SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
THE EXECUTIVE GUIDE TO
     DATA LOSS PREVENTION




Technology Overview, Business Justification, and Resource Requirements
Introduction to Data Loss Prevention
Intelligent Protection for Digital Assets
                                                          Although we’ve long recognized the importance of
                                                          our digital assets, in recent years it has become in-
                                                          creasingly difficult to effectively protect them. We
                                                          can’t simply lock the data away behind walls and
                                                          guards — much of its value is directly tied to our
                                                          ability to easily and seamlessly use it throughout our
                                                          organizations, and any security that interferes with
                                                          business process is likely as damaging as the loss it’s
                                                          intended to prevent.

In the information age, “loss prevention” is no longer    To meet these challenges we have seen the emergence
limited to reducing theft along the supply chain and      of a new technology: Data Loss Prevention. DLP is
in retail or office locations. Our most sensitive as-     designed to protect information assets with minimal
sets are more likely to be found in databases, email,     interference in business processes. It provides new
and files — rather than in boxes, filing cabinets, and    insights into how information is used, and enforces
warehouses. From customer lists, payment informa-         protective controls to prevent unwanted incidents.
tion, and corporate financials, to product and engi-      It’s not perfect, and no technology can completely
neering plans — the lifeblood of any enterprise is        eliminate information loss, but in combination with
found as much in electronic bits on networks and          appropriate security processes DLP can reduce risk,
laptops as in offices, retail stores, manufacturing       improve data management practices, and even lower
plants, and shipments.                                    certain compliance costs.

Defining Data Loss Prevention
(DLP) suites combine an array of technologies to pro-     In practice you define what information you want to       This definition encapsulates the core components
tect information throughout its lifecycle, with mini-     find or protect, then use DLP to automatically locate     of a DLP solution: centralized management, iden-
mal impact on business process. They accomplish           where it’s stored, where it’s being communicated,         tification of defined information, monitoring of us-
this by ‘understanding’ both the content and context      and where it’s being moved (e.g., to laptops or USB       age, and protection from policy violations. A DLP
of information, matching them against central poli-       sticks). You can merely audit and alert if something      solution does this in storage, on networks, and on
cies, and enforcing business rules. At the core, DLP      violates policy, or implement a variety of protective     employee computers, using advanced analysis tech-
uses deep content analysis to peer inside files and       actions.                                                  niques. While there are tools that just solve parts of
network communications to identify sensitive con-                                                                   the problem (such as endpoint-only tools) we gener-
tent, rather than relying on manual processes such        We define DLP as:                                         ally recommend full suites which include all the ma-
as tagging, watermarking, and hand-classification.                                                                  jor components, since they provide better protection
In other words, DLP actually recognizes the infor-          Products that, based on central poli-                   and are more cost effective in the long term. We’ll
mation it is looking at (within limits), and matches it     cies, identify, monitor, and protect data               describe how it all works later in this report, after
to policies set for acceptable use of the content.          at rest, in motion, and in use through                  we outline the business justifications for investing
                                                                     deep content analysis.                         in DLP.

                               Licensed by Websense — www.websense.com                                                Securosis, L.L.C. — www.securosis.com
Reasons to Invest in Data Loss Prevention
                                                                                                            Example Use Cases for DLP
                                                                                                            • A retailer uses DLP to inventory their entire
                                                                                                            storage infrastructure and employee laptops
                                                                                                            to identify unencrypted credit card numbers
                                                                                                            which could be in violation of the Payment
                                                                                                            Card Industry (PCI) Data Security Standard.
                                                                                                            These reports are first used to remove as much
                                                                                                            of the data as possible, and then provided to PCI
                                                                                                            auditors to demonstrate compliance. This cut 3
                                                                                                            months off their compliance cycle and reduced
                                                                                                            PCI audit costs by 20%.

