{"id":4168,"date":"2020-10-23T12:14:36","date_gmt":"2020-10-23T12:14:36","guid":{"rendered":"https:\/\/www.adlice.com\/?p=4168"},"modified":"2022-12-21T10:31:14","modified_gmt":"2022-12-21T10:31:14","slug":"roguekiller-data-leak-protection","status":"publish","type":"post","link":"https:\/\/www.adlice.com\/de\/roguekiller-data-leak-protection\/","title":{"rendered":"Introducing: RogueKiller Data Leak Protection"},"content":{"rendered":"\n<p><a href=\"https:\/\/www.adlice.com\/roguekiller\/\">RogueKiller Anti-malware<\/a> had a <strong>very efficient <a href=\"https:\/\/www.adlice.com\/ransomware-spreading-prevention\/\">Anti-Ransomware<\/a> protection<\/strong>, now we push the boundaries even further by adding a <strong>protection against Data Theft<\/strong>.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\">What is DLP, why is it important ?<\/p>\n\n\n\n<p><br>If you follow the news, you probably know Ransomware threat is still spreading, and that some of them have shifted. Some Ransomware not <em>only <\/em>encrypt data, but <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/list-of-ransomware-that-leaks-victims-stolen-files-if-not-paid\/\">they also steal the files<\/a>. <\/p>\n\n\n\n<p>After a company or an individual has been a victim of these gangs, they are asked a <strong>ransom to recover the files<\/strong>, but also to <strong>avoid them to be leaked online<\/strong>. <\/p>\n\n\n\n<p>This is mostly important for companies with industrial secrets, source code, intellectual properties or patents. If those files are given away online, the competitors could use them, and the company could be in great danger. <\/p>\n\n\n\n<p>This is why we have developed DLP, for Data Leak Prevention, in our RogueKiller Anti-malware product.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\">How do I protect myself ?<\/p>\n\n\n\n<p><br>The DLP protection is <strong>now part of the &#8220;DocLock&#8221; module<\/strong>, responsible for protecting important files from Ransomware. If you activate DocLock + DLP in <a href=\"https:\/\/www.adlice.com\/docs\/roguekiller\/getting-started\/settings\/\">protection settings<\/a>, <strong>you are protected against encryption AND theft<\/strong>. <\/p>\n\n\n\n<p>Whenever an untrusted program tries to read a file in the <a href=\"https:\/\/www.adlice.com\/docs\/roguekiller\/getting-started\/settings\/\">protected storage<\/a>, the read is blocked and a notification will inform the user.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"441\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/dlp-1024x441.png\" alt=\"roguekiller data leak protection\" class=\"wp-image-4170\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/dlp-1024x441.png 1024w, https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/dlp-300x129.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/dlp-1536x662.png 1536w, https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/dlp-2048x882.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><br>The DLP notifications can be reviewed <a href=\"https:\/\/www.adlice.com\/docs\/roguekiller\/getting-started\/history\/\">in the history<\/a>, in case you missed it. You can also, like any other protection event, <strong>add an exclusion<\/strong> if you believe the program is legit. <\/p>\n\n\n\n<p>DLP protection is <strong>available in <a href=\"https:\/\/www.adlice.com\/roguekiller\/\">RogueKiller Premium<\/a><\/strong> starting with version 14.7.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After a company is victim of a Ransomware, they are asked a ransom to recover the files and avoid them to be leaked online. This is why we have developed DLP, for Data Leak Prevention, in our RogueKiller Anti-malware product.<\/p>\n","protected":false},"author":1,"featured_media":4174,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[464],"tags":[2970,445,106,2969],"class_list":["post-4168","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","tag-data","tag-protection-2","tag-roguekiller","tag-theft","category-464","description-off"],"views":4609,"yoast_score":65,"yoast_readable":90,"featured_image_src":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/data-theft.jpg","author_info":{"display_name":"tigzy","author_link":"https:\/\/www.adlice.com\/de\/author\/tigzy\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Introducing Data Leak Protection (DLP) | RogueKiller \u2022 Adlice Software<\/title>\n<meta name=\"description\" content=\"Ransomware victims are asked a ransom to avoid files to be leaked online. Learn about Data Leak Protection for RogueKiller Anti-malware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introducing Data Leak Protection (DLP) | RogueKiller \u2022 Adlice Software\" \/>\n<meta property=\"og:description\" content=\"Ransomware victims are asked a ransom to avoid files to be leaked online. Learn about Data Leak Protection for RogueKiller Anti-malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Adlice Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RogueKiller\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-23T12:14:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-21T10:31:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/data-theft.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tigzy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:site\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"tigzy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/\"},\"author\":{\"name\":\"tigzy\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\"},\"headline\":\"Introducing: RogueKiller Data Leak Protection\",\"datePublished\":\"2020-10-23T12:14:36+00:00\",\"dateModified\":\"2022-12-21T10:31:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/\"},\"wordCount\":251,\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/data-theft.jpg\",\"keywords\":[\"data\",\"protection\",\"roguekiller\",\"theft\"],\"articleSection\":[\"Announcement\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/\",\"url\":\"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/\",\"name\":\"Introducing Data Leak Protection (DLP) | RogueKiller \u2022 Adlice Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/data-theft.jpg\",\"datePublished\":\"2020-10-23T12:14:36+00:00\",\"dateModified\":\"2022-12-21T10:31:14+00:00\",\"description\":\"Ransomware victims are asked a ransom to avoid files to be leaked online. Learn about Data Leak Protection for RogueKiller Anti-malware.