SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
E-Guide
INTRODUCTION
TO DATA LOSS
PREVENTION
TOOLS
▲
SearchSecurity
PAG E 2 O F 11 SP ONSORED BY
Home
Introduction to data
loss prevention
products
INTRODUCTION TO DATA LOSS PREVENTION TOOLS
data loss prevention (DLP)strategyisn’t
something to be taken lightly: its cost,
impact on process, and responsibility for
keepinganenterprise’sdatasecurecannot
beunderstatedasdatabecomesmoreaccessibleandmobile.Inthis
e-guide discover what it means for security for data to be in use, in
motion, and at rest; how DLP works in a standalone vs. integrated
context; the DLP learning curve; and more.
A
PAG E 3 O F 11 SP ONSORED BY
Home
Introduction to data
loss prevention
products
INTRODUCTION TO DATA LOSS PREVENTION TOOLS
INTRODUCTION TO DATA LOSS PREVENTION PRODUCTS
Bill Hayes, Cybersecurity analyst and writer
We are living in a time when sensitive information flows seamlessly through-
out organizations and out to employees across the globe. Unfortunately, this
data can wind up in the hands of unintended recipients, who can then cherry-
pick the data for their own profit. While the threat of malicious insiders is a
valid concern, equally grave data exposures occur through poorly understood
businessprocessesthatuseinsecureprotocolsandprocedures,andwhenem-
ployees do not practice secure data handling.
Tosolvetheseproblems,datalossprevention(DLP)toolshelpidentifyand
plug information leaks before they negatively impact organizations.
Most organizations have some kind of classification scheme intended to
identify the kinds of data they use. Once categorized, the appropriate controls
canthenbeappliedtomonitorandcontroldataaccess,transportationandstor-
age. In the days when businesses stored information on paper and microfilm,
controls such as printed access rosters, security guards, locked filing cabinets
and combination safes prevented unauthorized access and dissemination.
PAG E 4 O F 11 SP ONSORED BY
Home
Introduction to data
loss prevention
products
INTRODUCTION TO DATA LOSS PREVENTION TOOLS
With data mostly reduced to digital form nowadays, companies have to use
special software to detect data theft while maintaining these older security
controls (as long as paper or microfilm records still exist).
DLP: DATA IN USE, IN MOTION, AT REST
Dependingontheiruse,DLPtoolscandetectandblockthepotentialexposure
of sensitive information while in use, in motion or at rest.
Data in use is data that is being processed, is in memory and may be
presentintemporaryfiles.Itposesadangerifinsecureendpointdevices
are processing the data or may be routing it to unapproved storage or
unapproved remote locations.
Data in motion is data traveling across a network in a point-to-point
transaction.Thedangerhereliesindatatransactionsthatmaytakesen-
sitiveinformationbeyondtheorganization'sperimeterortounintended
printouts or storage media.
PAG E 5 OF 11 SP ONSORED BY
Home
Introduction to data
loss prevention
products
INTRODUCTION TO DATA LOSS PREVENTION TOOLS
Data at rest is data that is stored in digital form in persistent (not tem-
porary)files,andcanincludeend-userfilesanddatabaseslocatedonfile
servers, backup tapes, SAN storage and portable media.
Datalosspreventioncanensureendusersdon'tsendsensitiveinformation
outsidetheirorganization'snetworkormoveitfromsecuretoinsecurestorage.
WhileDLPproductsdoaddresstheinsiderthreat,theyarealsoveryusefulasa
technicalcontroltopreventtheinadvertentexposureofsensitiveinformation
bypersonsunfamiliarwithitsvalueortheproperwaytoprocess,transmitand
store sensitive information.
HOW DLP WORKS: STANDALONE VS. INTEGRATED
DLP products are designed to detect sensitive information as it is accessed
by endpoint devices like desktops and mobile devices, as it lies dormant on a
file server in forgotten documents, and as it moves through an organization's
networks using any number of protocols. DLP tools address the problems of
sensitive data usage, movement and storage based on an organization's un-
derstanding of what it wants to protect and where the data is allowed at any
moment.
PAG E 6 OF 11 SP ONSORED BY
Home
Introduction to data
loss prevention
products
INTRODUCTION TO DATA LOSS PREVENTION TOOLS
Standalone DLP products can reside on specialized appliances or can be
sold as software to be installed on the enterprise's own hardware. They are
specialized and only address data loss prevention. A full soup-to-nuts DLP
product monitors data at rest using a file scanning engine. It also features a
networkappliancetomonitordataintransitoveracompany’snetworkon
many network protocols.
An endpoint agent detects sensitive information in memory, during print-
ing attempts, copying to portable media or exiting through network protocols.
Theagentsmayalsobeabletodetectsensitiveinformationatrestbyscanning
files found on endpoint logical drives.
Standalone DLP products also provide some manner of management con-
sole,areportgenerator,apolicymanager,adatabasetostoresignificantevents
andaquarantineserverorfoldertostorecapturedsensitivedata.Thereisalso
usually a method to build custom detection policies.
Integrated DLP features, by contrast to standalone DLP, are usually found
on perimeter security gateways such as Web or email security gateways, in-
trusion detection systems/intrusion prevention systems, endpoint security
suitesandunifiedthreatmanagementproducts.Dependingontheirmainfunc-
tions, these products are most useful at detecting sensitive data in motion and
PAG E 7 O F 11 SP ONSORED BY
Home
Introduction to data
loss prevention
products
INTRODUCTION TO DATA LOSS PREVENTION TOOLS
sensitive data in use. Vulnerability scanners, for example, usually have DLP
