Stop Data Leakage
Based on patent-pending proprietary technology, the Fidelis Extrusion Prevention
System®, Fidelis XPSTM,
is the only system able to identify and stop data leakages before they occur.
Organizations choose Fidelis XPS to solve their biggest data leakage
challenges--protecting intellectual property and identity information, assuring
compliance with government and industry privacy regulations, and managing
insider use of the internet.
Fidelis XPS is a network appliance available in three configurations designed to
address the most demanding network environments. In addition, choose from a
range of pre-built policies for Digital Asset Protection, Privacy Compliance and
Insider Internet Management which deliver out-of-the-box extrusion prevention
specific to your business requirements.
Fidelis XPS delivers a range of benefits, including:
* Maintain competitive advantage: Protect brand, reputation, and customer trust
by monitoring and/or preventing the leakage of valuable intellectual property
and identity information including design documents, source code, unauthorized
customer and employee data, and other proprietary information.
* Mitigate risk: Safeguard against legal issues and their costs arising out of
the unauthorized leakage of identity information, failed notification under
privacy legislation, introduction of malicious code and acceptable use
* Save IT dollars: Quickly deploy an appliance with pre-built policies that
automatically recognize sensitive information without labor-intensive data
registration or significant false positives.
* Regain control of your network: Increase availability of IT resources like
bandwidth and storage with automated granular controls that eliminate rogue
Fidelis XPS Features
1. All-Network Channels Prevention--Prevent data leakage across all
channels on all ports on the network at gigabit speeds.
2. Granularity of Control--Implement your organization's policies
regarding use of the network with an unprecedented granularity of
control--manage and monitor channels, attachments, file types and even specific
3. Pre-built Profiles--Choose from a plug-and-play suite of policies
that protect critical digital assets without data registration for fast
deployment and a lower total cost of ownership.
4. Smart Identity Profiling
TM--Accurately recognize identity information
without labor-intensive data registration. This powerful profiling and
validation engine minimizes the occurrence of both false positives and false
negatives resulting in fast deployment and easy maintenance.
5. Enterprise-Architecture Friendly--Speed implementation with an
appliance that fits seamlessly into existing IT infrastructure with minimal
impact, requiring no configuration changes to network devices, servers or
desktops. A web-based console provides the ability to manage and monitor from a
Click here for the