SlideShare a Scribd company logo
1 of 9
Download to read offline
Lock Down Your Data, Not Your Business
with
Data Lost Prevention (DLP)
Speaker : Agusto Sipahutar
Agustox21@yahoo.com
2
What Is DLP
Data loss prevention (DLP) is a set of tools and processes used to ensure that sensitive
data is not lost, misused, or accessed by unauthorized users.
Data Loss Prevention solutions help companies avoid data loss incidents through a continuous data
monitoring process across endpoints, networks and clouds.
3
3 Main Uses Cases for DLP
Data loss prevention solves three main objectives that are common pain points for many organizations are :
1. Personal Information Protection / Compliance: Does your organization collect and store Personally Identifiable
Information (PII), Protected Health Information (PHI), or payment card information (PCI)? If so, you are more than likely
subject to compliance regulations, such as HIPAA (for PHI) and GDPR (for personal data of EU residents), that require you
to protect your customers’ sensitive data. DLP can identify, classify, and tag sensitive data and monitor activities and
events surrounding that data. In addition, reporting capabilities provide the details needed for compliance audits.
2. IP Protection: Does your organization have important intellectual property and trade or state secrets that could put your
organization’s financial health and brand image at risk if lost or stolen? DLP solutions like Digital Guardian that use context-
based classification can classify intellectual property in both structured and unstructured forms. With policies and controls
in place, you can protect against unwanted exfiltration of this data.
3. Data Visibility: Is your organization seeking to gain additional visibility into data movement? A comprehensive enterprise
DLP solution can help you see and track your data on endpoints, networks, and the cloud. This will provide you with
visibility into how individual users within your organization interact with data.
While these are the three main use cases, DLP can remediate a variety of other pain points including insider threats, Office
365 data security, user and entity behavior analysis, and advanced threats.
Why Do Companies Need a Data Loss Prevention Solution?
1. Cyber Threats are Increasing
2. Data Leaks Can Come from Internal Parties
3. BYOD (Bring You Own Device) Policy Risk
4. Safer Data Management
5. Increase the Role of CISO
6. Helping the Work of the Company's IT Team
Discover, Inventory, and Classify Data
Scenario A - Implement A DLP At Rest Solution
A fictional company named Medical Health Records processes medical insurance claims for a regulated
Health Care organization.
They are aware that HIPAA and Medical claim data reside on file servers, but they are not sure where the data
is located.
Solution: Implement A DLP At Rest Solution using GCP - Sensitive Data Protection
Here the best choice would be to implement a DLP at Rest solution. The strategy would include a discovery
scan of unstructured data, which will crawl the selected storage and locate data matching the pattern of
HIPAA and Medical keywords, as set forth in the scan policy.
When a pattern match occurs, a notification alert will be recorded in the DLP database and viewable on the
management console by the DLP Analyst.
Scenario B - Implement DLP For Endpoints
The Sales team is complaining that they cannot store their PowerPoint presentations on
USB thumb drives. There isn’t any sensitive data saved, only presentation.
Solution: Implement DLP For Endpoints using McAcfee / Acronis Endpoint Protection
DLP for the Endpoint in most cases allows the ability to whitelist users via a policy based
on Active Directory membership.
Scenario C - Implement DLP Policy
The CEO would like to know when the secret formula document has moved from its
original location or emailed within network.
Solution: Create A DLP Policy using GCP, Mcafee or Acronis then define all rule base on
policy ex. Policy for HRD, Finance Team, etc
Create a policy that detects the exact match of the document or monitor for specific
keywords as it resides in storage or email.
Why US
 We will provided Licenses and Implementation
 For after sales provided Managed Service (If Needed)
 Have team that specializes in products
 After implementation, knowledge transfer and documentation will be provided

More Related Content

Similar to Data Lost Prevention (DLP).pdf

Sample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docxSample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docx
rtodd599
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
 

Similar to Data Lost Prevention (DLP).pdf (20)

Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
Sample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docxSample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docx
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 
Office 365 data loss prevention
Office 365 data loss preventionOffice 365 data loss prevention
Office 365 data loss prevention
 
Trusted information protection
Trusted information protection Trusted information protection
Trusted information protection
 
Data Loss Prevention in Office 365
Data Loss Prevention in Office 365Data Loss Prevention in Office 365
Data Loss Prevention in Office 365
 
Azure Data Loss Prevention
Azure Data Loss PreventionAzure Data Loss Prevention
Azure Data Loss Prevention
 
Soluzioni per la sicurezza aziendale di hp
Soluzioni per la sicurezza aziendale di hpSoluzioni per la sicurezza aziendale di hp
Soluzioni per la sicurezza aziendale di hp
 
18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss Prevention
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss PreventionaMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
 
Siem requirement.pdfsd
Siem requirement.pdfsdSiem requirement.pdfsd
Siem requirement.pdfsd
 
Top 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptxTop 10 use cases for Microsoft Purview.pptx
Top 10 use cases for Microsoft Purview.pptx
 
Microsoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceMicrosoft Teams in the Modern Workplace
Microsoft Teams in the Modern Workplace
 

More from Agusto Sipahutar

More from Agusto Sipahutar (17)

KONG-APIGateway.pptx
KONG-APIGateway.pptxKONG-APIGateway.pptx
KONG-APIGateway.pptx
 
Infinys Odoo CRM Presentation.pptx
Infinys Odoo CRM Presentation.pptxInfinys Odoo CRM Presentation.pptx
Infinys Odoo CRM Presentation.pptx
 
High Cloud Computing Backbone Technology.pptx
High Cloud Computing Backbone Technology.pptxHigh Cloud Computing Backbone Technology.pptx
High Cloud Computing Backbone Technology.pptx
 
Secure File Sharring-owncloud.pptx
Secure File Sharring-owncloud.pptxSecure File Sharring-owncloud.pptx
Secure File Sharring-owncloud.pptx
 
Tips On Trick Odoo Add-On.pptx
Tips On Trick Odoo Add-On.pptxTips On Trick Odoo Add-On.pptx
Tips On Trick Odoo Add-On.pptx
 
Tips On Trick Odoo Add-On.pptx
Tips On Trick Odoo Add-On.pptxTips On Trick Odoo Add-On.pptx
Tips On Trick Odoo Add-On.pptx
 
Software Team Roles
Software Team RolesSoftware Team Roles
Software Team Roles
 
Easy to manage docker with portainer
Easy to manage docker with portainerEasy to manage docker with portainer
Easy to manage docker with portainer
 
[Slides] how to integrated managed service dengan it department
[Slides] how to integrated managed service dengan it department[Slides] how to integrated managed service dengan it department
[Slides] how to integrated managed service dengan it department
 
RPA with UIPath and Flaui
RPA with UIPath and FlauiRPA with UIPath and Flaui
RPA with UIPath and Flaui
 
[Slides] key considerations to look for in managed services
[Slides] key considerations to look for in managed services[Slides] key considerations to look for in managed services
[Slides] key considerations to look for in managed services
 
[Slides] Infinys Cloud Manage Service
[Slides] Infinys Cloud Manage Service[Slides] Infinys Cloud Manage Service
[Slides] Infinys Cloud Manage Service
 
Introduction Asp.Net Core, MVC, Docker (Linux), Postman and Swagger
Introduction Asp.Net Core, MVC, Docker (Linux), Postman and SwaggerIntroduction Asp.Net Core, MVC, Docker (Linux), Postman and Swagger
Introduction Asp.Net Core, MVC, Docker (Linux), Postman and Swagger
 
Sharepoint 2019 Training
Sharepoint 2019 TrainingSharepoint 2019 Training
Sharepoint 2019 Training
 
Intro to power apps
Intro to power appsIntro to power apps
Intro to power apps
 
Slides leverage your work from home level now
Slides leverage your work from home level now Slides leverage your work from home level now
Slides leverage your work from home level now
 
