Zscaler Blog

Get the latest Zscaler blog updates in your inbox

Subscribe
Products & Solutions

The Zscaler Data Protection Tour: How to Secure Key Documents

image

In this blog series, we are taking our readers on a tour of various challenges to enterprise data security. As we do so, we will detail the ins and outs of each subject, describe why they all matter when it comes to keeping sensitive information safe, and explain how your organization can thoroughly and easily address each use case with Zscaler technologies—like its cloud access security broker (CASB), data loss prevention (DLP), and more.

In each installment of this series, a brief video will accomplish the above while presenting a succinct demonstration in the Zscaler user interface, concretely showing how you can protect your data. 

Prior topics include shadow IT, risky file sharing, SaaS misconfigurations, noncorporate SaaS tenants, sensitive data leakage, and reducing DLP false positives. This blog post’s topic is:

Securing sensitive documents

Organizations handle a wealth of documents built upon various forms that regularly contain sensitive information. As an illustration, tax documents, finance forms, manufacturing specifications, and more all typically use preformatted forms. As a result, organizations need a data protection solution capable of identifying sensitive forms wherever they may appear—both at upload to the web and at rest within SaaS applications.

Zscaler Indexed Document Matching (IDM) is an advanced data classification technique that is a key part of Zscaler DLP. Admins simply create a fingerprint for the forms that they would like to detect with Zscaler’s Index Tool, and the forms’ fingerprints are uploaded to the Zscaler Zero Trust Exchange. Afterward, admins can easily configure automated DLP policies capable of identifying the forms and securing the documents that use them—wherever they go. 

To learn more about Zscaler IDM, watch the below demo.

Data Protection Features - Indexed Document Matching

Videos

Zscaler’s integrated CASB can address all of your cloud security use cases. To learn how, download the Top CASB Use Cases ebook

form submtited
Thank you for reading

Was this post useful?

Disclaimer: This blog post has been created by Zscaler for informational purposes only and is provided "as is" without any guarantees of accuracy, completeness or reliability. Zscaler assumes no responsibility for any errors or omissions or for any actions taken based on the information provided. Any third-party websites or resources linked in this blog post are provided for convenience only, and Zscaler is not responsible for their content or practices. All content is subject to change without notice. By accessing this blog, you agree to these terms and acknowledge your sole responsibility to verify and use the information as appropriate for your needs.

Get the latest Zscaler blog updates in your inbox

By submitting the form, you are agreeing to our privacy policy.