The Check Point Solution for DLP

The Check Point Data Loss PreventionClosed Check Point Software Blade on a Security Gateway that detects and prevents the unauthorized transmission of confidential information outside the organization. Acronym: DLP. Software BladeClosed Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities. provides the ability for you to quickly configure realistic out-of-the-box detection capabilities based on expert heuristics.

However, optimal DLP must take time. To specify data prevented from transmission, you must take into account many variables, different in the context of the particular transmission, for example:

  • What type of data is it?

  • Who owns it?

  • Who is sending it?

  • Who is the intended receiver?

  • When is it being sent?

  • What is the cost if tasks are disrupted because the policy is stricter than needed?

Data Loss Prevention Features

Check Point solves the complexity of Data Loss Prevention with unique features.

  • UserCheck™ - Provides rapid response for incident handling with automated user notification and the unique Ask User mode. Each person in your organization learns best practices as needed, preventing future unintentional leaks - the vast majority of DLP incidents - and quickly handling immediate incidents. The user handles these incidents either through the DLP Self Incident Handling Portal , or through the UserCheck client.

    Without UserCheck, a security administrator, or even a security team, would have to check every email and data movement in real time and approve or reject each. For this reason, other products offer only detection of suspicious incidents. With UserCheck, the decision-making is distributed to the users. They are presented with the reason for the data capture and must provide a reason for letting it pass (if the notification did not change their minds about sending it on). User decisions (send or discard) and reasons for sending are logged. With the original message and user decisions and reasons, you can develop an effective prevention policy based on actual use.

  • MultiSpect™ - Provides unmatched accuracy in identifying and preventing incidents through multi-parameter correlation with Compound Data Types and customizable Data Types with CPcode.

  • Out of the Box Security - A rich set of pre-specified Data Types recognizes sensitive forms, templates, and data to be protected. The Data Types are enforced in an effective out-of-the-box policy.

  • Data Owner Auditing - The Data Owner is the person responsible for controlling the information and files of his or her own area in the corporation. Data Owners get timely and relevant information through automated notifications and reports that show exactly how their data is being moved. Check Point DLP gives Data Owners the information they need to handle usage issues directly related to their areas of responsibility. Without Data Owner control, the security administrator would often be placed in an awkward position between managers and employees.

  • CPcode - DLP supports fully customized data identification through the use of CPcode. You specify how data is to be matched by DLP, with the greatest flexibility possible. See the R77 versions CPcode DLP Reference Guide. .

Data Loss Prevention Benefits

Check Point DLP saves time and significantly improves ROI. Its innovative technologies provide automation that negates the need for long and costly analysis and a team for incident handling. You can now move from a detection-only policy to an accurate and effective prevention policy without bringing in outside consultants or hiring a security team.

All of this functionality is easy to manage through the SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on., in an interface similar to other Software Blades. You are not expected to be a DLP expert from the day of configuration. Check Point Data Loss Prevention guides you on how to customize and improve your DLP policy - with the Improve Accuracy flag, for example. The DLP Software Blade comes with a large number of built-in Data Types that can be quickly applied as a default policy. You can fine-tune the out-of-the-box policy to easily convert the confidentiality and integrity guidelines of your organization into automated rules. And later, you can create your own Data Types. This cycle of updating the policy, moving from a detection policy to a preventative policy, is close with the Check Point Logs & Monitor tool.

Content Awareness Software Blade

Content AwarenessClosed Check Point Software Blade on a Security Gateway that provides data visibility and enforcement. Acronym: CTNT. and Data Loss Prevention both use Data TypeClosed Classification of data in a Check Point Security Policy for the Content Awareness Software Blade.. However, they have different features and capabilities. They work independently, and the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. enforces them separately.

For more information on the Content Awareness Software Blade see the R81 Quantum Security Gateway Guide.

How DLP Works

Integrated DLP Security Gateway Configuration

In an Integrated DLP Security Gateway configuration, the Data Loss Prevention Software Blade is enabled on a Security Gateway (or a cluster). This makes it the DLP Gateway (or DLP Security Cluster). The Firewall Software Blade, and optionally, other Network Security Software Blades, are also enabled on the gateway.

If the DLP Gateway is on the perimeter, the SMTP server forwards only transmissions with destinations outside of the organization to DLP. Internal and external transmissions can be inspected by DLP if they are forwarded to DLP by the Exchange Security Agent on the Exchange Server. For external transmissions through the Exchange Security Agent the Exchange Server must have an accessible IP address to the DLP Gateway.

Dedicated DLP Gateway Configuration

Alternative Gateway Configurations

What Happens on Rule Match

The DLP Gateway captures traffic and scans it against the Data Loss Prevention policy.