SlideShare a Scribd company logo
THE EXECUTIVE GUIDE TO
     DATA LOSS PREVENTION




Technology Overview, Business Justification, and Resource Requirements
Introduction to Data Loss Prevention
Intelligent Protection for Digital Assets
                                                          Although we’ve long recognized the importance of
                                                          our digital assets, in recent years it has become in-
                                                          creasingly difficult to effectively protect them. We
                                                          can’t simply lock the data away behind walls and
                                                          guards — much of its value is directly tied to our
                                                          ability to easily and seamlessly use it throughout our
                                                          organizations, and any security that interferes with
                                                          business process is likely as damaging as the loss it’s
                                                          intended to prevent.

In the information age, “loss prevention” is no longer    To meet these challenges we have seen the emergence
limited to reducing theft along the supply chain and      of a new technology: Data Loss Prevention. DLP is
in retail or office locations. Our most sensitive as-     designed to protect information assets with minimal
sets are more likely to be found in databases, email,     interference in business processes. It provides new
and files — rather than in boxes, filing cabinets, and    insights into how information is used, and enforces
warehouses. From customer lists, payment informa-         protective controls to prevent unwanted incidents.
tion, and corporate financials, to product and engi-      It’s not perfect, and no technology can completely
neering plans — the lifeblood of any enterprise is        eliminate information loss, but in combination with
found as much in electronic bits on networks and          appropriate security processes DLP can reduce risk,
laptops as in offices, retail stores, manufacturing       improve data management practices, and even lower
plants, and shipments.                                    certain compliance costs.

Defining Data Loss Prevention
(DLP) suites combine an array of technologies to pro-     In practice you define what information you want to       This definition encapsulates the core components
tect information throughout its lifecycle, with mini-     find or protect, then use DLP to automatically locate     of a DLP solution: centralized management, iden-
mal impact on business process. They accomplish           where it’s stored, where it’s being communicated,         tification of defined information, monitoring of us-
this by ‘understanding’ both the content and context      and where it’s being moved (e.g., to laptops or USB       age, and protection from policy violations. A DLP
of information, matching them against central poli-       sticks). You can merely audit and alert if something      solution does this in storage, on networks, and on
cies, and enforcing business rules. At the core, DLP      violates policy, or implement a variety of protective     employee computers, using advanced analysis tech-
uses deep content analysis to peer inside files and       actions.                                                  niques. While there are tools that just solve parts of
network communications to identify sensitive con-                                                                   the problem (such as endpoint-only tools) we gener-
tent, rather than relying on manual processes such        We define DLP as:                                         ally recommend full suites which include all the ma-
as tagging, watermarking, and hand-classification.                                                                  jor components, since they provide better protection
In other words, DLP actually recognizes the infor-          Products that, based on central poli-                   and are more cost effective in the long term. We’ll
mation it is looking at (within limits), and matches it     cies, identify, monitor, and protect data               describe how it all works later in this report, after
to policies set for acceptable use of the content.          at rest, in motion, and in use through                  we outline the business justifications for investing
                                                                     deep content analysis.                         in DLP.

                               Licensed by Websense — www.websense.com                                                Securosis, L.L.C. — www.securosis.com
Reasons to Invest in Data Loss Prevention
                                                                                                            Example Use Cases for DLP
                                                                                                            • A retailer uses DLP to inventory their entire
                                                                                                            storage infrastructure and employee laptops
                                                                                                            to identify unencrypted credit card numbers
                                                                                                            which could be in violation of the Payment
                                                                                                            Card Industry (PCI) Data Security Standard.
                                                                                                            These reports are first used to remove as much
                                                                                                            of the data as possible, and then provided to PCI
                                                                                                            auditors to demonstrate compliance. This cut 3
                                                                                                            months off their compliance cycle and reduced
                                                                                                            PCI audit costs by 20%.

