SphereShield DLP integration with other DLP vendors
Introduction
AGAT offers a DLP solution for the following UC platforms:
MS Teams
Webex Teams/Meetings
Slack
Zoom
Skype for Business on Prem (messages only)
AGAT offers its own DLP engine to inspect the traffic. This engine is the SphereShield engine.
AGAT also offers an integration with other DLP vendors including -
McAfee
Symantec
Forcepoint
Fidelis
Google
GTB
Clearswift
Having AGAT DLP as an integration with your existing DLP vendor enables you to -
Utilize your existing DLP policies. No new policies need to be configured
View incidents in your existing DLP incident manager
AGAT offers DLP in two modes
Realtime inspection - Blocks traffic from reaching the cloud
Near real-time inspection - Deletes files/messages a few seconds after reaching the destination
The real-time approach requires AGAT’s Bastion proxy to stand in-between the device and the cloud. The proxy intercepts traffic and will block violations at source.
The near real-time approach utilizes API’s to determine if a policy has been violated. If a violation occurs, the file/message will be deleted.
Topology for DLP integration
Proxy Approach
SphereShield Bastion proxy intercepts the traffic that passes through the UC platform
SphereShield Bastion Proxy send the traffic to the external DLP vendor using ICAP/Rest API protocol
SphereShield gets information from the external DLP engine as to whether this communication violates a policy
If a policy is violated the message is blocked in real-time
If a policy is not violated the traffic continues on to the cloud
API Approach
Traffic goes from device to the cloud
SphereShield uses API to get communication
SphereShield sends the traffic to the external DLP vendor using ICAP/Rest API protocol
SphereShield gets information from the external DLP engine as to whether this communication violates a policy
If a policy is violated the communication is deleted
Once the relevant components have been setup, the product needs to be configured according to your requirements.
Configuration
No configuration is needed on the external DLP vendor side. All configuration is done on the SphereShield side
Configuration on SphereShield side includes:
General configurations
Enabling DLP integration
Enabling Proxy or API approach
Selecting DLP provider
Inserting DLP ICAP Server
Inserting DLP ICAP Server port
Inserting DLP ICAP Service name
Choosing whether to enable secure ICAP. If selected, the traffic will be sent over TLS. The port in TLS is usually 11344
Configure DLP block message pattern. This is the pattern to match when the ICAP server responds that the message should be blocked
Choose whether to block or allow traffic when DLP engine is not available
Inserting a list of internal domains
Choose whether to enable DLP auditing
Choose whether to inspect files
Choose whether to inspect Audio
Configure action that proxy should take when an incident is violated. Options re to block or to monitor.
Scope Configurations
Traffic can be inspected based on the recipient. Choose when to inspect traffic based on internal, external and guest users
For MS Teams, you can configure the engine to inspect traffic from specific Teams
Notifications
Choose what Admin notifications to receive when a violation occurs. The options are : Log, IM, e-mail
Choose what end user notifications to receive when a violation occurs. The options are : IM
Image 1 - Topology for API approach
Image 2 - DLP integration configurations