CylanceAVERT release notes
CylanceAVERT
release notesWhat's new in the management console
Feature | Description |
---|---|
Sensitive data scanning | CylanceAVERT can scan files uploaded to USB drives, internet browsers, and email attachments, as well as scan the body content of an email message for company data that the administrator defined as sensitive in the information protection policies. An email notification will be sent for data exfiltration events. |
Information protection policies | Administrators can specify the conditions that must be met to trigger the policy violation, the allowed domains for the policy, and the actions to take when a policy has been violated. See Information Protection in the BlackBerry Avert Administration and Overview Guide for more information. |
CylanceAVERT events | When the conditions are met to trigger a policy violation, information about that data exfiltration event display in the CylanceAVERT events view. The events view shows detailed information about the event including the data and time of the event, the location that the file was exfiltrated to, the number of policies that were violated, and the user of the device where the event occurred. See BlackBerry Avert Events in the BlackBerry Avert Administration and Overview guide for more information. |
Information protection settings | Administrators can use the information protection settings to configure the sensitive data that they want to monitor for by adding templates and data types to use in an information protection policy. Administrators can also define the browser and email domains that will be allowed and trusted, manage the evidence that they want to collect for data exfiltration events, and specify how long the evidence should be available. Specified email addresses can also be sent notifications of data exfiltration events. See Information protection settings in the BlackBerry Avert Administration and Overview guide for more information. |
File inventory | The CylanceAVERT file inventory creates a record of all the sensitive files in an organization through a file trawling process. See File Inventory in the BlackBerry Avert Administration and Overview Guide for more information. |
Evidence locker | Administrators can use the evidence locker to view details of the files that have been involved in exfiltration events and download the files to their local storage for auditing purposes. See Evidence locker in the BlackBerry Avert Administration and Overview guide for more information. |