Information Security Enforcer automatically identifies and classifies source code and intellectual property. It identifies and classifies sensitive vs. open source code. It captures source code being transferred out of your network. It supports several protocols including email, HTTP/S, FTP, instant messaging and more. Our algorithms identify intellectual property and their security significance. These algorithms allow, block or send for approval identified sensitive data in real-time.