Device Rights can be configured globally, per group, computer, user and device. Use default settings or adjust as needed.
Record all file transfers or attempts to various USB storage devices, providing a clear view of users’ actions.
Set rights - deny, allow, read only, etc. The rights can be applied to a type of device or can be device specific (based on VID, PID and Serial Number).
Create shadow copies of files transferred to authorized devices for detailed audits
Apply device rights based on Vendor ID and Product ID to make management easier for devices from the same vendor.
Temporarily allow device access to computers disconnected from the network. Ensure security and productivity.
Device Control Policies can be set to apply when outside normal working hours. Business hours start & end time and working days can be set.
Get real time e-mail alerts for various events related to removable media usage on company computers.
Get real time e-mail alerts for various events related to removable media usage on company computers.
For a quick visual overview of the most import- ant events and statistics, graphics and charts are available.
Take advantage of AD to make large deployments simpler. Keep entities up to date, reflecting the network groups, computers and users.
Monitor all activity related to device use with a powerful reporting and analysis tool. Logs and reports can also be exported.
Gain better visibility with information such as Employee IDs, Teams, Location, accurate contact details and more (IPs, MAC Addresses, etc.)
Filters can be set based on a large list of monitored applications. USB storage devices, network shares and other exit points can be monitored.
Inspect content from photos and images, detecting confidential information from scanned documents and other similar files.
File Type Filters can be used to block documents based on the true type of the file, even if users change the extension.
Leverage Security Information and Event Management products by externalizing logs. Ensure a seamless experience across security products.
Filters can be created based on predefined content such as Credit Card Numbers, Social Security Numbers and many more.
Define the number of policy violations a file can contain for the security policy to be applied and the file transfer reported / blocked.
Filters can also be created based on custom content such as keywords and expressions. Various Blacklist Dictionaries can be created.
Set a transfer limit within a specific time interval. It can be either based on the number of files or file size. E-mail alerts when the limit is reached are available.
Filters based on file names can be created. They can be set based on the file name and extension, just the name or just the extension.
Enable an advanced inspection mechanism for more accurate detection of sensitive content such as PIIs. Context customization is available.
Filters based on files' location on the local HDD. These can be defined to include or exclude subfolders.
Temporarily allow file transfers on computers disconnected from the network. Ensure security and productivity
A powerful tool to identify a sequence of characters that define a search pattern.
Monitor activity related to file transfers with a powerful reporting and analysis tool. Get graphic reports for C level executives.
Define and set fallback policies that will apply when outside working hours or outside the network.
Become compliant with industry rules and regulations like PCI DSS, GDPR, HIPAA, etc. Avoid fines and other prejudices.
Enforce company policies but allow employees the flexibility they need to do their work. Enable the DPI feature and whitelist company portals or email addresses.
Enforce company policies but allow employees the flexibility they need to do their work. Enable the DPI feature and whitelist company portals or email addresses. Policies for local and
Revoke screen capture capabilities. Eliminate data leaks of sensitive content through Copy & Paste / Cut & Paste, enhancing the data security policy.
Protect data on Terminal Servers and prevent data loss in Thin Client environments just like in any other type of network.
Content - Aware
E-discovery - Scanning
Data at Rest
While cloud apps enable users to store, use, and transfer data from any part of the world, anywhere, it can also pave the way for data loss/breach, and that too quite simply. With Cloud DLP by Xcellhost, a business can impose strict governance on their data.
Take granular control and better vigilance on the data movement to and from Google Drive. Ensure no data is being used for unauthorized purposes.
Restrict users from accessing their personal Gmail accounts while in the corporate network. This ensures that no data sharing occurs between a user’s personal and business Gmail accounts; also, ensure no business activity is undertaken from a personal Gmail account, which may lead to data tampering, data loss or theft.
Where do the files get saved once they are downloaded from an email or from the drive? Usually, on the user’s PC / laptop – but what they do with these files next, you may not have any control over it! Our DLP in cloud solution helps you ensure the downloaded files are secured and do not lead to a data breach or leakage with robust Data Encryption tools.
Setup compliance policies and keep a check on its adherence. Design compliance policies with our pre-designed templates to best suit your needs for PCI, PHI, PII, HIPAA, and others.