Slides m365 file management and collaboration (infinys)
Slides m365 file management and collaboration (infinys)Slides m365 file management and collaboration (infinys)
Slides m365 file management and collaboration (infinys)
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 

Data Lost Prevention (DLP).pdf

  • 1. Lock Down Your Data, Not Your Business with Data Lost Prevention (DLP) Speaker : Agusto Sipahutar Agustox21@yahoo.com
  • 2. 2 What Is DLP Data loss prevention (DLP) is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users. Data Loss Prevention solutions help companies avoid data loss incidents through a continuous data monitoring process across endpoints, networks and clouds.
  • 3. 3 3 Main Uses Cases for DLP Data loss prevention solves three main objectives that are common pain points for many organizations are : 1. Personal Information Protection / Compliance: Does your organization collect and store Personally Identifiable Information (PII), Protected Health Information (PHI), or payment card information (PCI)? If so, you are more than likely subject to compliance regulations, such as HIPAA (for PHI) and GDPR (for personal data of EU residents), that require you to protect your customers’ sensitive data. DLP can identify, classify, and tag sensitive data and monitor activities and events surrounding that data. In addition, reporting capabilities provide the details needed for compliance audits. 2. IP Protection: Does your organization have important intellectual property and trade or state secrets that could put your organization’s financial health and brand image at risk if lost or stolen? DLP solutions like Digital Guardian that use context- based classification can classify intellectual property in both structured and unstructured forms. With policies and controls in place, you can protect against unwanted exfiltration of this data. 3. Data Visibility: Is your organization seeking to gain additional visibility into data movement? A comprehensive enterprise DLP solution can help you see and track your data on endpoints, networks, and the cloud. This will provide you with visibility into how individual users within your organization interact with data. While these are the three main use cases, DLP can remediate a variety of other pain points including insider threats, Office 365 data security, user and entity behavior analysis, and advanced threats.
  • 4. Why Do Companies Need a Data Loss Prevention Solution? 1. Cyber Threats are Increasing 2. Data Leaks Can Come from Internal Parties 3. BYOD (Bring You Own Device) Policy Risk 4. Safer Data Management 5. Increase the Role of CISO 6. Helping the Work of the Company's IT Team
  • 5. Discover, Inventory, and Classify Data
  • 6. Scenario A - Implement A DLP At Rest Solution A fictional company named Medical Health Records processes medical insurance claims for a regulated Health Care organization. They are aware that HIPAA and Medical claim data reside on file servers, but they are not sure where the data is located. Solution: Implement A DLP At Rest Solution using GCP - Sensitive Data Protection Here the best choice would be to implement a DLP at Rest solution. The strategy would include a discovery scan of unstructured data, which will crawl the selected storage and locate data matching the pattern of HIPAA and Medical keywords, as set forth in the scan policy. When a pattern match occurs, a notification alert will be recorded in the DLP database and viewable on the management console by the DLP Analyst.
  • 7. Scenario B - Implement DLP For Endpoints The Sales team is complaining that they cannot store their PowerPoint presentations on USB thumb drives. There isn’t any sensitive data saved, only presentation. Solution: Implement DLP For Endpoints using McAcfee / Acronis Endpoint Protection DLP for the Endpoint in most cases allows the ability to whitelist users via a policy based on Active Directory membership.
  • 8. Scenario C - Implement DLP Policy The CEO would like to know when the secret formula document has moved from its original location or emailed within network. Solution: Create A DLP Policy using GCP, Mcafee or Acronis then define all rule base on policy ex. Policy for HRD, Finance Team, etc Create a policy that detects the exact match of the document or monitor for specific keywords as it resides in storage or email.
  • 9. Why US  We will provided Licenses and Implementation  For after sales provided Managed Service (If Needed)  Have team that specializes in products  After implementation, knowledge transfer and documentation will be provided