                                                                                                            • A financial institution uses a full-suite
                                                                                                            DLP deployment to protect customer financial
                                                                                                            information. They link the DLP system to their
                                                                                                            primary customer database, and then monitor
                                                                                                            network communications and generate alerts
                                                                                                            if customer records are transmitted without
                                                                                                            encryption. They use data-at-rest scanning to
                                                                                                            make sure customer records aren’t stored on
                                                                                                            employee laptops or on servers except where
                                                                                                            explicitly permitted, and block the transfer of
                                                                                                            files with customer records to portable storage
Data Loss Prevention is Typically Justified Using Five Drivers:                                             (USB thumb drives). They also allow employees
                                                                                                            to use personal email, like Hotmail, but block
                                                                                                            outbound messages with customer records. Since
 • Risk Reduction: By knowing where your data         • Policy Enforcement: Many data management            implementation, they’ve seen an 80% reduction
 is stored and how it’s being used, you can reduce    policies in enterprises are difficult or impossible   in data misuse and prevented 2 potential data
 your overall exposure to potential loss.             to enforce. DLP supports enforcement of accept-       breaches.
                                                      able use of information, not just security con-
 • Cost Savings: DLP may help reduce other            trols.                                                • An engineering firm uses DLP to track the
 costs associated with data management and se-                                                              movement of sensitive engineering plans for new
 curity.                                              • Data Security and Threat Management: While          products. The plans are normally stored on a central
                                                      no security tool stops all threats, DLP reduces the   server, so the DLP solution monitors that server
 • Compliance Support: DLP helps reduce the           risk of certain malicious activity.                   and identifies any of those documents, or parts of
 direct costs associated with some regulatory com-                                                          them, being sent outside the organization.
 pliance, can ease audits, and reduces the risks of
 certain compliance-related incidents.
How DLP Works
A Non-Technical Overview                                Data-In-Motion
Rather than talking about specific technology com-      When discussing DLP, we use data-in-motion to                  offers additional options for protection — such
ponents, we categorize DLP architectures based on       describe content moving around our networks,                   as automatically routing emails with sensitive
where they protect information: data-in-motion for      including email, web traffic, instant messaging, and           data to a manager for approval before letting
email and other network communications, data-at-        other communications. We use three components to               them out. To achieve this, we just pass email
rest for stored data, and data-in-use as for interac-   monitor and protect data in motion:                            traffic through a DLP email component.
tions with the data on computers, such as copying
it to USB drives. Behind all this is the central man-   •   Network Monitor: An appliance or server that           •   Endpoint Software Agent: All organizations
agement server where we define polices and manage           sniffs your network to identify and monitor your           have mobile workers who connect to the
incidents.                                                  data. Typically these are used in a passive mode,          Internet from outside the corporate network,
                                                            where they just scan all data passing by, but some         such as remote workers at home and sales staff
As we outline the architecture, keep in mind that           tools also proxy traffic to directly block policy          at wireless-enabled coffee houses. A software
we’re showing you every possible DLP component.             violations. Many DLP tools can also work with              agent on their computers can monitor and
You won’t always need every piece, and in practice          existing web gateways to block unacceptable                control their network traffic.
some pieces are commonly combined together.                 traffic (including some encrypted traffic), such
                                                            as someone trying to send a customer list to           In practice, the network monitor and email agent are
                                                            their personal site.                                   usually combined on the central management server,
                                                                                                                   but can be split out for distributed organizations and
                                                        •   Email: Email is a bit different than other network     larger businesses. The software agents on laptops
                                                            traffic, and the most important channel for            protect both data-at-rest and data-in-use, so they
                                                            protecting information. The way email works            don’t require multiple packages.