It also permits the organization to define actions, which is to be taken when such type of violations are detected. For e.g., if it is found that a document is shared outside the organization, the IT can define policies to revoke the external access.
Restrict users to access external USB devices to ensure no business data is being transferred for unauthorized use.
Provide the same level of security to all your users by moving your data security to the cloud. Xcellhost sits between your users and the applications they are connecting to. Cloud DLP policy follows users where they work—on- or off-network—and provides the same level of protection to all users at all times.
Don’t settle for partial inspection of your traffic. Around 70% of outbound traffic is encrypted and thus not subject to inspection by traditional DLP solutions. With Xcellhost , there are no capacity constraints for enabling SSL interception at scale. Xcellhost is a proxy by design, performing SSL inspection on all traffic, without the inspection limitations of appliances.
Make prevention, not remediation, your number-one priority. Xcellhost is architected to sit inline, so it can block sensitive information before it leaves your network—instead of being limited to damage control after data has been compromised. The Xcellhost security architecture was built in the cloud from the ground up and the service is user-based, not capacity-based, allowing your Cloud DLP inspection to scale elastically with performance guaranteed by SLAs.
Roll out DLP in minutes, not months. No architectural changes are needed to implement Cloud DLP because it is part of the Xcellhost Security Platform, a fully integrated security stack as a service. Xcellhost eliminates redundancies of managing various appliances, reducing the resources needed to stand up and maintain point products.
At times, Azure can be a very complicated platform. It can take a while to understand the entire platform comprehensively. Your IT team may need to spend hours to understand Azure completely. There are wide range of options available for Azure deployment, which can overwhelm a first-time user. Also, the Azure platform is unmanaged.
Our Microsoft-certified experts at XcellHost will help you understand the Azure platform, guiding you with all the technical nuances that come with Azure management. We will provide server management, platform management, and instance management that includes patching, OS hardening, 24/7 monitoring, automatic backup and updates, disaster recovery etc.
In short: We take care of your Azure, so that you can take care of your main business.
Even if you purchase Azure directly from Microsoft, there is a lot of technical expertise required for setup, deployment and operations of Azure. Managing Azure is very complicated without proper support. XcellHost takes care of everything from beginning to the end, leaving you completely relieved.
We are a Microsoft-certified Gold Partner with more than 14 years of experience in the industry. Many of our engineers have worked with Microsoft in the past, so you can be very sure of getting the excellent value out of it. When you sign-up with XcellHost, you don’t pay anything additional for the infrastructure. Your pricing remains the same as Microsoft.
Managed Azure Basic:
1. Basic 24/7 Monitoring
2. 1 Hour/Month Support
3. No OS-Related Service Monitoring
4. No I/O Monitoring Available
5. No Managed Backup Available
6. No Health Checks Available
Managed Azure Advanced:
1. Advanced 24/7 Monitoring
2. 2 Hour/Month Support
3. OS-Related Service Monitoring
4. Read/Write I/O Monitoring Available
5. Managed Backup Available
6. Health Checks Available
Note: All our plans include 24/7 support via phone, chat and e-mail.
XcellHost will be a single point of contact for all your Azure requirements. We have a dedicated team working round-the-clock to provide 24/7 support via email, phone or chat. We typically respond within an hour of raising ticket. Some cases that require attention from our engineers can take upto 24 hours. In very rare cases which require escalation to Microsoft, it may take a little longer.
Apart from our impressive track record in managed cloud services and round-the-clock support, we claim to have the lowest prices in the market.
We are Microsoft Partners with Gold competency for “Small and Midmarket Cloud Solutions” along with Silver competency in “Cloud Platform” and “Cloud Productivity.” With more than 10,000 installations spanning across 90+ countries,XcellHost is a force to reckon with in the cloud industry.
Feel free to contact us anytime:
Our Business Email package comes with a storage space of 5GB per account. This is dedicated to file storage and also backs up all your mails on our state of the art infrastructure, making sure you never experience a loss of mails
Includes Office 365, Windows 10 & Enterprise Mobility + Security. Learn More Now. Trusted & Secure. Secure Cloud Service. Intelligent Security. Built For Teamwork. Achieve More Together.
Microsoft Office 365, Exchange Server and G Suite solutions for email signatures, archiving, email utilities & more.