SlideShare a Scribd company logo
1 of 11
Download to read offline
E-Guide
INTRODUCTION
TO DATA LOSS
PREVENTION
TOOLS
▲
SearchSecurity
PAG E 2 O F 11 SP ONSORED BY
Home
Introduction to data
loss prevention
products
INTRODUCTION TO DATA LOSS PREVENTION TOOLS
data loss prevention (DLP)strategyisn’t
something to be taken lightly: its cost,
impact on process, and responsibility for
keepinganenterprise’sdatasecurecannot
beunderstatedasdatabecomesmoreaccessibleandmobile.Inthis
e-guide discover what it means for security for data to be in use, in
motion, and at rest; how DLP works in a standalone vs. integrated
context; the DLP learning curve; and more.
A
PAG E 3 O F 11 SP ONSORED BY
Home
Introduction to data
loss prevention
products
INTRODUCTION TO DATA LOSS PREVENTION TOOLS
INTRODUCTION TO DATA LOSS PREVENTION PRODUCTS
Bill Hayes, Cybersecurity analyst and writer
We are living in a time when sensitive information flows seamlessly through-
out organizations and out to employees across the globe. Unfortunately, this
data can wind up in the hands of unintended recipients, who can then cherry-
pick the data for their own profit. While the threat of malicious insiders is a
valid concern, equally grave data exposures occur through poorly understood
businessprocessesthatuseinsecureprotocolsandprocedures,andwhenem-
ployees do not practice secure data handling.
Tosolvetheseproblems,datalossprevention(DLP)toolshelpidentifyand
plug information leaks before they negatively impact organizations.
Most organizations have some kind of classification scheme intended to
identify the kinds of data they use. Once categorized, the appropriate controls
canthenbeappliedtomonitorandcontroldataaccess,transportationandstor-
age. In the days when businesses stored information on paper and microfilm,
controls such as printed access rosters, security guards, locked filing cabinets
and combination safes prevented unauthorized access and dissemination.
PAG E 4 O F 11 SP ONSORED BY
Home
Introduction to data
loss prevention
products
INTRODUCTION TO DATA LOSS PREVENTION TOOLS
With data mostly reduced to digital form nowadays, companies have to use
special software to detect data theft while maintaining these older security
controls (as long as paper or microfilm records still exist).
DLP: DATA IN USE, IN MOTION, AT REST
Dependingontheiruse,DLPtoolscandetectandblockthepotentialexposure
of sensitive information while in use, in motion or at rest.
Data in use is data that is being processed, is in memory and may be
presentintemporaryfiles.Itposesadangerifinsecureendpointdevices
are processing the data or may be routing it to unapproved storage or
unapproved remote locations.
Data in motion is data traveling across a network in a point-to-point
transaction.Thedangerhereliesindatatransactionsthatmaytakesen-
sitiveinformationbeyondtheorganization'sperimeterortounintended
printouts or storage media.
PAG E 5 OF 11 SP ONSORED BY
Home
Introduction to data
loss prevention
products
INTRODUCTION TO DATA LOSS PREVENTION TOOLS
Data at rest is data that is stored in digital form in persistent (not tem-
porary)files,andcanincludeend-userfilesanddatabaseslocatedonfile
servers, backup tapes, SAN storage and portable media.
Datalosspreventioncanensureendusersdon'tsendsensitiveinformation
outsidetheirorganization'snetworkormoveitfromsecuretoinsecurestorage.
WhileDLPproductsdoaddresstheinsiderthreat,theyarealsoveryusefulasa
technicalcontroltopreventtheinadvertentexposureofsensitiveinformation
bypersonsunfamiliarwithitsvalueortheproperwaytoprocess,transmitand
store sensitive information.
HOW DLP WORKS: STANDALONE VS. INTEGRATED
DLP products are designed to detect sensitive information as it is accessed
by endpoint devices like desktops and mobile devices, as it lies dormant on a
file server in forgotten documents, and as it moves through an organization's
networks using any number of protocols. DLP tools address the problems of
sensitive data usage, movement and storage based on an organization's un-
derstanding of what it wants to protect and where the data is allowed at any
moment.
PAG E 6 OF 11 SP ONSORED BY
Home
Introduction to data
loss prevention
products
INTRODUCTION TO DATA LOSS PREVENTION TOOLS
Standalone DLP products can reside on specialized appliances or can be
sold as software to be installed on the enterprise's own hardware. They are
specialized and only address data loss prevention. A full soup-to-nuts DLP
product monitors data at rest using a file scanning engine. It also features a
networkappliancetomonitordataintransitoveracompany’snetworkon
many network protocols.
An endpoint agent detects sensitive information in memory, during print-
ing attempts, copying to portable media or exiting through network protocols.
Theagentsmayalsobeabletodetectsensitiveinformationatrestbyscanning
files found on endpoint logical drives.
Standalone DLP products also provide some manner of management con-
sole,areportgenerator,apolicymanager,adatabasetostoresignificantevents
andaquarantineserverorfoldertostorecapturedsensitivedata.Thereisalso
usually a method to build custom detection policies.
Integrated DLP features, by contrast to standalone DLP, are usually found
on perimeter security gateways such as Web or email security gateways, in-
trusion detection systems/intrusion prevention systems, endpoint security
suitesandunifiedthreatmanagementproducts.Dependingontheirmainfunc-
tions, these products are most useful at detecting sensitive data in motion and
PAG E 7 O F 11 SP ONSORED BY
Home
Introduction to data
loss prevention
products
INTRODUCTION TO DATA LOSS PREVENTION TOOLS
sensitive data in use. Vulnerability scanners, for example, usually have DLP
