SlideShare a Scribd company logo
1 of 12
Download to read offline
The Future of DLP is Automation
GhangorCloud
Increasing
Accuracy and
Control through
Automation
Multiple Stages of Automation
• Automation delivers speed and accuracy
that is not possible with manual systems.
• Automation also delivers cost benefits by
reducing or eliminating the time required
for manual processes.
The evolution of automation for any type of
system goes through multiple stages.
➢ The first stage is usually completely manual
➢ The second stage automates one or more of the
functions
➢ The third stage automates more functions
➢ The fourth stage relies on strategic input and then
fulfills most of the functions automatically.
Four Generations of Automation for Automobiles
The human must make all the decisions. Multiple
elements to coordinate.
The human must make all the decisions. Single
element to coordinate.
The human must make some of the decisions. The
system executes some functions automatically.
The human makes high level decisions. The system
executes automatically and informs the human.4th Generation Automobiles:
3rd Generation Automobiles:
2nd Generation Automobiles:
1st Generation Automobiles:
Four Generations of Evolution for DLP
Fourth Generation
DLP –
Information Centric
Automated identification of all
sensitive data & documents.
Enterprise provides initial high
level specification about who has
access to what.
The system automatically
identifies the data/information
and enforces policies.
Third Generation
DLP –
Unstructured Data
Centric
Manual Tagging, Keyword
Matching, Fingerprinting based
identification of all sensitive
First Generation
DLP –
DRM Centric
Manual identification and
marking of all sensitive
documents.
Second Generation
DLP –
Structured Data
Centric
RegEx Matching based
identification of all sensitive
Data
4th Generation DLP Products need to…
Information Security Sensitive Businesses
and Security Agencies Will…
➢ Use multiple data sources to determine risk
➢ Automatically correlate information from multiple
sources
➢ Automate actions based on correlations
➢ Automatically deliver real time enforcement from
multiple platforms
➢Automatically classify information
➢Automatically classify Actors and Actions
➢Automatically correlate multiple types of
information
➢Automatically use multiple data sources to
enforce correct actions based
on risk assessment
Core Automation Technologies for 4th Generation DLP
Auto-Classification of Data
& Content
4th GenerationDLP systemmust be able to recognize
and Auto-Classify confidential and/or missioncritical
data in any format without humanintervention.
NOTE: Auto-Classification Engine must be able to
perform AutomaticDataIdentification. To this effect,
sophisticated data identification techniques are
imperative. Simple Keyword and Lexical Matches are
NOT enough as they have been proven to be error
prone resulting in high False Positive rates.
Auto Classification Technology must
exhibit following characteristics;
No ManualProcessing of data/content
such as Pre-Tagging or Pre-Marking
of data/content.
No Pre-Processing of data/content
such as Document Fingerprinting or
Hashing of Data/Content.
No ManualHeuristic Training The Auto-Classification process
should NOT require manual heuristic training.
X
No Manual Intervention
➢ TraditionalDataClassification systemsthat require“ManualInput”are greatly
ineffectiveas theyare not onlyerror-proneand unscalable butactuallyhighly
susceptible to MaliciousData Leakscenarios.
Core Automation Technologies for 4th Generation DLP
Auto-Generation of Policies
4th GenerationDLP systemmust be able to
Automatically Generate comprehensive set of Policies
for enforcementof data leakpreventionbased on
Role-basedContent Access Control.
NOTE: DLP Policy definition is the single most
critical process for successful deployment of a DLP
regime. DLP Policies are inherently more complex
and require deeper understanding of sophisticated
use case scenarios in order to ascertain acceptable
level of “Completeness” and “Use Case Coverage”.
➢ TraditionalDLP systemsare typicallylimitedto manual policycreation process
which is not onlytediousbutalsoerror proneand costly.
Auto Policy Generation Technology must
exhibit following characteristics;
No ManualInterventionin the
Policy Generation process. All
relevant Policy Primitives should
be automatically generated thus
eliminating human error and inconsistency.
No Post-Processing such as Manual Policy Embossing of
Data/Content.
No ManualHeuristic Training of the Policy Parameters to
perform Incident Correlation.
Core Automation Technologies for 4th Generation DLP
Auto-Access Control
4th GenerationDLP systemmust be able to
Automatically Generate comprehensive set of Access
Control Primitives.
NOTE: Traditional DLP systems are either
dependent on extensive manual enumeration of
Access Control Primitives or rely heavily on the
Policy definition process – both of the two
approaches is extremely cumbersome and
constrained in its ability to provide the requisite
coverage of “Use Case Scenarios” in sophisticated
real-life DLP deployments.
Auto Advanced Access Control
Technology must exhibit following
characteristics;
Identityand Role driven Access Control
wherein access rights and corresponding
violations are automatically deduced from
the identity and functional role of an actor
(i.e. employee, application or device).
Contextual-Conceptual Correlation algorithms to perform
sophisticated reasoning (i.e. who should have access to what
type of information?) for detection and pre-emption of
complex data leak scenarios.
Core Automation Technologies for 4th Generation DLP
Auto-GRC Enforcement
4th GenerationDLP systemmustbe able to Automatically
Enforce Governance & Regulatory Compliance .
NOTE: Traditional GRC Systems are typically focused
on document routing and workflow. They are either
dependent on third party data security tools or rely
heavily on the Standard Operating Procedures – both
of the two approaches is extremely cumbersome and
constrained in its ability to provide the requisite
coverage of “Use Case Scenarios” in sophisticated real-
life DLP deployments.
Auto GRC Enforcement Technology must
exhibit following characteristics;
Segmentationof Duty(SoD)
basedInformation Control
wherein dissemination,
exposure and routing of
data/information is
automatically controlled
according to pre-defined
Business Standard Operating Procedures.
Regulatory Compliance Enforcement wherein all domain
specific compliance guidelines are automatically enacted.
GhangorCloud Technologies for Automated Security
GhangorCloudDelivers 4th Generation
Automated DLP for Your Organization
➢ Auto-classification of Information
➢ Auto-classification of Actor Risk Posture
➢ Multi-variable Correlation – Actors-Information- Operations
➢ Auto-synthesis of Policy
➢ Centralized Command Control Collaboration & Intelligence
GhangorCloud
Key Solution Features
GhangorCloud’s 4th Generation DLP Product
GhangorCloud How Does It Work? Automated & in Real-time
1. Analyze the
Data
2. Classify the
Data
3. Determine
Who has Access
4. Apply Policy
5. Protect in Real-Time &
Enforce Compliance
6. Report
Violations with
Forensic Trail
Let us show you how
4th Generation Data Leak Prevention
can secure your sensitive data.
GhangorCloud
Contact:
GhangorCloud
2001 Gateway Place
Suite 710, West Tower
San Jose, CA 95110
+1 408-713-3303
info@ghangorCloud.com

More Related Content

Similar to The Future of Automated DLP is Here

Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftAppsian
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceKim Cook
 
Adversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSEAdversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSEJorge Orchilles
 
Emerging engineering issues for building large scale AI systems By Srinivas P...
Emerging engineering issues for building large scale AI systems By Srinivas P...Emerging engineering issues for building large scale AI systems By Srinivas P...
Emerging engineering issues for building large scale AI systems By Srinivas P...Analytics India Magazine
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
nullcon 2011 - Enterprise Paradigm for Controlling Data Leakage
nullcon 2011 - Enterprise Paradigm for Controlling Data Leakagenullcon 2011 - Enterprise Paradigm for Controlling Data Leakage
nullcon 2011 - Enterprise Paradigm for Controlling Data Leakagen|u - The Open Security Community
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessForgeRock
 
Revisiting Privileged Access in Today's Threat Landscape
Revisiting Privileged Access in Today's Threat LandscapeRevisiting Privileged Access in Today's Threat Landscape
Revisiting Privileged Access in Today's Threat LandscapeLance Peterman
 
Annual OktCyberfest 2019
Annual OktCyberfest 2019Annual OktCyberfest 2019
Annual OktCyberfest 2019Fahad Al-Hasan
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Steven Meister
 

Similar to The Future of Automated DLP is Here (20)

Soluzioni per la sicurezza aziendale di hp
Soluzioni per la sicurezza aziendale di hpSoluzioni per la sicurezza aziendale di hp
Soluzioni per la sicurezza aziendale di hp
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoft
 
Securitarian
SecuritarianSecuritarian
Securitarian
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
Adversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSEAdversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSE
 
Emerging engineering issues for building large scale AI systems By Srinivas P...
Emerging engineering issues for building large scale AI systems By Srinivas P...Emerging engineering issues for building large scale AI systems By Srinivas P...
Emerging engineering issues for building large scale AI systems By Srinivas P...
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
nullcon 2011 - Enterprise Paradigm for Controlling Data Leakage
nullcon 2011 - Enterprise Paradigm for Controlling Data Leakagenullcon 2011 - Enterprise Paradigm for Controlling Data Leakage
nullcon 2011 - Enterprise Paradigm for Controlling Data Leakage
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR Success
 
Revisiting Privileged Access in Today's Threat Landscape
Revisiting Privileged Access in Today's Threat LandscapeRevisiting Privileged Access in Today's Threat Landscape
Revisiting Privileged Access in Today's Threat Landscape
 
Annual OktCyberfest 2019
Annual OktCyberfest 2019Annual OktCyberfest 2019
Annual OktCyberfest 2019
 
finl.docx
finl.docxfinl.docx
finl.docx
 
18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 

More from Martín Ríos

Scrum_Ceremonies.pptx
Scrum_Ceremonies.pptxScrum_Ceremonies.pptx
Scrum_Ceremonies.pptxMartín Ríos
 
Seminarium PPT Julio KF.pptx
Seminarium PPT Julio KF.pptxSeminarium PPT Julio KF.pptx
Seminarium PPT Julio KF.pptxMartín Ríos
 
Alain fournier,el gran meaulnes
Alain fournier,el gran meaulnesAlain fournier,el gran meaulnes
Alain fournier,el gran meaulnesMartín Ríos
 
Info gartner spanish gastos ti 2022
Info gartner spanish gastos ti 2022Info gartner spanish gastos ti 2022
Info gartner spanish gastos ti 2022Martín Ríos
 
La riqueza y_pobreza_de_las_naciones-una visión geopolítica
La riqueza y_pobreza_de_las_naciones-una visión geopolíticaLa riqueza y_pobreza_de_las_naciones-una visión geopolítica
La riqueza y_pobreza_de_las_naciones-una visión geopolíticaMartín Ríos
 
Hyperconverged compare
Hyperconverged compareHyperconverged compare
Hyperconverged compareMartín Ríos
 
Ocho pasos para construir un sistema blade HP
Ocho pasos para construir un sistema blade HPOcho pasos para construir un sistema blade HP
Ocho pasos para construir un sistema blade HPMartín Ríos
 
First national-technology-solutions
First national-technology-solutionsFirst national-technology-solutions
First national-technology-solutionsMartín Ríos
 
Optimize your virtualization_efforts_with_a_blade_infrastructure
Optimize your virtualization_efforts_with_a_blade_infrastructureOptimize your virtualization_efforts_with_a_blade_infrastructure
Optimize your virtualization_efforts_with_a_blade_infrastructureMartín Ríos
 

More from Martín Ríos (11)

Scrum_Ceremonies.pptx
Scrum_Ceremonies.pptxScrum_Ceremonies.pptx
Scrum_Ceremonies.pptx
 
Seminarium PPT Julio KF.pptx
Seminarium PPT Julio KF.pptxSeminarium PPT Julio KF.pptx
Seminarium PPT Julio KF.pptx
 
Alain fournier,el gran meaulnes
Alain fournier,el gran meaulnesAlain fournier,el gran meaulnes
Alain fournier,el gran meaulnes
 
Info gartner spanish gastos ti 2022
Info gartner spanish gastos ti 2022Info gartner spanish gastos ti 2022
Info gartner spanish gastos ti 2022
 
La riqueza y_pobreza_de_las_naciones-una visión geopolítica
La riqueza y_pobreza_de_las_naciones-una visión geopolíticaLa riqueza y_pobreza_de_las_naciones-una visión geopolítica
La riqueza y_pobreza_de_las_naciones-una visión geopolítica
 
Hyperconverged compare
Hyperconverged compareHyperconverged compare
Hyperconverged compare
 
Laptop está muerto
Laptop está muertoLaptop está muerto
Laptop está muerto
 
Ocho pasos para construir un sistema blade HP
Ocho pasos para construir un sistema blade HPOcho pasos para construir un sistema blade HP
Ocho pasos para construir un sistema blade HP
 
SAP
SAPSAP
SAP
 
First national-technology-solutions
First national-technology-solutionsFirst national-technology-solutions
First national-technology-solutions
 
Optimize your virtualization_efforts_with_a_blade_infrastructure
Optimize your virtualization_efforts_with_a_blade_infrastructureOptimize your virtualization_efforts_with_a_blade_infrastructure
Optimize your virtualization_efforts_with_a_blade_infrastructure
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

The Future of Automated DLP is Here

  • 1. The Future of DLP is Automation GhangorCloud Increasing Accuracy and Control through Automation
  • 2. Multiple Stages of Automation • Automation delivers speed and accuracy that is not possible with manual systems. • Automation also delivers cost benefits by reducing or eliminating the time required for manual processes. The evolution of automation for any type of system goes through multiple stages. ➢ The first stage is usually completely manual ➢ The second stage automates one or more of the functions ➢ The third stage automates more functions ➢ The fourth stage relies on strategic input and then fulfills most of the functions automatically.
  • 3. Four Generations of Automation for Automobiles The human must make all the decisions. Multiple elements to coordinate. The human must make all the decisions. Single element to coordinate. The human must make some of the decisions. The system executes some functions automatically. The human makes high level decisions. The system executes automatically and informs the human.4th Generation Automobiles: 3rd Generation Automobiles: 2nd Generation Automobiles: 1st Generation Automobiles:
  • 4. Four Generations of Evolution for DLP Fourth Generation DLP – Information Centric Automated identification of all sensitive data & documents. Enterprise provides initial high level specification about who has access to what. The system automatically identifies the data/information and enforces policies. Third Generation DLP – Unstructured Data Centric Manual Tagging, Keyword Matching, Fingerprinting based identification of all sensitive First Generation DLP – DRM Centric Manual identification and marking of all sensitive documents. Second Generation DLP – Structured Data Centric RegEx Matching based identification of all sensitive Data
  • 5. 4th Generation DLP Products need to… Information Security Sensitive Businesses and Security Agencies Will… ➢ Use multiple data sources to determine risk ➢ Automatically correlate information from multiple sources ➢ Automate actions based on correlations ➢ Automatically deliver real time enforcement from multiple platforms ➢Automatically classify information ➢Automatically classify Actors and Actions ➢Automatically correlate multiple types of information ➢Automatically use multiple data sources to enforce correct actions based on risk assessment
  • 6. Core Automation Technologies for 4th Generation DLP Auto-Classification of Data & Content 4th GenerationDLP systemmust be able to recognize and Auto-Classify confidential and/or missioncritical data in any format without humanintervention. NOTE: Auto-Classification Engine must be able to perform AutomaticDataIdentification. To this effect, sophisticated data identification techniques are imperative. Simple Keyword and Lexical Matches are NOT enough as they have been proven to be error prone resulting in high False Positive rates. Auto Classification Technology must exhibit following characteristics; No ManualProcessing of data/content such as Pre-Tagging or Pre-Marking of data/content. No Pre-Processing of data/content such as Document Fingerprinting or Hashing of Data/Content. No ManualHeuristic Training The Auto-Classification process should NOT require manual heuristic training. X No Manual Intervention ➢ TraditionalDataClassification systemsthat require“ManualInput”are greatly ineffectiveas theyare not onlyerror-proneand unscalable butactuallyhighly susceptible to MaliciousData Leakscenarios.
  • 7. Core Automation Technologies for 4th Generation DLP Auto-Generation of Policies 4th GenerationDLP systemmust be able to Automatically Generate comprehensive set of Policies for enforcementof data leakpreventionbased on Role-basedContent Access Control. NOTE: DLP Policy definition is the single most critical process for successful deployment of a DLP regime. DLP Policies are inherently more complex and require deeper understanding of sophisticated use case scenarios in order to ascertain acceptable level of “Completeness” and “Use Case Coverage”. ➢ TraditionalDLP systemsare typicallylimitedto manual policycreation process which is not onlytediousbutalsoerror proneand costly. Auto Policy Generation Technology must exhibit following characteristics; No ManualInterventionin the Policy Generation process. All relevant Policy Primitives should be automatically generated thus eliminating human error and inconsistency. No Post-Processing such as Manual Policy Embossing of Data/Content. No ManualHeuristic Training of the Policy Parameters to perform Incident Correlation.
  • 8. Core Automation Technologies for 4th Generation DLP Auto-Access Control 4th GenerationDLP systemmust be able to Automatically Generate comprehensive set of Access Control Primitives. NOTE: Traditional DLP systems are either dependent on extensive manual enumeration of Access Control Primitives or rely heavily on the Policy definition process – both of the two approaches is extremely cumbersome and constrained in its ability to provide the requisite coverage of “Use Case Scenarios” in sophisticated real-life DLP deployments. Auto Advanced Access Control Technology must exhibit following characteristics; Identityand Role driven Access Control wherein access rights and corresponding violations are automatically deduced from the identity and functional role of an actor (i.e. employee, application or device). Contextual-Conceptual Correlation algorithms to perform sophisticated reasoning (i.e. who should have access to what type of information?) for detection and pre-emption of complex data leak scenarios.
  • 9. Core Automation Technologies for 4th Generation DLP Auto-GRC Enforcement 4th GenerationDLP systemmustbe able to Automatically Enforce Governance & Regulatory Compliance . NOTE: Traditional GRC Systems are typically focused on document routing and workflow. They are either dependent on third party data security tools or rely heavily on the Standard Operating Procedures – both of the two approaches is extremely cumbersome and constrained in its ability to provide the requisite coverage of “Use Case Scenarios” in sophisticated real- life DLP deployments. Auto GRC Enforcement Technology must exhibit following characteristics; Segmentationof Duty(SoD) basedInformation Control wherein dissemination, exposure and routing of data/information is automatically controlled according to pre-defined Business Standard Operating Procedures. Regulatory Compliance Enforcement wherein all domain specific compliance guidelines are automatically enacted.
  • 10. GhangorCloud Technologies for Automated Security GhangorCloudDelivers 4th Generation Automated DLP for Your Organization ➢ Auto-classification of Information ➢ Auto-classification of Actor Risk Posture ➢ Multi-variable Correlation – Actors-Information- Operations ➢ Auto-synthesis of Policy ➢ Centralized Command Control Collaboration & Intelligence GhangorCloud Key Solution Features
  • 11. GhangorCloud’s 4th Generation DLP Product GhangorCloud How Does It Work? Automated & in Real-time 1. Analyze the Data 2. Classify the Data 3. Determine Who has Access 4. Apply Policy 5. Protect in Real-Time & Enforce Compliance 6. Report Violations with Forensic Trail
  • 12. Let us show you how 4th Generation Data Leak Prevention can secure your sensitive data. GhangorCloud Contact: GhangorCloud 2001 Gateway Place Suite 710, West Tower San Jose, CA 95110 +1 408-713-3303 info@ghangorCloud.com