plug-ins to detect sensitive data at rest, such as Social Security numbers.
Unlike the convenience of having a standalone DLP product, security
products with integrated DLP from different vendors do not share the same
management consoles, policy management engines and data storage. That
means an organization's DLP capability may end up being scattered among
severaldifferenttypesofsecurityproducts.Quarantinefunctions,iftheyexist,
are handled through different management interfaces as well. Any attempt to
correlate DLP events will have to be handled through a security information
management (SIEM) system or a separate data correlation engine.
DLP'S USEFULNESS
DLP tools are especially useful to organizations that have sensitive data with
a long shelf life, such as financial data, health insurance data or intellectual
property. Government agencies, universities, RD labs and technology com-
panies are fertile grounds for cyber-espionage. Banks, retail, e-commerce and
financialorganizationscertainlyhavemuchtoloseaswell.Whilehealthinsur-
ancemightseemtobethedomainofmedicalandinsuranceorganizations,any
organizationthatself-administerscompanyhealthinsuranceplanscouldalso
PAG E 8 OF 11 SP ONSORED BY
Home
Introduction to data
loss prevention
products
INTRODUCTION TO DATA LOSS PREVENTION TOOLS
be a target.
Sure, when DLP is mentioned, protecting credit card numbers comes to
mind. While credit card numbers are in demand by cybercriminals, the shelf
life for a credit card on underground websites is usually only a few days before
its use has been detected, however. The average price for a stolen U.S. credit
cardonRussiancybercrimeforumsdeclinedfrom$3in2011toadollarin2013.
By contrast, stolen healthcare records may get up to $10 per record.
Cybercriminals target medical records because of their shelf life, and the
theft of them may not be immediately detected. These records are sources
of patient names, insurance policy numbers, diagnosis codes and personally
identifiable information. Cybercriminals can use this data to buy medical
equipmentorprescriptiondrugsthatcanthenberesold.Additionally,theycan
create false identities to file false claims with health insurers.
THE DLP LEARNING CURVE
DLP tools often come with pre-defined policies to help detect sensitive data
types, such as intellectual property, personally identifiable information, pro-
tected health information, Social Security numbers and payment card infor-
mation. In practice, since each organization has different ways of expressing
PAG E 9 OF 11 SP ONSORED BY
Home
Introduction to data
loss prevention
products
INTRODUCTION TO DATA LOSS PREVENTION TOOLS
processing and storing information, a fair amount of customization is needed
to accurately detect them and thus prevent data compromise.
Giventhislevelofcomplexity,cybersecuritystaffchargedwithDLPsystem
administrationandanalysisfacesasignificantcurveinlearninghowtoconfig-
ureandemployDLPtechnology.FormalDLPapplicationtrainingisbeneficial
and working knowledge of Regular Expression parsing is highly useful. Ad-
ditionally, DLP staff should meet with business process owners to learn about
each type of sensitive data and what forms and formats it might take.
DLP DECISIONS
BeforebuyingastandaloneDLPproduct,organizationsshouldassesscurrently
owned cybersecurity products to see what DLP features are present and how
they can be used either to supplement or replace a standalone DLP product.
The price for a standalone DLP product, which is not insignificant, should be
weighedagainstthelaborandadditionalproductsrequiredtotransformanar-
ray of currently deployed security products with integrated DLP features into
a coherent DLP protection suite.
Enterprise-levelDLPproductsareusuallypricedwithlargerorganizations
in mind or companies with high risks and onerous compliance requirements.
PAG E 10 O F 11 SP ONSORED BY
Home
Introduction to data
loss prevention
products
INTRODUCTION TO DATA LOSS PREVENTION TOOLS
Smaller firms with lighter purses might want to consider the integrated DLP
route,providedtheyhavethecriticalmassofintegratedDLPproductsalready
at hand.
In either case, DLP projects can demand significant investment of re-
sources,suchasITskills,hardware,storageresourcesand--ofcourse--dollars.
PAG E 11 OF 11 SP ONSORED BY
Home
Introduction to data
loss prevention
products
INTRODUCTION TO DATA LOSS PREVENTION TOOLS
FREE RESOURCES FOR TECHNOLOGY PROFESSIONALS
TechTarget publishes targeted technology media that address
yourneedforinformationandresourcesforresearchingprod-
ucts, developing strategy and making cost-effective purchase
decisions. Our network of technology-specific Web sites gives
youaccesstoindustryexperts,independentcontentandanaly-
sis and the Web’s largest library of vendor-provided white pa-
pers, webcasts, podcasts, videos, virtual trade shows, research
reports and more —drawing on the rich RD resources of technology providers to address
market trends, challenges and solutions. Our live events and virtual seminars give you ac-
cess to vendor neutral, expert commentary and advice on the issues and challenges you
face daily. Our social community IT Knowledge Exchange allows you to share real world
information in real time with peers and experts.
WHAT MAKES TECHTARGET UNIQUE?
TechTarget is squarely focused on the enterprise IT space. Our team of editors and net-
workofindustryexpertsprovidetherichest,mostrelevantcontenttoITprofessionalsand
management. We leverage the immediacy of the Web, the networking and face-to-face op-
portunitiesofeventsandvirtualevents,andtheabilitytointeractwithpeers—alltocreate
compellingandactionableinformationforenterpriseITprofessionalsacrossallindustries
and markets.