                                                        Data-At-Rest
                                                        One of the most valuable capabilities of a DLP so-         Agents are also the best option for monitoring and
                                                        lution is its ability to search deep into stored data to   protecting files on employee laptops and desktops.
                                                        identify sensitive information. Consider the value of      3. Application Integration: Some enterprises use
                                                        knowing every location where customer records are          document management solutions such as Microsoft
                                                        stored, even if someone’s moved them onto a laptop         SharePoint and EMC Documentum. DLP solutions
                                                        or an unapproved server. We use three components           integrate directly with these tools to take advantage
                                                        for data-at-rest:                                          of their capabilities.
                                                        1. Remote Scanning: The DLP solution connects to           Just as we can block network traffic to protect the
                                                        the storage repository, just like a user looking for a     data, we have enforcement options for data-at-rest.
                                                        file. It then scans all files for sensitive data.          We can automatically move files to a protected
                                                        2. Local Software Agent: Remote scanning uses              server to quarantine them, delete them, or some-
                                                        network bandwidth, so while it can reach anywhere          times even encrypt them.
                                                        users can, it isn’t always the most efficient method.
                                                        For major repositories, we can install a more effi-
                                                        cient software agent to scan information locally and
                                                        then send results back to the management server.
How DLP Works
Data-In-Use                                              Understanding Content Analysis
As we’ve already discussed, we use software agents       Deep content analysis is the distinguishing and           • Database Matching: The DLP solution connects
on employee systems to identify, monitor, and pro-       most important feature of Data Loss Prevention.           to a database, and only looks for content from that
tect data-in-motion and data-at-rest. These same         It’s how the DLP solution identifies sensitive            database, such as customer records.
agents can also protect data-in-use, such as employ-     information, which it then matches against policies
ees trying to move files to portable storage drives,     for enforcement. Two steps occur in content analysis      • Statistical: A large volume of documents is
using sensitive data in unapproved applications, or      — breaking apart files to get to the information,         loaded into the system, and the DLP solution
even printing the data to take it home.                  and then the analysis itself. There are six main          uses statistical analysis to identify new content
                                                         content analysis techniques in use, although their        that resembles the sources. This is much more
Since laptops and desktops aren’t as powerful as         availability and effectiveness vary greatly across        prone to false positives, but may allow you to
servers, and we use them differently, we can’t al-       different products.                                       protect new content automatically, instead of
ways enforce all the same DLP policies on our end-                                                                 relying on direct matching.
points, and not all endpoint DLP tools provide the         • Rules/Expressions: The DLP solution looks
same features. Usually we need to make trade-offs          for information that matches a defined pattern,         • Conceptual: The system uses predefined
in the kinds of policies we enforce due to content         such as the structure of a credit card or Social        dictionaries and rules to find content that matches
analysis limitations. Some DLP solutions improve           Security Number.                                        an “idea” — such as sexual harassment, job
security and performance by using different policies                                                               seeking, or industrial espionage.
if the endpoint is on the corporate network versus         • Partial Document Matching: Documents are
remote.                                                    submitted to the DLP solution, which then looks         • Categories: Pre-defined categories for
                                                           for complete or partial matches. For example,           common types of sensitive data, such as financial
Central Management                                         partial document matching can identify a single         records or health care information. Often kept
                                                           paragraph from a protected document pasted              up-to-date with current regulatory requirements
The central management server is the brains of the         into an email, and is very effective for protecting     via subscription.
DLP solution; it’s where we define policies and man-       intellectual property.
age workflow, and in many cases it performs some                                                                 Most DLP solutions allow you to combine different
or most of the monitoring and protection functions.                                                              analysis techniques into a single policy.
Since DLP is focused on a business problem (pro-
tecting sensitive information) as opposed to a techni-   The Data Loss Prevention Cycle
cal problem (network attacks) it’s important for DLP     All these features are tied together in the Data Loss Prevention Cycle:
products to support both non-technical and technical
users. Policy creation shouldn’t demand a degree in
computer science, and incident management should
be an activity a compliance, risk, or even human re-     1. Define: Build a policy that de-    3. Monitor: Track usage of the
sources manager can perform.                             fines the information to protect,     defined information at rest, in
                                                         and how to protect it.                motion, and in use. Generate
Other key features include robust reporting; inte-       2. Discover: Use the DLP solu-        alerts on policy violations.
gration with user directories to tie policies to users   tion to find the defined informa-     4. Protect: Quarantine emails,
and groups; hierarchical management for multiple         tion throughout the organization.     relocate files, block copies to
systems in large environments; and standard perfor-      Relocate or remove information        portable storage, and other en-
mance, reliability, and management features com-         where it shouldn’t be.                forcement actions.
mon to most security tools.
Pricing Models and Resource Expectations
DLP Pricing                                              Resource Expectations
Data Loss Prevention solution pricing varies by ven-     As with pricing, resource requirements vary greatly based on the nature and scale of deployment.
dor, but tends to fall into one of a few models. Most
DLP solutions are priced as per-user annual sub-           • Initial Deployment: Network monitoring and            • Ongoing Management: A mid-sized organi-
scriptions, with a flat rate for the initial hardware/     remote scanning (for data-at-rest) deploy very          zation with a basic deployment typically requires
software tiered based on performance. Many DLP             rapidly, typically in a matter of hours for small-      only 1-2 FTEs for ongoing system management,
providers offer perpetual licensing for the equivalent     er deployments, and no more than a few days             policy creation, and incident handling. This is
of a 3-year subscription. Support and maintenance          or weeks for larger deployments with multiple           often split across a group of employees working
fees are normally calculated at 10-20% of overall          monitors, using 1-3 Full Time Equivalent (FTE)          part time with the system, with one person han-
contract value per year, depending on the level of         employees. Very complex networks with addi-             dling system management and policy creation,
support desired. Some vendors split pricing based          tional integration requirements require addition-       and a group of security, compliance, risk, legal,
on which DLP components are deployed (network,             al time. Endpoint agent deployment on employee          and/or human resources employees dealing with
endpoint, and discovery) for organizations which           systems and servers varies more, depending on           incidents. As deployments scale, we typically
wish to phase in their deployments. All vendors of-        existing system infrastructure and management.          see .25-1 FTE per 10,000 employees, again de-
fer volume discounts.                                      This typically demands no more effort than any          pending on the number and nature of policies de-
                                                           other piece of software, with little initial config-    ployed. Some mid-sized organizations find they
Street pricing varies widely, and the following ex-        uration, since tuning occurs later on the central       use considerably less than a single FTE.
amples are just rough estimates to give you an idea        management server.
of what to expect. For a mid-sized organization of
5,000 employees, pricing for only network monitor-         • Initial Configuration: This includes develop-
ing usually costs in the neighborhood of $100,000,         ment of initial policies, integration of the system
while a full-suite deployment (with endpoint, dis-         with existing infrastructure such as user directo-
covery, multiple systems, and infrastructure inte-         ries, and testing and deployment of initial poli-
gration) can grow to $300,000-$500,000. Larger             cies. Although basic policies can be deployed in
organizations can expect the customary significant         days, expect to spend 3-6 months tuning the
volume discounts.                                          initial set, defining workflow, and building pro-
                                                           cesses to manage incidents. Mid-size organiza-
                                                           tions typically require a single FTE to manage
                                                           the system and develop policies, with additional
                                                           part-time FTEs to manage incidents.



