Securing data using integrated host-based data loss agent with encryption detection
First Claim
1. A method for securing data in a computer system comprising:
- detecting attempted connection or access to a data destination to which sensitive data may be written;
determining an encryption status of the data destination;
allowing the connection or access to the data destination when the data destination is encrypted; and
taking action to secure the sensitive data when the data destination is not encrypted.
10 Assignments
0 Petitions
Accused Products
Abstract
A method and system for securing data in a computer system provides the capability to secure information even when it leaves the boundaries of the organization using a data loss agent integrated with encryption software. A method for securing data in a computer system comprises detecting attempted connection or access to a data destination to which sensitive data may be written, determining an encryption status of the data destination, allowing the connection or access to the data destination when the data destination is encrypted, and taking action to secure the sensitive data when the data destination is not encrypted.
167 Citations
30 Claims
-
1. A method for securing data in a computer system comprising:
-
detecting attempted connection or access to a data destination to which sensitive data may be written; determining an encryption status of the data destination; allowing the connection or access to the data destination when the data destination is encrypted; and taking action to secure the sensitive data when the data destination is not encrypted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer system having secure handling of data comprising:
-
a processor operable to execute computer program instructions; a memory operable to store computer program instructions executable by the processor; and computer program instructions stored in the memory and executable to implement; a data loss prevention agent to detect attempted connection or access to a data destination to which sensitive data may be written and to query encryption software for an encryption status of the data destination, allow the connection or access to the data destination when the data destination is encrypted, and take action to secure the sensitive data when the data destination is not encrypted; and encryption software to determine an encryption status of the data destination. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer program product for securing data in a computer system comprising:
-
a computer readable storage medium; computer program instructions, recorded on the computer readable storage medium, executable by a processor, for detecting attempted connection or access to a data destination to which sensitive data may be written; determining an encryption status of the data destination; allowing the connection or access to the data destination when the data destination is encrypted; and taking action to secure the sensitive data when the data destination is not encrypted. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification