Concerned about recent PAN-OS and other firewall/VPN CVEs? Take advantage of Zscaler’s special offer today

Zscaler Blog

Get the latest Zscaler blog updates in your inbox

Products & Solutions

The Zscaler Data Protection Tour: How to Secure Key Documents


In this blog series, we are taking our readers on a tour of various challenges to enterprise data security. As we do so, we will detail the ins and outs of each subject, describe why they all matter when it comes to keeping sensitive information safe, and explain how your organization can thoroughly and easily address each use case with Zscaler technologies—like its cloud access security broker (CASB), data loss prevention (DLP), and more.

In each installment of this series, a brief video will accomplish the above while presenting a succinct demonstration in the Zscaler user interface, concretely showing how you can protect your data. 

Prior topics include shadow IT, risky file sharing, SaaS misconfigurations, noncorporate SaaS tenants, sensitive data leakage, and reducing DLP false positives. This blog post’s topic is:

Securing sensitive documents

Organizations handle a wealth of documents built upon various forms that regularly contain sensitive information. As an illustration, tax documents, finance forms, manufacturing specifications, and more all typically use preformatted forms. As a result, organizations need a data protection solution capable of identifying sensitive forms wherever they may appear—both at upload to the web and at rest within SaaS applications.

Zscaler Indexed Document Matching (IDM) is an advanced data classification technique that is a key part of Zscaler DLP. Admins simply create a fingerprint for the forms that they would like to detect with Zscaler’s Index Tool, and the forms’ fingerprints are uploaded to the Zscaler Zero Trust Exchange. Afterward, admins can easily configure automated DLP policies capable of identifying the forms and securing the documents that use them—wherever they go. 

To learn more about Zscaler IDM, watch the below demo.

Zscaler’s integrated CASB can address all of your cloud security use cases. To learn how, download the Top CASB Use Cases ebook

form submtited
Thank you for reading

Was this post useful?

dots pattern

Get the latest Zscaler blog updates in your inbox

By submitting the form, you are agreeing to our privacy policy.