Welcome Xcellator

XcellSecure SM | Cloud DLP

Keeping your sensitive data out of the public domain.

Maximizing the value of a data protection program

Discover, monitor, and protect your sensitive data with XcellHost,advanced multi-OS data loss prevention

Buy Now Schedule Demo Take Tour Play Video
dlp-header
Set Rights Granularly

Device Rights can be configured globally, per group, computer, user and device. Use default settings or adjust as needed.

File Tracing

Record all file transfers or attempts to various USB storage devices, providing a clear view of users’ actions.

Device Types and Specific Device

Set rights - deny, allow, read only, etc. The rights can be applied to a type of device or can be device specific (based on VID, PID and Serial Number).

File Shadowing

Create shadow copies of files transferred to authorized devices for detailed audits

Custom Classes

Apply device rights based on Vendor ID and Product ID to make management easier for devices from the same vendor.

Offline Temporary Password

Temporarily allow device access to computers disconnected from the network. Ensure security and productivity.

Outside Hours Policies

Device Control Policies can be set to apply when outside normal working hours. Business hours start & end time and working days can be set.

Create E-mail Alerts

Get real time e-mail alerts for various events related to removable media usage on company computers.

Outside Network Policies

Get real time e-mail alerts for various events related to removable media usage on company computers.

Dashboard and Graphics

For a quick visual overview of the most import- ant events and statistics, graphics and charts are available.

Active Directory Sync

Take advantage of AD to make large deployments simpler. Keep entities up to date, reflecting the network groups, computers and users.

Reports and Analysis

Monitor all activity related to device use with a powerful reporting and analysis tool. Logs and reports can also be exported.

Users and Computers Information

Gain better visibility with information such as Employee IDs, Teams, Location, accurate contact details and more (IPs, MAC Addresses, etc.)

Exit Points Blacklists

Filters can be set based on a large list of monitored applications. USB storage devices, network shares and other exit points can be monitored.

Optical Character Recognition

Inspect content from photos and images, detecting confidential information from scanned documents and other similar files.

File Type Blacklists

File Type Filters can be used to block documents based on the true type of the file, even if users change the extension.

SIEM Integration

Leverage Security Information and Event Management products by externalizing logs. Ensure a seamless experience across security products.

Predefined Content Blacklists

Filters can be created based on predefined content such as Credit Card Numbers, Social Security Numbers and many more.

Threshold for Filters

Define the number of policy violations a file can contain for the security policy to be applied and the file transfer reported / blocked.

Custom Content Blacklists

Filters can also be created based on custom content such as keywords and expressions. Various Blacklist Dictionaries can be created.

Transfer Limit

Set a transfer limit within a specific time interval. It can be either based on the number of files or file size. E-mail alerts when the limit is reached are available.

File Name Blacklists

Filters based on file names can be created. They can be set based on the file name and extension, just the name or just the extension.

Contextual Content Scanning

Enable an advanced inspection mechanism for more accurate detection of sensitive content such as PIIs. Context customization is available.

File Location Blacklists and Whitelists

Filters based on files' location on the local HDD. These can be defined to include or exclude subfolders.

Offline Temporary Password

Temporarily allow file transfers on computers disconnected from the network. Ensure security and productivity

Regular Expressions Blacklists

A powerful tool to identify a sequence of characters that define a search pattern.

Dashboards, Reports and Analysis

Monitor activity related to file transfers with a powerful reporting and analysis tool. Get graphic reports for C level executives.

Outside Hours and Outside Network

Define and set fallback policies that will apply when outside working hours or outside the network.

Compliance (GDPR, HIPAA, etc.)

Become compliant with industry rules and regulations like PCI DSS, GDPR, HIPAA, etc. Avoid fines and other prejudices.

Domain & URL Whitelisting

Enforce company policies but allow employees the flexibility they need to do their work. Enable the DPI feature and whitelist company portals or email addresses.

DLP for Printers

Enforce company policies but allow employees the flexibility they need to do their work. Enable the DPI feature and whitelist company portals or email addresses. Policies for local and

Print Screen and Clipboard Monitoring

Revoke screen capture capabilities. Eliminate data leaks of sensitive content through Copy & Paste / Cut & Paste, enhancing the data security policy.

DLP for Thin Clients

Protect data on Terminal Servers and prevent data loss in Thin Client environments just like in any other type of network.

use cases

Device
Control

USB Lockdown
for MacOS

USB Enforced
Encryption

Content - Aware
DLP

E-discovery - Scanning
Data at Rest

Security Features Offered by Xcellhost DLP Solution

Track / Block User Activities

Track / Block User Activities

While cloud apps enable users to store, use, and transfer data from any part of the world, anywhere, it can also pave the way for data loss/breach, and that too quite simply. With Cloud DLP by Xcellhost, a business can impose strict governance on their data.