                                                         Summary
                                                         Data Loss Prevention is a powerful tool for pro-         and desktops through deep content analysis, which
                                                         tecting information assets. DLP identifies sensitive     allows you to define what information to protect and
                                                         information, monitors its use, and protects it from      how to protect it. DLP isn’t perfect, and can’t stop all
                                                         abuse. DLP tools accomplish this by monitoring           misuse of information or malicious attacks, but is a
                                                         your network, scanning your storage infrastructure,      powerful tool for reducing compliance costs and the
                                                         and tracking data use on endpoints such as laptops       risks of information loss and data breaches.

More Related Content

What's hot

Dlp notes
Dlp notesDlp notes
Dlp notes
anuepcet
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
Symantec
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
Robert Kloots
 
DLP
DLPDLP
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
Network Intelligence India
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
Liwei Ren任力偉
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
Sarfaraz Chougule
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
Shariyaz Abdeen
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
Ariel Martin Beliera
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
Happiest Minds Technologies
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
Dhananjay Aloorkar
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
Syed Sabhi Haider
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
Iftikhar Ali Iqbal
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
Jake K.
 
Information security
Information security Information security
Information security
AishaIshaq4
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
newbie2019
 
Data security
Data securityData security
Data security
AbdulBasit938
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
k33a
 

What's hot (20)

Dlp notes
Dlp notesDlp notes
Dlp notes
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
 
DLP
DLPDLP
DLP
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
 
Information security
Information security Information security
Information security
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Data security
Data securityData security
Data security
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 

Viewers also liked

The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
Digital Guardian
 
Wccp introduction final2
Wccp introduction final2Wccp introduction final2
Wccp introduction final2
bui thequan
 