plug-ins to detect sensitive data at rest, such as Social Security numbers.
Unlike the convenience of having a standalone DLP product, security
products with integrated DLP from different vendors do not share the same
management consoles, policy management engines and data storage. That
means an organization's DLP capability may end up being scattered among
severaldifferenttypesofsecurityproducts.Quarantinefunctions,iftheyexist,
are handled through different management interfaces as well. Any attempt to
correlate DLP events will have to be handled through a security information
management (SIEM) system or a separate data correlation engine.
DLP'S USEFULNESS
DLP tools are especially useful to organizations that have sensitive data with
a long shelf life, such as financial data, health insurance data or intellectual
property. Government agencies, universities, RD labs and technology com-
panies are fertile grounds for cyber-espionage. Banks, retail, e-commerce and
financialorganizationscertainlyhavemuchtoloseaswell.Whilehealthinsur-
ancemightseemtobethedomainofmedicalandinsuranceorganizations,any
organizationthatself-administerscompanyhealthinsuranceplanscouldalso
PAG E 8 OF 11 SP ONSORED BY
Home
Introduction to data
loss prevention
products
INTRODUCTION TO DATA LOSS PREVENTION TOOLS
be a target.
Sure, when DLP is mentioned, protecting credit card numbers comes to
mind. While credit card numbers are in demand by cybercriminals, the shelf
life for a credit card on underground websites is usually only a few days before
its use has been detected, however. The average price for a stolen U.S. credit
cardonRussiancybercrimeforumsdeclinedfrom$3in2011toadollarin2013.
By contrast, stolen healthcare records may get up to $10 per record.
Cybercriminals target medical records because of their shelf life, and the
theft of them may not be immediately detected. These records are sources
of patient names, insurance policy numbers, diagnosis codes and personally
identifiable information. Cybercriminals can use this data to buy medical
equipmentorprescriptiondrugsthatcanthenberesold.Additionally,theycan
create false identities to file false claims with health insurers.
THE DLP LEARNING CURVE
DLP tools often come with pre-defined policies to help detect sensitive data
types, such as intellectual property, personally identifiable information, pro-
tected health information, Social Security numbers and payment card infor-
mation. In practice, since each organization has different ways of expressing
PAG E 9 OF 11 SP ONSORED BY
Home
Introduction to data
loss prevention
products
INTRODUCTION TO DATA LOSS PREVENTION TOOLS
processing and storing information, a fair amount of customization is needed
to accurately detect them and thus prevent data compromise.
Giventhislevelofcomplexity,cybersecuritystaffchargedwithDLPsystem
administrationandanalysisfacesasignificantcurveinlearninghowtoconfig-
ureandemployDLPtechnology.FormalDLPapplicationtrainingisbeneficial
and working knowledge of Regular Expression parsing is highly useful. Ad-
ditionally, DLP staff should meet with business process owners to learn about
each type of sensitive data and what forms and formats it might take.
DLP DECISIONS
BeforebuyingastandaloneDLPproduct,organizationsshouldassesscurrently
owned cybersecurity products to see what DLP features are present and how
they can be used either to supplement or replace a standalone DLP product.
The price for a standalone DLP product, which is not insignificant, should be
weighedagainstthelaborandadditionalproductsrequiredtotransformanar-
ray of currently deployed security products with integrated DLP features into
a coherent DLP protection suite.
Enterprise-levelDLPproductsareusuallypricedwithlargerorganizations
in mind or companies with high risks and onerous compliance requirements.
PAG E 10 O F 11 SP ONSORED BY
Home
Introduction to data
loss prevention
products
INTRODUCTION TO DATA LOSS PREVENTION TOOLS
Smaller firms with lighter purses might want to consider the integrated DLP
route,providedtheyhavethecriticalmassofintegratedDLPproductsalready
at hand.
In either case, DLP projects can demand significant investment of re-
sources,suchasITskills,hardware,storageresourcesand--ofcourse--dollars.
PAG E 11 OF 11 SP ONSORED BY
Home
Introduction to data
loss prevention
products
INTRODUCTION TO DATA LOSS PREVENTION TOOLS
FREE RESOURCES FOR TECHNOLOGY PROFESSIONALS
TechTarget publishes targeted technology media that address
yourneedforinformationandresourcesforresearchingprod-
ucts, developing strategy and making cost-effective purchase
decisions. Our network of technology-specific Web sites gives
youaccesstoindustryexperts,independentcontentandanaly-
sis and the Web’s largest library of vendor-provided white pa-
pers, webcasts, podcasts, videos, virtual trade shows, research
reports and more —drawing on the rich RD resources of technology providers to address
market trends, challenges and solutions. Our live events and virtual seminars give you ac-
cess to vendor neutral, expert commentary and advice on the issues and challenges you
face daily. Our social community IT Knowledge Exchange allows you to share real world
information in real time with peers and experts.
WHAT MAKES TECHTARGET UNIQUE?
TechTarget is squarely focused on the enterprise IT space. Our team of editors and net-
workofindustryexpertsprovidetherichest,mostrelevantcontenttoITprofessionalsand
management. We leverage the immediacy of the Web, the networking and face-to-face op-
portunitiesofeventsandvirtualevents,andtheabilitytointeractwithpeers—alltocreate
compellingandactionableinformationforenterpriseITprofessionalsacrossallindustries
and markets.

