Introduction
/
Entities & Terms to Know
Introduction
/
Entities & Terms to Know
Introduction
/
Entities & Terms to Know

Introduction

Entities and Terms You Should Know

Written by

Toni Barthel

Published

Oct 6, 2024

Introduction

Entities and Terms You Should Know

Written by

Toni Barthel

Published

Oct 6, 2024

Introduction

Entities and Terms You Should Know

Written by

Toni Barthel

Published

Oct 6, 2024

Welcome to the “Entities and Terms You Should Know” section! Here, we define key concepts and terminology used throughout the 1Protection.AI documentation to ensure you have a clear understanding of the solution's functionality. From core detection mechanisms to configuration options, these definitions will help you navigate the documentation and make the most of 1Protection.AI’s powerful Data Loss Prevention (DLP) and Data Leak Protection capabilities.


Core Terms and Entities

  1. Data Loss Prevention (DLP): DLP is a security measure that prevents sensitive data from being lost, whether through accidental deletion, unauthorized modification, or other data mishandling. DLP capabilities within 1Protection.AI protect against unintentional or unauthorized data removal, keeping critical information secure.

  2. Data Leak Protection: This function focuses on preventing sensitive information from being exposed or shared inappropriately. Data Leak Protection is essential for ensuring that sensitive data does not leave the organization or enter unauthorized environments.

  3. Regex (Regular Expression): Regex is a pattern-matching syntax used to detect specific text patterns within data, such as email addresses, financial account numbers, or personal identifiers. In 1Protection.AI, regex-based detection scans for predefined patterns to identify structured data that fits a specific format.

  4. Machine Learning (ML) Algorithms: Machine learning algorithms within 1Protection.AI complement regex-based detection by identifying less structured or complex patterns in data. ML algorithms help detect potentially sensitive information that may not follow a standard format, adapting continuously to new data patterns and emerging threats.

  5. Policies: Policies are customizable rules within 1Protection.AI that define what constitutes a data security violation. Policies allow you to specify which types of data need protection, the level of sensitivity to apply, and the actions to take if a violation is detected. Policies are a central element in tailoring 1Protection.AI to meet your organization’s specific security needs.

  6. Detectors: Detectors are predefined components that recognize specific types of sensitive data. Examples of detectors include patterns for identifying IBANs, social security numbers, credit card details, user credentials, and other sensitive information. Detectors act as the building blocks for creating Detection Rules and policies, providing targeted protection for specific data types.

  7. Detection Rules: Detection rules are combinations of one or more detectors that create actionable conditions for data monitoring. Detection rules allow you to set more complex conditions for when 1Protection.AI should trigger a security response. For instance, a detection rule might require a combination of a credit card number and user credentials to flag potential financial data exposure.

  8. Violations: A violation occurs when 1Protection.AI identifies data that breaches the policies you have set. Violations are instances of potential security risks or policy breaches, such as unauthorized data sharing or attempted access to restricted information. Violations trigger alerts and can be viewed and managed within the Violations section of the platform.

  9. Findings: Findings are individual instances of detected data patterns that contribute to violations. Findings are the pieces of information identified by detectors that match specified patterns, such as an email address or account number. Findings are logged within a violation to give a detailed view of what data was detected and why it triggered an alert.

  10. Alert: An alert is a notification generated by 1Protection.AI when a violation or potential security incident is detected. Alerts help keep your team informed in real-time about data risks, allowing for quick response and mitigation. Alerts can be customized based on priority, severity, and delivery method (e.g., through integrated tools like Teams or email).

  11. Entities: In 1Protection.AI, "entities" refers to data types or attributes that can be detected, such as usernames, passwords, account numbers, or PII (Personally Identifiable Information). Entities can be configured as detectors to focus on specific data elements that are essential to your organization’s data security.

  12. Integration: Integrations connect 1Protection.AI with external tools and platforms, making it easier to implement and monitor DLP and data leak protection within your existing workflow. Integration options include asynchronous tools like Outlook or Teams and synchronous tools like browser extensions, providing flexibility in how data security is managed across your ecosystem.

  13. Dashboard: The dashboard is the central hub within 1Protection.AI where you can view an overview of security metrics, recent alerts, policy enforcement, and other essential security information. The dashboard provides a real-time snapshot of your organization’s data security status, giving you quick access to key insights and incident summaries.

  14. Tenant: In multi-user organizations, a tenant refers to the dedicated space within 1Protection.AI where all security configurations, users, policies, and data insights are managed. Each tenant is a unique account environment, enabling organizations to manage their data security independently and securely.

  15. Asynchronous and Synchronous Integrations: Asynchronous integrations, like those with email and chat applications, provide alerts and insights that don’t require continuous monitoring, while synchronous integrations, such as browser extensions, operate in real-time, actively scanning data as users interact with platforms.

  16. Subscription: The subscription refers to the plan or level of service your organization has selected within 1Protection.AI. Subscription details include access to features, usage limits, and billing options. Subscriptions can be managed through the platform’s Manage section, where you can also modify your plan or adjust user access.

  17. User Roles and Permissions: 1Protection.AI allows you to assign roles and permissions to control who can view, edit, and manage specific areas of the platform. Roles help ensure that only authorized personnel can configure security settings or respond to alerts, enhancing the overall security and management structure.


Using These Terms in 1Protection.AI

These terms form the foundation of 1Protection.AI’s functionality, allowing you to build a highly customizable and responsive data protection strategy. As you create policies, define detection rules, and manage violations, understanding these entities will help you make informed decisions about how to best secure your organization’s data.

Should you need additional clarification, our support team is always available to answer questions and provide guidance. Familiarizing yourself with these terms will help you maximize the benefits of 1Protection.AI, empowering you to protect sensitive data effectively and confidently.