What Does a Data Breach Cost?
What Does a Data Breach Cost?What Does a Data Breach Cost?
What Does a Data Breach Cost?
CBT Nuggets
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDDATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
Priyanka Aash
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
benefitexpress
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
Blue Coat
 
The Anatomy of a Data Breach
The Anatomy of a Data BreachThe Anatomy of a Data Breach
The Anatomy of a Data Breach
David Hunt
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
Blue Coat
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider Threat
Lancope, Inc.
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
aengelbert
 

Viewers also liked (10)

The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
Wccp introduction final2
Wccp introduction final2Wccp introduction final2
Wccp introduction final2
 
What Does a Data Breach Cost?
What Does a Data Breach Cost?What Does a Data Breach Cost?
What Does a Data Breach Cost?
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDDATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
 
The Anatomy of a Data Breach
The Anatomy of a Data BreachThe Anatomy of a Data Breach
The Anatomy of a Data Breach
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider Threat
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
 

Similar to DLP Executive Overview

10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
Peak 10
 
Software_defines_the_future_infrastructure (1)_final
Software_defines_the_future_infrastructure (1)_finalSoftware_defines_the_future_infrastructure (1)_final
Software_defines_the_future_infrastructure (1)_finalKhiro Mishra
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
Happiest Minds Technologies
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trendsChristopher Bennett
 
10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud
Iron Mountain
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
Tejaswi Agarwal
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
shafzonly
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
alex hincapie
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET Journal
 
Gtb Dlp & Irm Solution Product And Deployment Overview
Gtb Dlp & Irm Solution   Product And Deployment OverviewGtb Dlp & Irm Solution   Product And Deployment Overview
Gtb Dlp & Irm Solution Product And Deployment Overviewgtbsalesindia
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
TranVu383073
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Manish Sahani
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security ChallengesSTO STRATEGY
 
Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
Seenee Permal, CISA, CISM
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
IRJET Journal
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET Journal
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET Journal
 
data-leakage-prevention
 data-leakage-prevention data-leakage-prevention
data-leakage-prevention
anuepcet
 

Similar to DLP Executive Overview (20)

10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 
Software_defines_the_future_infrastructure (1)_final
Software_defines_the_future_infrastructure (1)_finalSoftware_defines_the_future_infrastructure (1)_final
Software_defines_the_future_infrastructure (1)_final
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
 
Gtb Dlp & Irm Solution Product And Deployment Overview
Gtb Dlp & Irm Solution   Product And Deployment OverviewGtb Dlp & Irm Solution   Product And Deployment Overview
Gtb Dlp & Irm Solution Product And Deployment Overview
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security Challenges
 
Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
data-leakage-prevention
 data-leakage-prevention data-leakage-prevention
data-leakage-prevention
 
234 237
234 237234 237
234 237
 
234 237
234 237234 237
234 237
 

More from Kim Jensen

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
Kim Jensen
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter pack
Kim Jensen
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
Kim Jensen
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
Kim Jensen
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003
Kim Jensen
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
Kim Jensen
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
Kim Jensen
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
Kim Jensen
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
Kim Jensen
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
Kim Jensen
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012
Kim Jensen
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
Kim Jensen
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012
Kim Jensen
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011
Kim Jensen
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011
Kim Jensen
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web Security
Kim Jensen
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
Kim Jensen
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011
Kim Jensen
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
Kim Jensen
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010
Kim Jensen
 

More from Kim Jensen (20)

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter pack
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web Security
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

