ITsMine’s Agentless BeyondDLP is enabling MSSPs to offer their customers a cutting edge, comprehensive MDP (Managed Data Protection) solution as a service, providing maximum protection whilst requiring minimum effort.
ITsMine’s MDP was built for MSSP as it is:
- Easy to implement – API-based (not inline) and completely AGENTLESS.
- Easy to white-label – Every part of the product is white-label friendly, from the product’s main dashboard to marketing documents or even advertisement banners.
- Easy to sell – Simple monthly subscription payment model. Marketing expenses are done in collaboration and covered by ITsMine for the first 3 months.
- Easy to manage – It automatically detects and remediates attacks with automatic responses for different vectors of attack ensures negligible false positives, meaning no additional employees needed for management and maintenance.
ITsMine’s MDP service, based on Agentless BeyondDLP offers key features such as:
Virtual Vault On-Demand: Every file storage system or folder in which the automatic tagging of files with FileGPS™ and File-Timebomb occurs, instantly transforms to become a ‘Virtual Vault’, ensuring robust, end-to-end file protection in the particular folder or section.
Access the incredible benefits of File-GPS™, no matter how files are shared – whether through MS Teams, SharePoint Online, Google Drive, DropBox or any other 3rd-party file storage system.
Each file, when used, will provide a unique identifier that will allow the company to know – Where was the file taken from? When was it taken? By whom? What additional files the same person took?
Files will “call home” whenever accessed by unauthorized parties.
File Time-Bomb™ ensures that when a file is outside company boundaries, no matter where, a policy can be easily set to have it revoke access to itself after a pre-set amount of days, defined by the organization’s security manager or team.
Employee-centric protection: Automatically detects and remediates attacks with negligible false positives, using advanced A.I-based deception techniques – planting decoy files in any sensitive file storage locations – to be used against the threat of data breaches, ransomware attacks, or unauthorized file access.
Proactive, unique and patented awareness training: for the remote and hybrid workforce, supply chain users, external contractors, and partners.