Systems and methods for preventing data loss from files sent from endpoints
First Claim
1. A computer-implemented method for data loss prevention, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- intercepting a packet sent by an application of an endpoint;
extracting file-identification information from the packet;
identifying a list of opened files;
matching the file-identification information to a file in the list of opened files;
identifying a data-loss-prevention policy that applies to the file;
filtering the packet based on the data-loss-prevention policy.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for data loss prevention may include intercepting a packet sent by an application of an endpoint. The computer-implemented method may also include extracting file-identification information from the packet. The computer-implemented method may further include identifying a list of opened files and matching the file-identification information to a file in the list of opened files. The computer-implemented method may additionally include identifying a data-loss-prevention policy that applies to the file. The computer-implemented method may moreover include filtering the packet based on the data-loss-prevention policy. Various other methods, systems, and computer-readable media are also disclosed.
33 Citations
20 Claims
-
1. A computer-implemented method for data loss prevention, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
intercepting a packet sent by an application of an endpoint; extracting file-identification information from the packet; identifying a list of opened files; matching the file-identification information to a file in the list of opened files; identifying a data-loss-prevention policy that applies to the file; filtering the packet based on the data-loss-prevention policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for data loss prevention, the system comprising:
-
an interception module programmed to; intercept a packet sent by an application of an endpoint; extract a partial filename from the packet; a matching module programmed to; identify a list of opened files; match the partial filename to a file in the list of opened files; a filtering module programmed to; identify a data-loss-prevention policy that applies to the file; filter the packet based on the data-loss-prevention policy; one or more processors configured to execute the interception module, the matching module, and the filtering module. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer-readable-storage medium comprising one or more computer-executable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
intercept a packet sent by an application of an endpoint; extract a partial filename from the packet; identify a list of opened files; match the partial filename to a file in the list of opened files; identify a data-loss-prevention policy that applies to the file; filter the packet based on the data-loss-prevention policy.
-
Specification