DLP Executive Overview

  • 1. THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION Technology Overview, Business Justification, and Resource Requirements
  • 2. Introduction to Data Loss Prevention Intelligent Protection for Digital Assets Although we’ve long recognized the importance of our digital assets, in recent years it has become in- creasingly difficult to effectively protect them. We can’t simply lock the data away behind walls and guards — much of its value is directly tied to our ability to easily and seamlessly use it throughout our organizations, and any security that interferes with business process is likely as damaging as the loss it’s intended to prevent. In the information age, “loss prevention” is no longer To meet these challenges we have seen the emergence limited to reducing theft along the supply chain and of a new technology: Data Loss Prevention. DLP is in retail or office locations. Our most sensitive as- designed to protect information assets with minimal sets are more likely to be found in databases, email, interference in business processes. It provides new and files — rather than in boxes, filing cabinets, and insights into how information is used, and enforces warehouses. From customer lists, payment informa- protective controls to prevent unwanted incidents. tion, and corporate financials, to product and engi- It’s not perfect, and no technology can completely neering plans — the lifeblood of any enterprise is eliminate information loss, but in combination with found as much in electronic bits on networks and appropriate security processes DLP can reduce risk, laptops as in offices, retail stores, manufacturing improve data management practices, and even lower plants, and shipments. certain compliance costs. Defining Data Loss Prevention (DLP) suites combine an array of technologies to pro- In practice you define what information you want to This definition encapsulates the core components tect information throughout its lifecycle, with mini- find or protect, then use DLP to automatically locate of a DLP solution: centralized management, iden- mal impact on business process. They accomplish where it’s stored, where it’s being communicated, tification of defined information, monitoring of us- this by ‘understanding’ both the content and context and where it’s being moved (e.g., to laptops or USB age, and protection from policy violations. A DLP of information, matching them against central poli- sticks). You can merely audit and alert if something solution does this in storage, on networks, and on cies, and enforcing business rules. At the core, DLP violates policy, or implement a variety of protective employee computers, using advanced analysis tech- uses deep content analysis to peer inside files and actions. niques. While there are tools that just solve parts of network communications to identify sensitive con- the problem (such as endpoint-only tools) we gener- tent, rather than relying on manual processes such We define DLP as: ally recommend full suites which include all the ma- as tagging, watermarking, and hand-classification. jor components, since they provide better protection In other words, DLP actually recognizes the infor- Products that, based on central poli- and are more cost effective in the long term. We’ll mation it is looking at (within limits), and matches it cies, identify, monitor, and protect data describe how it all works later in this report, after to policies set for acceptable use of the content. at rest, in motion, and in use through we outline the business justifications for investing deep content analysis. in DLP. Licensed by Websense — www.websense.com Securosis, L.L.C. — www.securosis.com
  • 3. Reasons to Invest in Data Loss Prevention Example Use Cases for DLP • A retailer uses DLP to inventory their entire storage infrastructure and employee laptops to identify unencrypted credit card numbers which could be in violation of the Payment Card Industry (PCI) Data Security Standard. These reports are first used to remove as much of the data as possible, and then provided to PCI auditors to demonstrate compliance. This cut 3 months off their compliance cycle and reduced PCI audit costs by 20%. • A financial institution uses a full-suite DLP deployment to protect customer financial information. They link the DLP system to their primary customer database, and then monitor network communications and generate alerts if customer records are transmitted without encryption. They use data-at-rest scanning to make sure customer records aren’t stored on employee laptops or on servers except where explicitly permitted, and block the transfer of files with customer records to portable storage Data Loss Prevention is Typically Justified Using Five Drivers: (USB thumb drives). They also allow employees to use personal email, like Hotmail, but block outbound messages with customer records. Since • Risk Reduction: By knowing where your data • Policy Enforcement: Many data management implementation, they’ve seen an 80% reduction is stored and how it’s being used, you can reduce policies in enterprises are difficult or impossible in data misuse and prevented 2 potential data your overall exposure to potential loss. to enforce. DLP supports enforcement of accept- breaches. able use of information, not just security con- • Cost Savings: DLP may help reduce other trols. • An engineering firm uses DLP to track the costs associated with data management and se- movement of sensitive engineering plans for new curity. • Data Security and Threat Management: While products. The plans are normally stored on a central no security tool stops all threats, DLP reduces the server, so the DLP solution monitors that server • Compliance Support: DLP helps reduce the risk of certain malicious activity. and identifies any of those documents, or parts of direct costs associated with some regulatory com- them, being sent outside the organization. pliance, can ease audits, and reduces the risks of certain compliance-related incidents.