More Related Content

What's hot

2010 za con_stephen_kreusch
2010 za con_stephen_kreusch2010 za con_stephen_kreusch
2010 za con_stephen_kreusch
Johan Klerk
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
Symantec
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Symantec APJ
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
 

What's hot (20)

Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
 
2010 za con_stephen_kreusch
2010 za con_stephen_kreusch2010 za con_stephen_kreusch
2010 za con_stephen_kreusch
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security Suite
 
DLP
DLPDLP
DLP
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can Help
 
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónBe Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 

Similar to DLP 101: Help identify and plug information leaks

Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDM
Greg Cranley
 
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Ravtach Solutions
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 

Similar to DLP 101: Help identify and plug information leaks (20)

Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 
Protect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionProtect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak prevention
 
Protect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPProtect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLP
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDM
 
Clearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionClearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat Protection
 
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
 
DLP Solutions Protection | Seclore
DLP Solutions Protection |  SecloreDLP Solutions Protection |  Seclore
DLP Solutions Protection | Seclore
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
data-leakage-prevention
 data-leakage-prevention data-leakage-prevention
data-leakage-prevention
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint security
 
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
 
How Data Loss Prevention Works.pdf
How Data Loss Prevention Works.pdfHow Data Loss Prevention Works.pdf
How Data Loss Prevention Works.pdf
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
 
Seclore for Forcepoint DLP
Seclore for Forcepoint DLPSeclore for Forcepoint DLP
Seclore for Forcepoint DLP
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 

More from Abhishek Sood

More from Abhishek Sood (20)

The future of enterprise management
The future of enterprise management The future of enterprise management
The future of enterprise management
 
Gain new visibility in your DevOps team
 Gain new visibility in your DevOps team Gain new visibility in your DevOps team
Gain new visibility in your DevOps team
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metrics
 
Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits
 
3-part approach to turning IoT data into business power
 3-part approach to turning IoT data into business power 3-part approach to turning IoT data into business power
3-part approach to turning IoT data into business power
 
How a bad HR dept. can lose $9M
 How a bad HR dept. can lose $9M How a bad HR dept. can lose $9M
How a bad HR dept. can lose $9M
 
Big news coming for DevOps: What you need to know
 Big news coming for DevOps: What you need to know Big news coming for DevOps: What you need to know
Big news coming for DevOps: What you need to know
 
Microservices best practices: Integration platforms, APIs, and more
 Microservices best practices: Integration platforms, APIs, and more Microservices best practices: Integration platforms, APIs, and more
Microservices best practices: Integration platforms, APIs, and more
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
 
Why adopt more than one cloud service?
 Why adopt more than one cloud service? Why adopt more than one cloud service?
Why adopt more than one cloud service?
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 
How to integrate risk into your compliance-only approach
 How to integrate risk into your compliance-only approach How to integrate risk into your compliance-only approach
How to integrate risk into your compliance-only approach
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use cases
 
How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management
 
API-led connectivity: How to leverage reusable microservices
 API-led connectivity: How to leverage reusable microservices API-led connectivity: How to leverage reusable microservices
API-led connectivity: How to leverage reusable microservices
 
How to create a secure high performance storage and compute infrastructure
 How to create a secure high performance storage and compute infrastructure How to create a secure high performance storage and compute infrastructure
How to create a secure high performance storage and compute infrastructure
 
Enterprise software usability and digital transformation
Enterprise software usability and digital transformationEnterprise software usability and digital transformation
Enterprise software usability and digital transformation
 
Transforming for digital customers across 6 key industries
 Transforming for digital customers across 6 key industries Transforming for digital customers across 6 key industries
Transforming for digital customers across 6 key industries
 
Authentication best practices: Experts weigh in
Authentication best practices: Experts weigh inAuthentication best practices: Experts weigh in
Authentication best practices: Experts weigh in
 
Tips --Break Down the Barriers to Better Data Analytics
Tips --Break Down the Barriers to Better Data AnalyticsTips --Break Down the Barriers to Better Data Analytics
Tips --Break Down the Barriers to Better Data Analytics
 

Recently uploaded

Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
dlhescort
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 

Recently uploaded (20)

Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 

DLP 101: Help identify and plug information leaks

  • 2. PAG E 2 O F 11 SP ONSORED BY Home Introduction to data loss prevention products INTRODUCTION TO DATA LOSS PREVENTION TOOLS data loss prevention (DLP)strategyisn’t something to be taken lightly: its cost, impact on process, and responsibility for keepinganenterprise’sdatasecurecannot beunderstatedasdatabecomesmoreaccessibleandmobile.Inthis e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more. A
  • 3. PAG E 3 O F 11 SP ONSORED BY Home Introduction to data loss prevention products INTRODUCTION TO DATA LOSS PREVENTION TOOLS INTRODUCTION TO DATA LOSS PREVENTION PRODUCTS Bill Hayes, Cybersecurity analyst and writer We are living in a time when sensitive information flows seamlessly through- out organizations and out to employees across the globe. Unfortunately, this data can wind up in the hands of unintended recipients, who can then cherry- pick the data for their own profit. While the threat of malicious insiders is a valid concern, equally grave data exposures occur through poorly understood businessprocessesthatuseinsecureprotocolsandprocedures,andwhenem- ployees do not practice secure data handling. Tosolvetheseproblems,datalossprevention(DLP)toolshelpidentifyand plug information leaks before they negatively impact organizations. Most organizations have some kind of classification scheme intended to identify the kinds of data they use. Once categorized, the appropriate controls canthenbeappliedtomonitorandcontroldataaccess,transportationandstor- age. In the days when businesses stored information on paper and microfilm, controls such as printed access rosters, security guards, locked filing cabinets and combination safes prevented unauthorized access and dissemination.
  • 4. PAG E 4 O F 11 SP ONSORED BY Home Introduction to data loss prevention products INTRODUCTION TO DATA LOSS PREVENTION TOOLS With data mostly reduced to digital form nowadays, companies have to use special software to detect data theft while maintaining these older security controls (as long as paper or microfilm records still exist). DLP: DATA IN USE, IN MOTION, AT REST Dependingontheiruse,DLPtoolscandetectandblockthepotentialexposure of sensitive information while in use, in motion or at rest. Data in use is data that is being processed, is in memory and may be presentintemporaryfiles.Itposesadangerifinsecureendpointdevices are processing the data or may be routing it to unapproved storage or unapproved remote locations. Data in motion is data traveling across a network in a point-to-point transaction.Thedangerhereliesindatatransactionsthatmaytakesen- sitiveinformationbeyondtheorganization'sperimeterortounintended printouts or storage media.
  • 5. PAG E 5 OF 11 SP ONSORED BY Home Introduction to data loss prevention products INTRODUCTION TO DATA LOSS PREVENTION TOOLS Data at rest is data that is stored in digital form in persistent (not tem- porary)files,andcanincludeend-userfilesanddatabaseslocatedonfile servers, backup tapes, SAN storage and portable media. Datalosspreventioncanensureendusersdon'tsendsensitiveinformation outsidetheirorganization'snetworkormoveitfromsecuretoinsecurestorage. WhileDLPproductsdoaddresstheinsiderthreat,theyarealsoveryusefulasa technicalcontroltopreventtheinadvertentexposureofsensitiveinformation bypersonsunfamiliarwithitsvalueortheproperwaytoprocess,transmitand store sensitive information. HOW DLP WORKS: STANDALONE VS. INTEGRATED DLP products are designed to detect sensitive information as it is accessed by endpoint devices like desktops and mobile devices, as it lies dormant on a file server in forgotten documents, and as it moves through an organization's networks using any number of protocols. DLP tools address the problems of sensitive data usage, movement and storage based on an organization's un- derstanding of what it wants to protect and where the data is allowed at any moment.
  • 6. PAG E 6 OF 11 SP ONSORED BY Home Introduction to data loss prevention products INTRODUCTION TO DATA LOSS PREVENTION TOOLS Standalone DLP products can reside on specialized appliances or can be sold as software to be installed on the enterprise's own hardware. They are specialized and only address data loss prevention. A full soup-to-nuts DLP product monitors data at rest using a file scanning engine. It also features a networkappliancetomonitordataintransitoveracompany’snetworkon many network protocols. An endpoint agent detects sensitive information in memory, during print- ing attempts, copying to portable media or exiting through network protocols. Theagentsmayalsobeabletodetectsensitiveinformationatrestbyscanning files found on endpoint logical drives. Standalone DLP products also provide some manner of management con- sole,areportgenerator,apolicymanager,adatabasetostoresignificantevents andaquarantineserverorfoldertostorecapturedsensitivedata.Thereisalso usually a method to build custom detection policies. Integrated DLP features, by contrast to standalone DLP, are usually found on perimeter security gateways such as Web or email security gateways, in- trusion detection systems/intrusion prevention systems, endpoint security suitesandunifiedthreatmanagementproducts.Dependingontheirmainfunc- tions, these products are most useful at detecting sensitive data in motion and
