A Data Protection Officer (DPO) is an official who is in charge of defending and securing important critical data of enterprises. The main objective of a DPO is to ensure that the personal data of all the individuals involved with a company or business is in compliance with all the stated data protection rules. A DPO is responsible for overseeing an organization's data protection strategy and its process of implementation. Keeping in mind the major responsibilities of a DPO, Endpoint Central provides an intuitive dashboard that offers an insightful view into the various vulnerabilities found in the system and network. It also provides key security measures that can be implemented to protect your data from unauthorized access and corruption throughout its lifecycle.
The DPO dashboard provides important guidelines that can protect your data from unauthorized access and corruption throughout its lifecycle. The security measures offered by Endpoint Central that can be customized according to your requirements are as follows:
You can supervise the data transmission in your network in two ways:
1. Control Incoming Data: This security feature defines strict security guidelines to monitor the data entering your network through applications, USB devices, browsers or mail clients.
The Prohibit software feature in the Inventory module will open where a list of all the prohibited software in the network will be displayed along with the auto-uninstall policies, auto-uninstall statuses, names of the systems containing the prohibited software and user requests. You can add and remove prohibited software here as per your requirements.
The Secure USB configuration module will open where you can select the devices that needs to be blocked/unblocked in the target devices in your network which can also be configured as per your requirements.
The Browser configuration module will open where you can customize the settings as per your requirements.
2. Control Outgoing Data: This security feature defines critical guidelines to monitor the data exiting your network through applications, USB devices, browsers or mail clients
Note : Refer the previous section (Control Incoming Data)to know how to configure the security settings to monitor the data leaving through applications, USB devices, browsers or mail clients.
You can also enable advanced security features by configuring the following features:
3. Secure Data: Secure the data in your network from unauthorized access, breaches and from data loss by defining rules for file folder access, share access, encryption, and securing data transmission. To configure the features to secure data, refer below:
4. Remove Unused Data: Destroy unused data to prevent breaches or compliance issues and ensure that no sensitive data is leaked when asset is retired.
To remove unused data, configure the following settings: