Data loss prevention ensures critical corporate information is kept safely within networks and helps administrators control data transfers. It is important for maintaining corporate image, compliance, and avoiding penalties. DLP identifies sensitive data like credit cards, social security numbers, business plans, and financial records. It monitors, detects, prevents data leakage, and notifies users of violations while protecting sensitive information. Choosing a DLP product requires considering budget, in-house vs outsourcing needs, policies, incident response, and compatibility with existing infrastructure.
7. DLPDATA LOSS
PREVENTION
ENSURES CRITICAL INFORMATION
ARE KEPT SAFELY AT THE
CORPORATE NETWORK AND
HELPS ADMINISTRATOR
CONTROL THE DATA WHAT
END-USERS WISH TO TRANSFER…
“
8. DO WE NEED DLP?
WHY
CORPORATE IMAGE.
COMPLIANCE.
AVOID COSTLY PENALTIES.
9. WHAT DATA DO
YOU HAVE?
WHO IS
ACCESSING YOUR
DATA?
HOW TO RESPOND
TO DATA LEAKAGE
EVENTS?
IDENTIFICATION OF SENSITIVE DATA
10. CREDIT CARD NO.
SOCIAL SECURITY
SENSITIVE BUSINESS
PLANS
FINANCIAL RECORDS
EMPLOYEE DATA
BUSINESS PLANS
MARKETING MATERIALS
WEBSITE
NEWSLETTERS
DISCOVER
13. FOR EXAMPLE:
AN EMPLOYEE TRIES TO SEND AN
EMAIL WITH SOCIAL SECURITY
PREVENT FROM SENDING
NOTIFY USER FOR VIOLATION
QUARANTINE EMAIL
SEND THROUGH SECURE GATEWAY
DLP systems assist with inventorying the sensitive information possessed by an organization. In many cases, an enterprise simply doesn’t know where sensitive information exists. DLP tools can help ferret out hidden stores of data lurking on endpoint hard drives, in e-mail records and at other locations.
DISCOVER
What data do you have?
What is the value of your data?
Your obligations for protecting the data?
MONITOR
Where your data resides?
Who is accessing your data?
Where your data is going?
PROTECTS
How you protect your data?
Your protection gaps and risks?
How to respond to data leakage events?
DLP systems assist with inventorying the sensitive information possessed by an organization. In many cases, an enterprise simply doesn’t know where sensitive information exists. DLP tools can help ferret out hidden stores of data lurking on endpoint hard drives, in e-mail records and at other locations.
DISCOVER
What data do you have?
What is the value of your data?
Your obligations for protecting the data?
MONITOR
Where your data resides?
Who is accessing your data?
Where your data is going?
PROTECTS
How you protect your data?
Your protection gaps and risks?
How to respond to data leakage events?
DATA IN MOTION- AS IT MOVES THROUGH THE NETWORK
DATA AT REST – BECOMES STORED DATA
DATA IN USE – AS IT BEING USED
DLP systems assist with inventorying the sensitive information possessed by an organization. In many cases, an enterprise simply doesn’t know where sensitive information exists. DLP tools can help ferret out hidden stores of data lurking on endpoint hard drives, in e-mail records and at other locations.
DISCOVER
What data do you have?
What is the value of your data?
Your obligations for protecting the data?
MONITOR
Where your data resides?
Who is accessing your data?
Where your data is going?
PROTECTS
How you protect your data?
Your protection gaps and risks?
How to respond to data leakage events?
DLP systems assist with inventorying the sensitive information possessed by an organization. In many cases, an enterprise simply doesn’t know where sensitive information exists. DLP tools can help ferret out hidden stores of data lurking on endpoint hard drives, in e-mail records and at other locations.
DISCOVER
What data do you have?
What is the value of your data?
Your obligations for protecting the data?
MONITOR
Where your data resides?
Who is accessing your data?
Where your data is going?
PROTECTS
How you protect your data?
Your protection gaps and risks?
How to respond to data leakage events?
DLP systems assist with inventorying the sensitive information possessed by an organization. In many cases, an enterprise simply doesn’t know where sensitive information exists. DLP tools can help ferret out hidden stores of data lurking on endpoint hard drives, in e-mail records and at other locations.
DISCOVER
What data do you have?
What is the value of your data?
Your obligations for protecting the data?
MONITOR
Where your data resides?
Who is accessing your data?
Where your data is going?
PROTECTS
How you protect your data?
Your protection gaps and risks?
How to respond to data leakage events?
DLP systems assist with inventorying the sensitive information possessed by an organization. In many cases, an enterprise simply doesn’t know where sensitive information exists. DLP tools can help ferret out hidden stores of data lurking on endpoint hard drives, in e-mail records and at other locations.
DISCOVER
What data do you have?
What is the value of your data?
Your obligations for protecting the data?
MONITOR
Where your data resides?
Who is accessing your data?
Where your data is going?
PROTECTS
How you protect your data?
Your protection gaps and risks?
How to respond to data leakage events?
DLP systems assist with inventorying the sensitive information possessed by an organization. In many cases, an enterprise simply doesn’t know where sensitive information exists. DLP tools can help ferret out hidden stores of data lurking on endpoint hard drives, in e-mail records and at other locations.
DISCOVER
What data do you have?
What is the value of your data?
Your obligations for protecting the data?
MONITOR
Where your data resides?
Who is accessing your data?
Where your data is going?
PROTECTS
How you protect your data?
Your protection gaps and risks?
How to respond to data leakage events?