Track / Block users from –

  • Downloading documents or other files from the drive
  • Downloading email attachments from their business emails
  • Sharing files or any other data from the Google drive
  • Accessing their personal Gmail in the business network
  • Using Clipboard functions (Copy / Paste) data from Google drive
  • Printing corporate files, documents, etc. from Google Drive
  • Taking screenshots or Print screen of the business data stored on the drive

Drive Security

Take granular control and better vigilance on the data movement to and from Google Drive. Ensure no data is being used for unauthorized purposes.

  • Containerize Drive
  • Track / Block document sharing across OUs and individuals
  • Track / Block downloading files from Google Drive
  • Track / Block printing and screenshots of Google Drive data
  • Restrict / Track Copy / Paste of Google drive data, i.e. Clipboard functions

Block Personal Gmail

Restrict users from accessing their personal Gmail accounts while in the corporate network. This ensures that no data sharing occurs between a user’s personal and business Gmail accounts; also, ensure no business activity is undertaken from a personal Gmail account, which may lead to data tampering, data loss or theft.

Containerization

Where do the files get saved once they are downloaded from an email or from the drive? Usually, on the user’s PC / laptop – but what they do with these files next, you may not have any control over it! Our DLP in cloud solution helps you ensure the downloaded files are secured and do not lead to a data breach or leakage with robust Data Encryption tools.

  • Containerize Drive
  • Encrypt data from Google Drive when downloaded. Users will be able to view these files or other data only through Xcellhost Viewer App only. In case the data is transferred elsewhere, it will be nonreadable, hence safe
  • Containerize Email Attachments
  • Data encryption for email attachments on download, helps businesses control and safeguard data access. Users can view these apps on the Xcellhost Viewer app only, which further restricts them to copy or share this data anywhere off their corporate G Suite / Gmail. Attachment containerization is the best way to ensure corporate documents are secure and are non-accessible if and when shared outside the corporate Gmail
  • Containerize Outlook Attachments
  • Restrict the transfer of corporate data to unauthorized/personal places using our Outlook plug-in, which can be deployed on all users’ Outlook. Containerization by Cloud DLP ensures encryption of the attachment content so that only the authorized/intended user can read or access it

Compliance Setup & Check

Setup compliance policies and keep a check on its adherence. Design compliance policies with our pre-designed templates to best suit your needs for PCI, PHI, PII, HIPAA, and others.

  • Downloading of Documents: DLP in the cloud solution allows to set policy on downloading of the document. It means whenever someone tries to download a document stored on Google Drive, and it can easily be tracked or controlled.
  • Deletion of Document: If someone deletes any document stored on Google Drive, then this policy keeps a complete record of it. For example, who has deleted the document and which document is deleted.
  • Sharing Outside the Organization: Sharing of any document outside the organization can easily be handled by setting such policies. Moreover, the DLP solution by Xcellhost is capable of revoking the external access also.
  • Taking Screenshots: An organization can set a policy also to restrict users from taking screenshots. No one is allowed to take a screenshot of the work going on in a particular system.

It also permits the organization to define actions, which is to be taken when such type of violations are detected. For e.g., if it is found that a document is shared outside the organization, the IT can define policies to revoke the external access.

Block USB Access

Restrict users to access external USB devices to ensure no business data is being transferred for unauthorized use.

Xcellhost Cloud DLP benefits

Identical protection on-network or off

Provide the same level of security to all your users by moving your data security to the cloud. Xcellhost sits between your users and the applications they are connecting to. Cloud DLP policy follows users where they work—on- or off-network—and provides the same level of protection to all users at all times.

Full SSL inspection of all traffic

Don’t settle for partial inspection of your traffic. Around 70% of outbound traffic is encrypted and thus not subject to inspection by traditional DLP solutions. With Xcellhost , there are no capacity constraints for enabling SSL interception at scale. Xcellhost is a proxy by design, performing SSL inspection on all traffic, without the inspection limitations of appliances.

Elastic scale with inline enforcement

Make prevention, not remediation, your number-one priority. Xcellhost is architected to sit inline, so it can block sensitive information before it leaves your network—instead of being limited to damage control after data has been compromised. The Xcellhost security architecture was built in the cloud from the ground up and the service is user-based, not capacity-based, allowing your Cloud DLP inspection to scale elastically with performance guaranteed by SLAs.

