DATA LEAK PROTECTION
First Claim
1. A data leak protection method comprising:
- receiving, by a network device, information regarding a watermark filtering rule, including a sensitivity level and an action to be applied to files observed by the network device matching the watermark filtering rule;
scanning, by the network device, a file attempted to be passed through the network device, by locating a watermark embedded within the file and comparing a sensitivity level associated with the watermark to the sensitivity level of the watermark filtering rule; and
if the comparing results in a match, then performing, by the network device, the action specified by the watermark filtering rule.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for Data Leak Prevention (DLP) in an enterprise network are provided. According to one embodiment a data leak protection method is provided. A network device receives information regarding a watermark filtering rule, including a sensitivity level and an action to be applied to files observed by the network device matching the watermark filtering rule. The network device scans a file attempted to be passed through the network device by locating a watermark embedded within the file and comparing a sensitivity level associated with the watermark to the sensitivity level of the watermark filtering rule. If the sensitivity levels match, then the network device performs the action specified by the watermark filtering rule.
46 Citations
30 Claims
-
1. A data leak protection method comprising:
-
receiving, by a network device, information regarding a watermark filtering rule, including a sensitivity level and an action to be applied to files observed by the network device matching the watermark filtering rule; scanning, by the network device, a file attempted to be passed through the network device, by locating a watermark embedded within the file and comparing a sensitivity level associated with the watermark to the sensitivity level of the watermark filtering rule; and if the comparing results in a match, then performing, by the network device, the action specified by the watermark filtering rule. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory program storage device readable by a network device, tangibly embodying a program of instructions executable by one or more computer processors of the network device to perform a method of data leak protection, the method comprising:
-
receiving information regarding a watermark filtering rule, including a sensitivity level and an action to be applied to files observed by the network device matching the watermark filtering rule; scanning a file attempted to be passed through the network device, by locating a watermark embedded within the file and comparing a sensitivity level associated with the watermark to the sensitivity level of the watermark filtering rule; and if the comparing results in a match, then performing, by the network device, the action specified by the watermark filtering rule. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification