Contact us
Free Trials
Keyvisual zum "Titel des Webinars"

Advanced Data Loss Prevention – Analyze and Visualize Data Flows in Real Time




Matrix42 GmbH

When it comes to data loss prevention, people think of anti-virus protection against malware attacks such as Emotet, etc. But more than half of all data theft is caused by people within an organization. Transparency and preventive analyses of data flows are more in demand than ever. This practical webinar will demonstrate how to analyze and visualize those data flows in real time.  

The practice shows: Many companies protect their data with a wide range of security tools. Nevertheless, most still have little insights into their actual data flows and data accesses within the network, including home offices.

Valuable knowledge is often removed undetected from within the organization on (private) USB sticks or cloud storage devices. Even worse, these data are often unencrypted, all without hackers at work. 

Daniel Döring, Technical Director Security and Strategic Alliances at Matrix42 will show you how:   

  • To get full transparency of all data flows at the push of a button. 
  • To analyze data movement and storage in real time. 
  • To know who accesses which data from where and on which device these were saved. 
  • To initiate targeted protective measures based on data flow analyses. 

... prevent your most valuable data from leaving your company (unencrypted). 

Daniel Döring Headshot
Daniel Döring

Technical Director Security and Strategic Alliances
Matrix42 GmbH

Daniel Döring has been a member of the EgoSecure team since 2007 and has thus accompanied the development of the product portfolio from the very beginning. In his role as Technical Director Security & Strategic Alliances, Daniel Döring is responsible for establishing and expanding cooperations with established manufacturers in the IT industry and is in charge of the product management of the Matrix42 security products. With his long-standing know-how he supports international customers and partners in the implementation and execution of complex IT security projects.

Watch the recording now