Mais conteúdo relacionado

Mais procurados

Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Groupaengelbert
 
2010 za con_stephen_kreusch
2010 za con_stephen_kreusch2010 za con_stephen_kreusch
2010 za con_stephen_kreuschJohan Klerk
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage PresentationMike Spaulding
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...Andris Soroka
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPandreasschuster
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteVCW Security Ltd
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpValery Boronin
 
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónBe Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónSymantec LATAM
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 

Mais procurados (20)

Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
 
2010 za con_stephen_kreusch
2010 za con_stephen_kreusch2010 za con_stephen_kreusch
2010 za con_stephen_kreusch
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security Suite
 
DLP
DLPDLP
DLP
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can Help
 
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónBe Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 

Semelhante a Introduction to Data Loss Prevention Tools: An Overview

Protect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionProtect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionAdi Saputra
 
Protect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPProtect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPAdi Saputra
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDMGreg Cranley
 
Clearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionClearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionCIO Look Magazine
 
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.Ravtach Solutions
 
DLP Solutions Protection | Seclore
DLP Solutions Protection |  SecloreDLP Solutions Protection |  Seclore
DLP Solutions Protection | SecloreSeclore
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksEmmanuel Oshogwe Akpeokhai
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
data-leakage-prevention
 data-leakage-prevention data-leakage-prevention
data-leakage-preventionanuepcet
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint securityhassan latifi
 
Seclore for Forcepoint DLP
Seclore for Forcepoint DLPSeclore for Forcepoint DLP
Seclore for Forcepoint DLPSeclore
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptxTranVu383073
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyStorage Switzerland
 