  • 4. How DLP Works A Non-Technical Overview Data-In-Motion Rather than talking about specific technology com- When discussing DLP, we use data-in-motion to offers additional options for protection — such ponents, we categorize DLP architectures based on describe content moving around our networks, as automatically routing emails with sensitive where they protect information: data-in-motion for including email, web traffic, instant messaging, and data to a manager for approval before letting email and other network communications, data-at- other communications. We use three components to them out. To achieve this, we just pass email rest for stored data, and data-in-use as for interac- monitor and protect data in motion: traffic through a DLP email component. tions with the data on computers, such as copying it to USB drives. Behind all this is the central man- • Network Monitor: An appliance or server that • Endpoint Software Agent: All organizations agement server where we define polices and manage sniffs your network to identify and monitor your have mobile workers who connect to the incidents. data. Typically these are used in a passive mode, Internet from outside the corporate network, where they just scan all data passing by, but some such as remote workers at home and sales staff As we outline the architecture, keep in mind that tools also proxy traffic to directly block policy at wireless-enabled coffee houses. A software we’re showing you every possible DLP component. violations. Many DLP tools can also work with agent on their computers can monitor and You won’t always need every piece, and in practice existing web gateways to block unacceptable control their network traffic. some pieces are commonly combined together. traffic (including some encrypted traffic), such as someone trying to send a customer list to In practice, the network monitor and email agent are their personal site. usually combined on the central management server, but can be split out for distributed organizations and • Email: Email is a bit different than other network larger businesses. The software agents on laptops traffic, and the most important channel for protect both data-at-rest and data-in-use, so they protecting information. The way email works don’t require multiple packages. Data-At-Rest One of the most valuable capabilities of a DLP so- Agents are also the best option for monitoring and lution is its ability to search deep into stored data to protecting files on employee laptops and desktops. identify sensitive information. Consider the value of 3. Application Integration: Some enterprises use knowing every location where customer records are document management solutions such as Microsoft stored, even if someone’s moved them onto a laptop SharePoint and EMC Documentum. DLP solutions or an unapproved server. We use three components integrate directly with these tools to take advantage for data-at-rest: of their capabilities. 1. Remote Scanning: The DLP solution connects to Just as we can block network traffic to protect the the storage repository, just like a user looking for a data, we have enforcement options for data-at-rest. file. It then scans all files for sensitive data. We can automatically move files to a protected 2. Local Software Agent: Remote scanning uses server to quarantine them, delete them, or some- network bandwidth, so while it can reach anywhere times even encrypt them. users can, it isn’t always the most efficient method. For major repositories, we can install a more effi- cient software agent to scan information locally and then send results back to the management server.
  • 5. How DLP Works Data-In-Use Understanding Content Analysis As we’ve already discussed, we use software agents Deep content analysis is the distinguishing and • Database Matching: The DLP solution connects on employee systems to identify, monitor, and pro- most important feature of Data Loss Prevention. to a database, and only looks for content from that tect data-in-motion and data-at-rest. These same It’s how the DLP solution identifies sensitive database, such as customer records. agents can also protect data-in-use, such as employ- information, which it then matches against policies ees trying to move files to portable storage drives, for enforcement. Two steps occur in content analysis • Statistical: A large volume of documents is using sensitive data in unapproved applications, or — breaking apart files to get to the information, loaded into the system, and the DLP solution even printing the data to take it home. and then the analysis itself. There are six main uses statistical analysis to identify new content content analysis techniques in use, although their that resembles the sources. This is much more Since laptops and desktops aren’t as powerful as availability and effectiveness vary greatly across prone to false positives, but may allow you to servers, and we use them differently, we can’t al- different products. protect new content automatically, instead of ways enforce all the same DLP policies on our end- relying on direct matching. points, and not all endpoint DLP tools provide the • Rules/Expressions: The DLP solution looks same features. Usually we need to make trade-offs for information that matches a defined pattern, • Conceptual: The system uses predefined in the kinds of policies we enforce due to content such as the structure of a credit card or Social dictionaries and rules to find content that matches analysis limitations. Some DLP solutions improve Security Number. an “idea” — such as sexual harassment, job security and performance by using different policies seeking, or industrial espionage. if the endpoint is on the corporate network