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/#primaryimage\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/data-theft.jpg\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/data-theft.jpg\",\"width\":770,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.adlice.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Introducing: RogueKiller Data Leak Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.adlice.com\/#website\",\"url\":\"https:\/\/www.adlice.com\/\",\"name\":\"Adlice Software\",\"description\":\"Anti-malware and analysis tools\",\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.adlice.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.adlice.com\/#organization\",\"name\":\"Adlice Software\",\"url\":\"https:\/\/www.adlice.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"width\":276,\"height\":276,\"caption\":\"Adlice Software\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RogueKiller\",\"https:\/\/x.com\/AdliceSoftware\",\"https:\/\/fr.linkedin.com\/company\/adlice-software\",\"https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\",\"name\":\"tigzy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"caption\":\"tigzy\"},\"description\":\"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.\",\"url\":\"https:\/\/www.adlice.com\/de\/author\/tigzy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Introducing Data Leak Protection (DLP) | RogueKiller \u2022 Adlice Software","description":"Ransomware victims are asked a ransom to avoid files to be leaked online. Learn about Data Leak Protection for RogueKiller Anti-malware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/","og_locale":"de_DE","og_type":"article","og_title":"Introducing Data Leak Protection (DLP) | RogueKiller \u2022 Adlice Software","og_description":"Ransomware victims are asked a ransom to avoid files to be leaked online. Learn about Data Leak Protection for RogueKiller Anti-malware.","og_url":"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/","og_site_name":"Adlice Software","article_publisher":"https:\/\/www.facebook.com\/RogueKiller","article_published_time":"2020-10-23T12:14:36+00:00","article_modified_time":"2022-12-21T10:31:14+00:00","og_image":[{"width":770,"height":450,"url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/data-theft.jpg","type":"image\/jpeg"}],"author":"tigzy","twitter_card":"summary_large_image","twitter_creator":"@AdliceSoftware","twitter_site":"@AdliceSoftware","twitter_misc":{"Verfasst von":"tigzy","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/#article","isPartOf":{"@id":"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/"},"author":{"name":"tigzy","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d"},"headline":"Introducing: RogueKiller Data Leak Protection","datePublished":"2020-10-23T12:14:36+00:00","dateModified":"2022-12-21T10:31:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/"},"wordCount":251,"publisher":{"@id":"https:\/\/www.adlice.com\/#organization"},"image":{"@id":"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/data-theft.jpg","keywords":["data","protection","roguekiller","theft"],"articleSection":["Announcement"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/","url":"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/","name":"Introducing Data Leak Protection (DLP) | RogueKiller \u2022 Adlice Software","isPartOf":{"@id":"https:\/\/www.adlice.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/data-theft.jpg","datePublished":"2020-10-23T12:14:36+00:00","dateModified":"2022-12-21T10:31:14+00:00","description":"Ransomware victims are asked a ransom to avoid files to be leaked online. Learn about Data Leak Protection for RogueKiller Anti-malware.","breadcrumb":{"@id":"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/#primaryimage","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/data-theft.jpg","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/10\/data-theft.jpg","width":770,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/www.adlice.com\/roguekiller-data-leak-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adlice.com\/de\/"},{"@type":"ListItem","position":2,"name":"Introducing: RogueKiller Data Leak Protection"}]},{"@type":"WebSite","@id":"https:\/\/www.adlice.com\/#website","url":"https:\/\/www.adlice.com\/","name":"Adlice Software","description":"Anti-malware and analysis tools","publisher":{"@id":"https:\/\/www.adlice.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adlice.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.adlice.com\/#organization","name":"Adlice Software","url":"https:\/\/www.adlice.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","width":276,"height":276,"caption":"Adlice Software"},"image":{"@id":"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RogueKiller","https:\/\/x.com\/AdliceSoftware","https:\/\/fr.linkedin.com\/company\/adlice-software","https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ"]},{"@type":"Person","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d","name":"tigzy","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","caption":"tigzy"},"description":"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.","url":"https:\/\/www.adlice.com\/de\/author\/tigzy\/"}]}},"_links":{"self":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/posts\/4168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/comments?post=4168"}],"version-history":[{"count":0,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/posts\/4168\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/media\/4174"}],"wp:attachment":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/media?parent=4168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/categories?post=4168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/tags?post=4168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}