Semelhante a Introduction to Data Loss Prevention Tools: An Overview (20)

Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 
Protect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionProtect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak prevention
 
Protect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPProtect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLP
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDM
 
Clearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionClearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat Protection
 
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
 
DLP Solutions Protection | Seclore
DLP Solutions Protection |  SecloreDLP Solutions Protection |  Seclore
DLP Solutions Protection | Seclore
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
data-leakage-prevention
 data-leakage-prevention data-leakage-prevention
data-leakage-prevention
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint security
 
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
 
How Data Loss Prevention Works.pdf
How Data Loss Prevention Works.pdfHow Data Loss Prevention Works.pdf
How Data Loss Prevention Works.pdf
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
 
Seclore for Forcepoint DLP
Seclore for Forcepoint DLPSeclore for Forcepoint DLP
Seclore for Forcepoint DLP
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 

Mais de Abhishek Sood

The future of enterprise management
The future of enterprise management The future of enterprise management
The future of enterprise management Abhishek Sood
 
Gain new visibility in your DevOps team
 Gain new visibility in your DevOps team Gain new visibility in your DevOps team
Gain new visibility in your DevOps teamAbhishek Sood
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metricsAbhishek Sood
 
Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits Abhishek Sood
 
3-part approach to turning IoT data into business power
 3-part approach to turning IoT data into business power 3-part approach to turning IoT data into business power
3-part approach to turning IoT data into business powerAbhishek Sood
 
How a bad HR dept. can lose $9M
 How a bad HR dept. can lose $9M How a bad HR dept. can lose $9M
How a bad HR dept. can lose $9MAbhishek Sood
 
Big news coming for DevOps: What you need to know
 Big news coming for DevOps: What you need to know Big news coming for DevOps: What you need to know
Big news coming for DevOps: What you need to knowAbhishek Sood
 
Microservices best practices: Integration platforms, APIs, and more
 Microservices best practices: Integration platforms, APIs, and more Microservices best practices: Integration platforms, APIs, and more
Microservices best practices: Integration platforms, APIs, and moreAbhishek Sood
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performanceAbhishek Sood
 
Why adopt more than one cloud service?
 Why adopt more than one cloud service? Why adopt more than one cloud service?
Why adopt more than one cloud service?Abhishek Sood
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --SymantecAbhishek Sood
 
How to integrate risk into your compliance-only approach
 How to integrate risk into your compliance-only approach How to integrate risk into your compliance-only approach
How to integrate risk into your compliance-only approachAbhishek Sood
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use casesAbhishek Sood
 
How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management Abhishek Sood
 
API-led connectivity: How to leverage reusable microservices
 API-led connectivity: How to leverage reusable microservices API-led connectivity: How to leverage reusable microservices
API-led connectivity: How to leverage reusable microservicesAbhishek Sood
 
How to create a secure high performance storage and compute infrastructure
 How to create a secure high performance storage and compute infrastructure How to create a secure high performance storage and compute infrastructure
How to create a secure high performance storage and compute infrastructureAbhishek Sood
 
Enterprise software usability and digital transformation
Enterprise software usability and digital transformationEnterprise software usability and digital transformation
Enterprise software usability and digital transformationAbhishek Sood
 
Transforming for digital customers across 6 key industries
 Transforming for digital customers across 6 key industries Transforming for digital customers across 6 key industries
Transforming for digital customers across 6 key industriesAbhishek Sood
 
Authentication best practices: Experts weigh in
Authentication best practices: Experts weigh inAuthentication best practices: Experts weigh in
Authentication best practices: Experts weigh inAbhishek Sood
 
Tips --Break Down the Barriers to Better Data Analytics
Tips --Break Down the Barriers to Better Data AnalyticsTips --Break Down the Barriers to Better Data Analytics
Tips --Break Down the Barriers to Better Data AnalyticsAbhishek Sood
 

Mais de Abhishek Sood (20)

The future of enterprise management
The future of enterprise management The future of enterprise management
The future of enterprise management
 
Gain new visibility in your DevOps team
 Gain new visibility in your DevOps team Gain new visibility in your DevOps team
Gain new visibility in your DevOps team
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metrics
 
Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits
 
3-part approach to turning IoT data into business power
 3-part approach to turning IoT data into business power 3-part approach to turning IoT data into business power
3-part approach to turning IoT data into business power
 
How a bad HR dept. can lose $9M
 How a bad HR dept. can lose $9M How a bad HR dept. can lose $9M
How a bad HR dept. can lose $9M
 
Big news coming for DevOps: What you need to know
 Big news coming for DevOps: What you need to know Big news coming for DevOps: What you need to know
Big news coming for DevOps: What you need to know
 
Microservices best practices: Integration platforms, APIs, and more
 Microservices best practices: Integration platforms, APIs, and more Microservices best practices: Integration platforms, APIs, and more
Microservices best practices: Integration platforms, APIs, and more
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
 
Why adopt more than one cloud service?
 Why adopt more than one cloud service? Why adopt more than one cloud service?
Why adopt more than one cloud service?
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 
How to integrate risk into your compliance-only approach
 How to integrate risk into your compliance-only approach How to integrate risk into your compliance-only approach
How to integrate risk into your compliance-only approach
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use cases
 
How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management
 
API-led connectivity: How to leverage reusable microservices
 API-led connectivity: How to leverage reusable microservices API-led connectivity: How to leverage reusable microservices
API-led connectivity: How to leverage reusable microservices
 
How to create a secure high performance storage and compute infrastructure
 How to create a secure high performance storage and compute infrastructure How to create a secure high performance storage and compute infrastructure
How to create a secure high performance storage and compute infrastructure
 
Enterprise software usability and digital transformation
Enterprise software usability and digital transformationEnterprise software usability and digital transformation
Enterprise software usability and digital transformation
 
Transforming for digital customers across 6 key industries
 Transforming for digital customers across 6 key industries Transforming for digital customers across 6 key industries
Transforming for digital customers across 6 key industries
 
Authentication best practices: Experts weigh in
Authentication best practices: Experts weigh inAuthentication best practices: Experts weigh in
Authentication best practices: Experts weigh in
 
Tips --Break Down the Barriers to Better Data Analytics
Tips --Break Down the Barriers to Better Data AnalyticsTips --Break Down the Barriers to Better Data Analytics
Tips --Break Down the Barriers to Better Data Analytics
 

Último

Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseribangash
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 

Último (20)

Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 

Introduction to Data Loss Prevention Tools: An Overview

  • 2. PAG E 2 O F 11 SP ONSORED BY Home Introduction to data loss prevention products INTRODUCTION TO DATA LOSS PREVENTION TOOLS data loss prevention (DLP)strategyisn’t something to be taken lightly: its cost, impact on process, and responsibility for keepinganenterprise’sdatasecurecannot beunderstatedasdatabecomesmoreaccessibleandmobile.Inthis e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more. A
  • 3. PAG E 3 O F 11 SP ONSORED BY Home Introduction to data loss prevention products INTRODUCTION TO DATA LOSS PREVENTION TOOLS INTRODUCTION TO DATA LOSS PREVENTION PRODUCTS Bill Hayes, Cybersecurity analyst and writer We are living in a time when sensitive information flows seamlessly through- out organizations and out to employees across the globe. Unfortunately, this data can wind up in the hands of unintended recipients, who can then cherry- pick the data for their own profit. While the threat of malicious insiders is a valid concern, equally grave data exposures occur through poorly understood businessprocessesthatuseinsecureprotocolsandprocedures,andwhenem- ployees do not practice secure data handling. Tosolvetheseproblems,datalossprevention(DLP)toolshelpidentifyand plug information leaks before they negatively impact organizations. Most organizations have some kind of classification scheme intended to identify the kinds of data they use. Once categorized, the appropriate controls canthenbeappliedtomonitorandcontroldataaccess,transportationandstor- age. In the days when businesses stored information on paper and microfilm, controls such as printed access rosters, security guards, locked filing cabinets and combination safes prevented unauthorized access and dissemination.
  • 4. PAG E 4 O F 11 SP ONSORED BY Home Introduction to data loss prevention products INTRODUCTION TO DATA LOSS PREVENTION TOOLS With data mostly reduced to digital form nowadays, companies have to use special software to detect data theft while maintaining these older security controls (as long as paper or microfilm records still exist). DLP: DATA IN USE, IN MOTION, AT REST Dependingontheiruse,DLPtoolscandetectandblockthepotentialexposure of sensitive information while in use, in motion or at rest. Data in use is data that is being processed, is in memory and may be presentintemporaryfiles.Itposesadangerifinsecureendpointdevices are processing the data or may be routing it to unapproved storage or unapproved remote locations. Data in motion is data traveling across a network in a point-to-point transaction.Thedangerhereliesindatatransactionsthatmaytakesen- sitiveinformationbeyondtheorganization'sperimeterortounintended printouts or storage media.
  • 5. PAG E 5 OF 11 SP ONSORED BY Home Introduction to data loss prevention products INTRODUCTION TO DATA LOSS PREVENTION TOOLS Data at rest is data that is stored in digital form in persistent (not tem- porary)files,andcanincludeend-userfilesanddatabaseslocatedonfile servers, backup tapes, SAN storage and portable media. Datalosspreventioncanensureendusersdon'tsendsensitiveinformation outsidetheirorganization'snetworkormoveitfromsecuretoinsecurestorage. WhileDLPproductsdoaddresstheinsiderthreat,theyarealsoveryusefulasa technicalcontroltopreventtheinadvertentexposureofsensitiveinformation bypersonsunfamiliarwithitsvalueortheproperwaytoprocess,transmitand store sensitive information. HOW DLP WORKS: STANDALONE VS. INTEGRATED DLP products are designed to detect sensitive information as it is accessed by endpoint devices like desktops and mobile devices, as it lies dormant on a file server in forgotten documents, and as it moves through an organization's networks using any number of protocols. DLP tools address the problems of sensitive data usage, movement and storage based on an organization's un- derstanding of what it wants to protect and where the data is allowed at any moment.
  • 6. PAG E 6 OF 11 SP ONSORED BY Home Introduction to data loss prevention products INTRODUCTION TO DATA LOSS PREVENTION TOOLS Standalone DLP products can reside on specialized appliances or can be sold as software to be installed on the enterprise's own hardware. They are specialized and only address data loss prevention. A full soup-to-nuts DLP product monitors data at rest using a file scanning engine. It also features a networkappliancetomonitordataintransitoveracompany’snetworkon many network protocols. An endpoint agent detects sensitive information in memory, during print- ing attempts, copying to portable media or exiting through network protocols. Theagentsmayalsobeabletodetectsensitiveinformationatrestbyscanning files found on endpoint logical drives. Standalone DLP products also provide some manner of management con- sole,areportgenerator,apolicymanager,adatabasetostoresignificantevents andaquarantineserverorfoldertostorecapturedsensitivedata.Thereisalso usually a method to build custom detection policies. Integrated DLP features, by contrast to standalone DLP, are usually found on perimeter security gateways such as Web or email security gateways, in- trusion detection systems/intrusion prevention systems, endpoint security suitesandunifiedthreatmanagementproducts.Dependingontheirmainfunc- tions, these products are most useful at detecting sensitive data in motion and
