CA Data Protection

(formerly CA DataMinder™)

Prevent data loss—and control data access—in-use, in-motion, at-rest and on-access.

Protecting your IT infrastructure and the information that flows through it requires you to know where the data are located, how they are handled and their sensitivity level. CA Data Protection helps reduce data loss and misuse by controlling the information—and access to it—at every point in the system.

This data loss prevention solution—made up of CA Data Protection Endpoint, CA Data Protection Network, CA Data Protection Stored Data and CA Email Supervision—delivers data protection to help minimize the accidental, negligent and malicious misuse of data while helping your organization comply with various data protection standards and regulations.

With CA Data Protection, you’re helping your organization to define its configurable business and regulatory policies, accurately detect sensitive and unstructured data, monitor known and unknown business processes and control threats to sensitive corporate assets.

The central management platform provides an executive dashboard, detailed and customizable reporting and seamless workflow capabilities to help you guard against data loss efficiently and with a quicker time-to-value. CA Data Protection can help enable your organization to take a comprehensive approach to data loss by helping you:

  • Reduce risk to your most critical assets.
  • Control information across various enterprise locations.
  • Enable critical business processes to continue.

CA Data Protection Demo

Protect Against External Attacks & Insider Threats

CA DataMinder

CA Data Protection Demo

Take Away Documents

Key Features

  • Control data handling and access.
  • Identify various content types.
  • Enable superior detection methods.
  • Ensure enterprise scalability.

Key Benefits

  • Enable transition to cloud services.
  • Mitigate high-risk modes of communication.
  • Enable compliance with regulatory and corporate policies.

More details >

Watch the Video

Control Privileged Users and Data in the Data Center

Follow us on Twitter @CASecurity

Follow @CASecurity on Twitter >

Security Management Blog

CA Security Management Blog >