Action Driven Alerts
Are You Ready for some Action?
Action Driven Alerts provides email notification experience, so you can read and interact with security breaches without distractions. Interaction Alerts notifies security administrators about any alert-trigger interaction irrespectively to their security clearance. No matter if an action meets security rules or even attempts to breach, Action Driven Alerts helps keeping you posted.
Unauthorized actions are denied, monitored, logged and alerted
Security personnel receives action driven alerts in real-time.
With all details
Review all information about the given security incident.
Orchestrator for Desktop
Everything can be easy
On top of visual enhancements and new features integrated, Security Orchestrator's log, rule, report, audit and management display capabilities were radically enhanced. When you need a little more room for
your logs, archives, rule wizards or setups, the new Security Orchestrator layout lets you use your display
spaces more effectively and quickly navigate among them. You can rearrange, add and remove space to or
from any displayed element with ease. Moving windows from one their original location to floating state
is as easy as restoring the original layout. With its optimized Security Orchestrator surface,
Grayteq DLP enables easy-to-use security rule management, transparent security log views and analysis,
while re-organized features make Grayteq DLP the handiest Grayteq Solution ever.
in one place
Manage your data security from a single console, having all features managed, monitored and maintained single handedly.
All settings, features and functions are categorized, making navigation and selection easier.
Cover all protected info
Role-based administration (RBA) is a feature introduced in Security Orchestrator. RBA provides Grayteq security administrators with an easy way to implement the security model that allows them to assign and manage administrative permissions by assigning which actions they are able to perform using security roles, which options and system components they can manage through the Orchestrator, and which features they can access and administer. Based on their security administrative permissions, the Security Orchestrator console has been significantly enhanced to provide administrators with a streamlined view that is customized to their specific role—showing only what they need to do their job.
Gain fine-grained control over what your Grayteq administrators can see and do to your DLP system, to selected security features, resources and rules in your organization.
Categorize Your Security
In Security Orchestrator all new and old features are integrated into category views, enabling faster, more efficient and targeted browsing amongst them. Monitoring, Auditing, Endpoint Protection, Data Protection, Operation Controls and System Fine Tuning categories are easing the navigation and help you to find whatever feature you are looking for.
Save from being interrupted
Grayteq DLP locks a rule while being edited by an admin making other admins unable to interact with it. Usually an admin may interfere with another admin's work by attempting to open or modify the same rule in the same time. This interference and its possible consequences are prevented with Rule Lock.
Test Mode functionality of Grayteq DLP has been extended to all Grayteq DLP security rules.
By this extension, you can test all your security rules on your live environment without
allowing your new security rules pose any risk to your everyday operations and work.
When Test Mode is on, an orange log event shows to your security administrators, which user
actions would be denied if your current security rule would not be executed in Test Mode.
By using this enhanced testing technique, you It security personnel may test new security rules
on your live systems until they become sure that the application of the rule has the required
effect on your system. When tests are done, you can easily turn your new security rules live
by a single click.
Free Storage Space, now!
Your real-time logs consummate more storage space than you want and scheduled archiving is afar? Force interaction log archiving by a single click on the menu bar and clear-up space for interaction logs on the DLP Server.
Save Logs Regularly
Setup archiving schedules to ensure automated log archiving by archive size, number of archived elements or archive timeframe. The more regular automated archiving results the more protection on all-time logs against being lost, damaged or broken.
Host ID Priority
Prioritize Your Hosts
In host list, arrange and filter hosts by selecting primary identifier. Primary IDs can be NetBIOS, IP or DNS names. All fields can be switched on or off except the all-time first priority one.
Save Your Licenses
Revoked or unused licenses can now be transferred back to a license stash wherefrom can be re-distributed to new workstations or servers for the remaining license periods.
Remote Agent Uninstall
Unwise Installation with a Click
With appropriate Grayteq admin rights, you can now uninstall agents from remote. No more on-site agent uninstallation is needed. Just simply sit in front of the Security Orchestrator, select Agent to remove, click uninstall and Grayteq DLP does the rest.
Be backed up for all times
Backup security server config and license files. Scheduled save for the Config and License files, to ensure smooth restore in case of any system failures in one move.
Use Grayteq DLP’s own indexed and encrypted database to store your security logs, or if you run your corporate SQL, Oracle or Syslog system, then route your logs into your centrally managed third-party database system and use your own data storing and analytics method. Beware of that while Grayteq DLP’s own database system is encrypted and protected against being modified, overwritten or deleted, third-party databases are modifiable.
Supported third-party databases are:
- Microsoft SQL Server (up to SQL Server 2012 R2);
- PostgreSQL Server in unicode mode;
- PostgreSQL Server in ANSI mode;
- Oracle Database Server (10G and 11G);
Some supported SYSLOG systems:
- HP OpenView;
- IBM Tivoli;
- Cisco MARS;
- Novell Nsure Audit;
On top of setting up Positive and Negative Log Filter, Event Rule for Normal and Removable Media, Application Rule, Snapshot and Quarantine rules, Printer Rule setup were added to right-click rule creation options. Just right-click on a log event and create whatever rule you like by using the log's stored information as presets.
Millions of security-irrelevant actions happen when we work on our computers. Applications’ internal activities and calls, Windows system and network events that are necessary to fulfill the users’ interaction requests, but users have nothing to do with. For saving log storage and network broadband, Grayteq DLP decides whether the given action is relevant or not and accordingly sends it up to the Security Server, or filters it out at the moment of creation.
The assignment of your security rules into groups, makes rule assignments to new hosts a drag-and-drop-easy action. In Grayteq DLP, any rules can be combined into a rule group, no matter if they are Event Rules, Quarantines, EDTs, Encryptions or anything else. Set unique name for every rule group and manage your system the easy way.
It's Up to You.
Any user-activities, interaction or their combo may threaten your valuable data in given circumstances, or even the most harmful-alike actions can meet the upholding rules, causing no damages. Event Rule blocks unwanted activities and smoothens allowed operations. Manageable user activities and file interaction are Create, Read, Modify, Copy, Move, Copy and Paste, Drag-n-Drop, Delete, Print or Send.
Key Benefits »
Easy to set
Setup Event Rules by a couple of clicks.
Pick your choices
Include events to control, while excluded ones remain uncontrolled.
Easy to apply
Apply Event Rules on a single Host, a Host Group or on your whole system.
Narrow your controls
Make your Event Rules more specific by setting Users, Paths or Applications.
Enable additional options like Severity, Snapshot and On/Off Network application.
- Create and apply unique event rules for all known types of file interactions, users, hosts and groups also;
- Manage events by creating rules for specific file-extensions and applications;
- Use wildcardsEP1 and environmental variablesEP2 for generating general rules;
- Set severity level for each event rule from Info to Severe;
- Apply different Event Rules for various Locations;
Contact us to learn more about Event Rule »
EP1 - Wildcard is a star (*) character that can be used for replacing any character, or string.
EP2 - Environment variables are a set of dynamic named values that can affect the way running processes will behave on a computer. For example: %SystemRoot% that means C:\Windows in default windows installation.
Browse and set your apps to manage.
Sort your apps to black-, or whitelist. Manage the unlisted with graylist.
Severity, Snapshot, On/Off Network rule application and automated alert elevate your application security.