versus • Partial Document Matching: Documents are remote. submitted to the DLP solution, which then looks • Categories: Pre-defined categories for for complete or partial matches. For example, common types of sensitive data, such as financial Central Management partial document matching can identify a single records or health care information. Often kept paragraph from a protected document pasted up-to-date with current regulatory requirements The central management server is the brains of the into an email, and is very effective for protecting via subscription. DLP solution; it’s where we define policies and man- intellectual property. age workflow, and in many cases it performs some Most DLP solutions allow you to combine different or most of the monitoring and protection functions. analysis techniques into a single policy. Since DLP is focused on a business problem (pro- tecting sensitive information) as opposed to a techni- The Data Loss Prevention Cycle cal problem (network attacks) it’s important for DLP All these features are tied together in the Data Loss Prevention Cycle: products to support both non-technical and technical users. Policy creation shouldn’t demand a degree in computer science, and incident management should be an activity a compliance, risk, or even human re- 1. Define: Build a policy that de- 3. Monitor: Track usage of the sources manager can perform. fines the information to protect, defined information at rest, in and how to protect it. motion, and in use. Generate Other key features include robust reporting; inte- 2. Discover: Use the DLP solu- alerts on policy violations. gration with user directories to tie policies to users tion to find the defined informa- 4. Protect: Quarantine emails, and groups; hierarchical management for multiple tion throughout the organization. relocate files, block copies to systems in large environments; and standard perfor- Relocate or remove information portable storage, and other en- mance, reliability, and management features com- where it shouldn’t be. forcement actions. mon to most security tools.
  • 6. Pricing Models and Resource Expectations DLP Pricing Resource Expectations Data Loss Prevention solution pricing varies by ven- As with pricing, resource requirements vary greatly based on the nature and scale of deployment. dor, but tends to fall into one of a few models. Most DLP solutions are priced as per-user annual sub- • Initial Deployment: Network monitoring and • Ongoing Management: A mid-sized organi- scriptions, with a flat rate for the initial hardware/ remote scanning (for data-at-rest) deploy very zation with a basic deployment typically requires software tiered based on performance. Many DLP rapidly, typically in a matter of hours for small- only 1-2 FTEs for ongoing system management, providers offer perpetual licensing for the equivalent er deployments, and no more than a few days policy creation, and incident handling. This is of a 3-year subscription. Support and maintenance or weeks for larger deployments with multiple often split across a group of employees working fees are normally calculated at 10-20% of overall monitors, using 1-3 Full Time Equivalent (FTE) part time with the system, with one person han- contract value per year, depending on the level of employees. Very complex networks with addi- dling system management and policy creation, support desired. Some vendors split pricing based tional integration requirements require addition- and a group of security, compliance, risk, legal, on which DLP components are deployed (network, al time. Endpoint agent deployment on employee and/or human resources employees dealing with endpoint, and discovery) for organizations which systems and servers varies more, depending on incidents. As deployments scale, we typically wish to phase in their deployments. All vendors of- existing system infrastructure and management. see .25-1 FTE per 10,000 employees, again de- fer volume discounts. This typically demands no more effort than any pending on the number and nature of policies de- other piece of software, with little initial config- ployed. Some mid-sized organizations find they Street pricing varies widely, and the following ex- uration, since tuning occurs later on the central use considerably less than a single FTE. amples are just rough estimates to give you an idea management server. of what to expect. For a mid-sized organization of 5,000 employees, pricing for only network monitor- • Initial Configuration: This includes develop- ing usually costs in the neighborhood of $100,000, ment of initial policies, integration of the system while a full-suite deployment (with endpoint, dis- with existing infrastructure such as user directo- covery, multiple systems, and infrastructure inte- ries, and testing and deployment of initial poli- gration) can grow to $300,000-$500,000. Larger cies. Although basic policies can be deployed in organizations can expect the customary significant days, expect to spend 3-6 months tuning the volume discounts. initial set, defining workflow, and building pro- cesses to manage incidents. Mid-size organiza- tions typically require a single FTE to manage the system and develop policies, with additional part-time FTEs to manage incidents. Summary Data Loss Prevention is a powerful tool for pro- and desktops through deep content analysis, which tecting information assets. DLP identifies sensitive allows you to define what information to protect and information, monitors its use, and protects it from how to protect it. DLP isn’t perfect, and can’t stop all abuse. DLP tools accomplish this by monitoring misuse of information or malicious attacks, but is a your network, scanning your storage infrastructure, powerful tool for reducing compliance costs and the and tracking data use on endpoints such as laptops risks of information loss and data breaches.