  • 7. PAG E 7 O F 11 SP ONSORED BY Home Introduction to data loss prevention products INTRODUCTION TO DATA LOSS PREVENTION TOOLS sensitive data in use. Vulnerability scanners, for example, usually have DLP plug-ins to detect sensitive data at rest, such as Social Security numbers. Unlike the convenience of having a standalone DLP product, security products with integrated DLP from different vendors do not share the same management consoles, policy management engines and data storage. That means an organization's DLP capability may end up being scattered among severaldifferenttypesofsecurityproducts.Quarantinefunctions,iftheyexist, are handled through different management interfaces as well. Any attempt to correlate DLP events will have to be handled through a security information management (SIEM) system or a separate data correlation engine. DLP'S USEFULNESS DLP tools are especially useful to organizations that have sensitive data with a long shelf life, such as financial data, health insurance data or intellectual property. Government agencies, universities, RD labs and technology com- panies are fertile grounds for cyber-espionage. Banks, retail, e-commerce and financialorganizationscertainlyhavemuchtoloseaswell.Whilehealthinsur- ancemightseemtobethedomainofmedicalandinsuranceorganizations,any organizationthatself-administerscompanyhealthinsuranceplanscouldalso
  • 8. PAG E 8 OF 11 SP ONSORED BY Home Introduction to data loss prevention products INTRODUCTION TO DATA LOSS PREVENTION TOOLS be a target. Sure, when DLP is mentioned, protecting credit card numbers comes to mind. While credit card numbers are in demand by cybercriminals, the shelf life for a credit card on underground websites is usually only a few days before its use has been detected, however. The average price for a stolen U.S. credit cardonRussiancybercrimeforumsdeclinedfrom$3in2011toadollarin2013. By contrast, stolen healthcare records may get up to $10 per record. Cybercriminals target medical records because of their shelf life, and the theft of them may not be immediately detected. These records are sources of patient names, insurance policy numbers, diagnosis codes and personally identifiable information. Cybercriminals can use this data to buy medical equipmentorprescriptiondrugsthatcanthenberesold.Additionally,theycan create false identities to file false claims with health insurers. THE DLP LEARNING CURVE DLP tools often come with pre-defined policies to help detect sensitive data types, such as intellectual property, personally identifiable information, pro- tected health information, Social Security numbers and payment card infor- mation. In practice, since each organization has different ways of expressing
  • 9. PAG E 9 OF 11 SP ONSORED BY Home Introduction to data loss prevention products INTRODUCTION TO DATA LOSS PREVENTION TOOLS processing and storing information, a fair amount of customization is needed to accurately detect them and thus prevent data compromise. Giventhislevelofcomplexity,cybersecuritystaffchargedwithDLPsystem administrationandanalysisfacesasignificantcurveinlearninghowtoconfig- ureandemployDLPtechnology.FormalDLPapplicationtrainingisbeneficial and working knowledge of Regular Expression parsing is highly useful. Ad- ditionally, DLP staff should meet with business process owners to learn about each type of sensitive data and what forms and formats it might take. DLP DECISIONS BeforebuyingastandaloneDLPproduct,organizationsshouldassesscurrently owned cybersecurity products to see what DLP features are present and how they can be used either to supplement or replace a standalone DLP product. The price for a standalone DLP product, which is not insignificant, should be weighedagainstthelaborandadditionalproductsrequiredtotransformanar- ray of currently deployed security products with integrated DLP features into a coherent DLP protection suite. Enterprise-levelDLPproductsareusuallypricedwithlargerorganizations in mind or companies with high risks and onerous compliance requirements.
  • 10. PAG E 10 O F 11 SP ONSORED BY Home Introduction to data loss prevention products INTRODUCTION TO DATA LOSS PREVENTION TOOLS Smaller firms with lighter purses might want to consider the integrated DLP route,providedtheyhavethecriticalmassofintegratedDLPproductsalready at hand. In either case, DLP projects can demand significant investment of re- sources,suchasITskills,hardware,storageresourcesand--ofcourse--dollars.
  • 11. PAG E 11 OF 11 SP ONSORED BY Home Introduction to data loss prevention products INTRODUCTION TO DATA LOSS PREVENTION TOOLS FREE RESOURCES FOR TECHNOLOGY PROFESSIONALS TechTarget publishes targeted technology media that address yourneedforinformationandresourcesforresearchingprod- ucts, developing strategy and making cost-effective purchase decisions. Our network of technology-specific Web sites gives youaccesstoindustryexperts,independentcontentandanaly- sis and the Web’s largest library of vendor-provided white pa- pers, webcasts, podcasts, videos, virtual trade shows, research reports and more —drawing on the rich RD resources of technology providers to address market trends, challenges and solutions. Our live events and virtual seminars give you ac- cess to vendor neutral, expert commentary and advice on the issues and challenges you face daily. Our social community IT Knowledge Exchange allows you to share real world information in real time with peers and experts. WHAT MAKES TECHTARGET UNIQUE? TechTarget is squarely focused on the enterprise IT space. Our team of editors and net- workofindustryexpertsprovidetherichest,mostrelevantcontenttoITprofessionalsand management. We leverage the immediacy of the Web, the networking and face-to-face op- portunitiesofeventsandvirtualevents,andtheabilitytointeractwithpeers—alltocreate compellingandactionableinformationforenterpriseITprofessionalsacrossallindustries and markets.