Fully integrated platform service

Roll out DLP in minutes, not months. No architectural changes are needed to implement Cloud DLP because it is part of the Xcellhost Security Platform, a fully integrated security stack as a service. Xcellhost eliminates redundancies of managing various appliances, reducing the resources needed to stand up and maintain point products.

Data Protection Control Model

dlp banner

talk to our cloud expert

Cloud DLP - WHAT OUR CUSTOMERS HAVE TO SAY?

Securing my data and control and inspect data. It is easy to setup and keep up to date.

-Daniel Mehta

It has been easy to add additional servers. When I needed to restore data, it has been there.This API infrastructure gives us the capability to perform all necessary backups to disk in a period of less than 24 hours.

- tarun bhatiya

The data loss prevention part of it really helped me and my company out, I would definitely recommend this to anyone out there who is looking for a data loss prevention api. This works really well for the price it is at, really job well done by google.

-manish gaur

FREQUENTLY ASKED QUESTIONS

At times, Azure can be a very complicated platform. It can take a while to understand the entire platform comprehensively. Your IT team may need to spend hours to understand Azure completely. There are wide range of options available for Azure deployment, which can overwhelm a first-time user. Also, the Azure platform is unmanaged.

Our Microsoft-certified experts at XcellHost will help you understand the Azure platform, guiding you with all the technical nuances that come with Azure management. We will provide server management, platform management, and instance management that includes patching, OS hardening, 24/7 monitoring, automatic backup and updates, disaster recovery etc.

In short: We take care of your Azure, so that you can take care of your main business.

Even if you purchase Azure directly from Microsoft, there is a lot of technical expertise required for setup, deployment and operations of Azure. Managing Azure is very complicated without proper support. XcellHost takes care of everything from beginning to the end, leaving you completely relieved.

We are a Microsoft-certified Gold Partner with more than 14 years of experience in the industry. Many of our engineers have worked with Microsoft in the past, so you can be very sure of getting the excellent value out of it. When you sign-up with XcellHost, you don’t pay anything additional for the infrastructure. Your pricing remains the same as Microsoft.

XcellHost will be a single point of contact for all your Azure requirements. We have a dedicated team working round-the-clock to provide 24/7 support via email, phone or chat. We typically respond within an hour of raising ticket. Some cases that require attention from our engineers can take upto 24 hours. In very rare cases which require escalation to Microsoft, it may take a little longer.

Apart from our impressive track record in managed cloud services and round-the-clock support, we claim to have the lowest prices in the market.

We are Microsoft Partners with Gold competency for “Small and Midmarket Cloud Solutions” along with Silver competency in “Cloud Platform” and “Cloud Productivity.” With more than 10,000 installations spanning across 90+ countries,XcellHost is a force to reckon with in the cloud industry.

Feel free to contact us anytime:

 

Managed Azure Basic:1. Basic 24/7 Monitoring2. 1 Hour/Month Support3. No OS-Related Service Monitoring4. No I/O Monitoring Available5. No Managed Backup Available6. No Health Checks AvailableManaged Azure Advanced:1. Advanced 24/7 Monitoring2. 2 Hour/Month Support3. OS-Related Service Monitoring4. Read/Write I/O Monitoring Available5. Managed Backup Available6. Health Checks AvailableManaged Azure Basic:1. Basic 24/7 Monitoring2. 1 Hour/Month Support3. No OS-Related Service Monitoring4. No I/O Monitoring Available5. No Managed Backup Available6. No Health Checks AvailableManaged Azure Advanced:1. Advanced 24/7 Monitoring2. 2 Hour/Month Support3. OS-Related Service Monitoring4. Read/Write I/O Monitoring Available5. Managed Backup Available6. Health Checks AvailableNote: All our plans include 24/7 support via phone, chat and e-mail.

CLOUD DLP RESOURCES

Related Products & Services

Business email

Business Email

Our Business Email package comes with a storage space of 5GB per account. This is dedicated to file storage and also backs up all your mails on our state of the art infrastructure, making sure you never experience a loss of mails

Microsoft Integration_1

Microsft 365

Includes Office 365, Windows 10 & Enterprise Mobility + Security. Learn More Now. Trusted & Secure. Secure Cloud Service. Intelligent Security. Built For Teamwork. Achieve More Together.

Email signature

E-mail Signatures

Microsoft Office 365, Exchange Server and G Suite solutions for email signatures, archiving, email utilities & more.