  • 7. PAG E 7 O F 11 SP ONSORED BY Home Introduction to data loss prevention products INTRODUCTION TO DATA LOSS PREVENTION TOOLS sensitive data in use. Vulnerability scanners, for example, usually have DLP plug-ins to detect sensitive data at rest, such as Social Security numbers. Unlike the convenience of having a standalone DLP product, security products with integrated DLP from different vendors do not share the same management consoles, policy management engines and data storage. That means an organization's DLP capability may end up being scattered among severaldifferenttypesofsecurityproducts.Quarantinefunctions,iftheyexist, are handled through different management interfaces as well. Any attempt to correlate DLP events will have to be handled through a security information management (SIEM) system or a separate data correlation engine. DLP'S USEFULNESS DLP tools are especially useful to organizations that have sensitive data with a long shelf life, such as financial data, health insurance data or intellectual property. Government agencies, universities, RD labs and technology com- panies are fertile grounds for cyber-espionage. Banks, retail, e-commerce and financialorganizationscertainlyhavemuchtoloseaswell.Whilehealthinsur- ancemightseemtobethedomainofmedicalandinsuranceorganizations,any organizationthatself-administerscompanyhealthinsuranceplanscouldalso
  • 8. PAG E 8 OF 11 SP ONSORED BY Home Introduction to data loss prevention products INTRODUCTION TO DATA LOSS PREVENTION TOOLS be a target. Sure, when DLP is mentioned, protecting credit card numbers comes to mind. While credit card numbers are in demand by cybercriminals, the shelf life for a credit card on underground websites is usually only a few days before its use has been detected, however. The average price for a stolen U.S. credit cardonRussiancybercrimeforumsdeclinedfrom$3in2011toadollarin2013. By contrast, stolen healthcare records may get up to $10 per record. Cybercriminals target medical records because of their shelf life, and the theft of them may not be immediately detected. These records are sources of patient names, insurance policy numbers, diagnosis codes and personally identifiable information. Cybercriminals can use this data to buy medical equipmentorprescriptiondrugsthatcanthenberesold.Additionally,theycan create false identities to file false claims with health insurers. THE DLP LEARNING CURVE DLP tools often come with pre-defined policies to help detect sensitive data types, such as intellectual property, personally identifiable information, pro- tected health information, Social Security numbers and payment card infor- mation. In practice, since each organization has different ways of expressing
  • 9. PAG E 9 OF 11 SP ONSORED BY Home Introduction to data loss prevention products INTRODUCTION TO DATA LOSS PREVENTION TOOLS processing and storing information, a fair amount of customization is needed to accurately detect them and thus prevent data compromise. Giventhislevelofcomplexity,cybersecuritystaffchargedwithDLPsystem administrationandanalysisfacesasignificantcurveinlearninghowtoconfig- ureandemployDLPtechnology.FormalDLPapplicationtrainingisbeneficial and working knowledge of Regular Expression parsing is highly useful. Ad- ditionally, DLP staff should meet with business process owners to learn about each type of sensitive data and what forms and formats it might take. DLP DECISIONS BeforebuyingastandaloneDLPproduct,organizationsshouldassesscurrently owned cybersecurity products to see what DLP features are present and how they can be used either to supplement or replace a standalone DLP product. The price for a standalone DLP product, which is not insignificant, should be weighedagainstthelaborandadditionalproductsrequiredtotransformanar- ray of currently deployed security products with integrated DLP features into a coherent DLP protection suite. Enterprise-levelDLPproductsareusuallypricedwithlargerorganizations in mind or companies with high risks and onerous compliance requirements.
  • 10. PAG E 10 O F 11 SP ONSORED BY Home Introduction to data loss prevention products INTRODUCTION TO DATA LOSS PREVENTION TOOLS Smaller firms with lighter purses might want to consider the integrated DLP route,providedtheyhavethecriticalmassofintegratedDLPproductsalready at hand. In either case, DLP projects can demand significant investment of re- sources,suchasITskills,hardware,storageresourcesand--ofcourse--dollars.
  • 11. PAG E 11 OF 11 SP ONSORED BY Home Introduction to data loss prevention products INTRODUCTION TO DATA LOSS PREVENTION TOOLS FREE RESOURCES FOR TECHNOLOGY PROFESSIONALS TechTarget publishes targeted technology media that address yourneedforinformationandresourcesforresearchingprod- ucts, developing strategy and making cost-effective purchase decisions. Our network of technology-specific Web sites gives youaccesstoindustryexperts,independentcontentandanaly- sis and the Web’s largest library of vendor-provided white pa- pers, webcasts, podcasts, videos, virtual trade shows, research reports and more —drawing on the rich RD resources of technology providers to address market trends, challenges and solutions. Our live events and virtual seminars give you ac- cess to vendor neutral, expert commentary and advice on the issues and challenges you face daily. Our social community IT Knowledge Exchange allows you to share real world information in real time with peers and experts. WHAT MAKES TECHTARGET UNIQUE? TechTarget is squarely focused on the enterprise IT space. Our team of editors and net- workofindustryexpertsprovidetherichest,mostrelevantcontenttoITprofessionalsand management. We leverage the immediacy of the Web, the networking and face-to-face op- portunitiesofeventsandvirtualevents,andtheabilitytointeractwithpeers—alltocreate compellingandactionableinformationforenterpriseITprofessionalsacrossallindustries and markets.