated policy. The action can be one of reporting the violation, blocking the traffic associated with the violation, reporting the violation and allowing the traffic associated with the violation when the violation is based on authenticated PII, allowing the traffic associated with the violation when the violation is based on authenticated PII, and a combination thereof.
Utility
30 Dec 2021
23 Jun 2022