Data Exfiltration

Block exfiltration of personal and company data with Egress Prevent.

The impact of data exfiltration

70%

of organizations have suffered a data breach from intentional exfiltration

20%

of CISOs say intentional exfiltration keeps them awake at night 

27%

of organizations have lost data to employees moving jobs

Single incidents of intentional data exfiltration can have the greatest impact

Employees who intentionally exfiltrate data understand how to work around the policies and technical safeguards in place to steal valuable information or to inflict the most harm.

At the same time, organizations also suffer from non-malicious exfiltration from employees forwarding data and files to personal accounts to work on their own devices or print at home.

Traditional, static data loss prevention solutions, such as those provided by Microsoft 365 and secure email gateways (SEGs), are not intelligent enough to detect the subtle behavioral changes that people exhibit when exfiltrating data and prevent these incidents from occurring.

Stat Data Exfiltration

Automatically prevent data exfiltration over email

Security administrators can configure their risk appetite for data exfiltration and deploy Egress Prevent to either block activity or warn users when they are about to contravene policy or to transparently monitor user activity without end-user notification.

Solutions Data Exfiltration 1

Intelligent detection of data exfiltration over email​

  • 1 Recipient analysis to detect exfiltration attempt. AI technology analyzes recipient(s) to detect signals that this may be a personal account linked to the sender.
  • 2 Attachment analysis. Attachments are analyzed for sensitive content and verified against the intended recipient(s).
  • 3 Message body analysis. The message body is analyzed for key behavioral signals and indications of exfiltration.
Solutions Data Exfiltration 2

Admins are provided with total visibility of exfiltration attempts

  • 4 Customizable workflow. Administrators can also control and report on exfiltration incidents via a simple approve/reject workflow.
  • 5 Branded prompts and justification. End-user prompts can be fully customized and include end-user feedback and justification requests that are audited for administrator review.
Har Telemetry Dark Cropped

CISO Strategy Guide: Quishing attacks in Microsoft 365

Download guide
Solutions ATO 3

Cut through the noise to highlight the risks that matter

Reporting on threats such as data exfiltration in your email flows can be manual and slow. Even worse, systems can throw too much unnecessary information at you, making it harder to make timely and effective decisions.

Egress Prevent's intelligence platform provides simplified dashboards and critical insights so that administrators can quickly cut through the noise, identify email security risks and, where necessary, remediate.

Solutions ATO 4

Actionable intelligence

Data and analytics should not overwhelm you with information. Updated in real time, our intelligence dashboard offers insights and statistics into email details, risk levels, authentication checks, communication history, and how your people interacted with Prevent prompts.

Curious about how Egress Prevent can safeguard your organization against data exfiltration?

Australian law firm Wotton + Kearney keeps inbound and outbound email secure with Egress

"We detect and warn staff on [data] exfiltration attempt from sending emails to their personal accounts,"