                                                                                                            • A financial institution uses a full-suite
                                                                                                            DLP deployment to protect customer financial
                                                                                                            information. They link the DLP system to their
                                                                                                            primary customer database, and then monitor
                                                                                                            network communications and generate alerts
                                                                                                            if customer records are transmitted without
                                                                                                            encryption. They use data-at-rest scanning to
                                                                                                            make sure customer records aren’t stored on
                                                                                                            employee laptops or on servers except where
                                                                                                            explicitly permitted, and block the transfer of
                                                                                                            files with customer records to portable storage
Data Loss Prevention is Typically Justified Using Five Drivers:                                             (USB thumb drives). They also allow employees
                                                                                                            to use personal email, like Hotmail, but block
                                                                                                            outbound messages with customer records. Since
 • Risk Reduction: By knowing where your data         • Policy Enforcement: Many data management            implementation, they’ve seen an 80% reduction
 is stored and how it’s being used, you can reduce    policies in enterprises are difficult or impossible   in data misuse and prevented 2 potential data
 your overall exposure to potential loss.             to enforce. DLP supports enforcement of accept-       breaches.
                                                      able use of information, not just security con-
 • Cost Savings: DLP may help reduce other            trols.                                                • An engineering firm uses DLP to track the
 costs associated with data management and se-                                                              movement of sensitive engineering plans for new
 curity.                                              • Data Security and Threat Management: While          products. The plans are normally stored on a central
                                                      no security tool stops all threats, DLP reduces the   server, so the DLP solution monitors that server
 • Compliance Support: DLP helps reduce the           risk of certain malicious activity.                   and identifies any of those documents, or parts of
 direct costs associated with some regulatory com-                                                          them, being sent outside the organization.
 pliance, can ease audits, and reduces the risks of
 certain compliance-related incidents.
How DLP Works
A Non-Technical Overview                                Data-In-Motion
Rather than talking about specific technology com-      When discussing DLP, we use data-in-motion to                  offers additional options for protection — such
ponents, we categorize DLP architectures based on       describe content moving around our networks,                   as automatically routing emails with sensitive
where they protect information: data-in-motion for      including email, web traffic, instant messaging, and           data to a manager for approval before letting
email and other network communications, data-at-        other communications. We use three components to               them out. To achieve this, we just pass email
rest for stored data, and data-in-use as for interac-   monitor and protect data in motion:                            traffic through a DLP email component.
tions with the data on computers, such as copying
it to USB drives. Behind all this is the central man-   •   Network Monitor: An appliance or server that           •   Endpoint Software Agent: All organizations
agement server where we define polices and manage           sniffs your network to identify and monitor your           have mobile workers who connect to the
incidents.                                                  data. Typically these are used in a passive mode,          Internet from outside the corporate network,
                                                            where they just scan all data passing by, but some         such as remote workers at home and sales staff
As we outline the architecture, keep in mind that           tools also proxy traffic to directly block policy          at wireless-enabled coffee houses. A software
we’re showing you every possible DLP component.             violations. Many DLP tools can also work with              agent on their computers can monitor and
You won’t always need every piece, and in practice          existing web gateways to block unacceptable                control their network traffic.
some pieces are commonly combined together.                 traffic (including some encrypted traffic), such
                                                            as someone trying to send a customer list to           In practice, the network monitor and email agent are
                                                            their personal site.                                   usually combined on the central management server,
                                                                                                                   but can be split out for distributed organizations and
                                                        •   Email: Email is a bit different than other network     larger businesses. The software agents on laptops
                                                            traffic, and the most important channel for            protect both data-at-rest and data-in-use, so they
                                                            protecting information. The way email works            don’t require multiple packages.

                                                        Data-At-Rest
                                                        One of the most valuable capabilities of a DLP so-         Agents are also the best option for monitoring and
                                                        lution is its ability to search deep into stored data to   protecting files on employee laptops and desktops.
                                                        identify sensitive information. Consider the value of      3. Application Integration: Some enterprises use
                                                        knowing every location where customer records are          document management solutions such as Microsoft
                                                        stored, even if someone’s moved them onto a laptop         SharePoint and EMC Documentum. DLP solutions
                                                        or an unapproved server. We use three components           integrate directly with these tools to take advantage
                                                        for data-at-rest:                                          of their capabilities.
                                                        1. Remote Scanning: The DLP solution connects to           Just as we can block network traffic to protect the
                                                        the storage repository, just like a user looking for a     data, we have enforcement options for data-at-rest.
                                                        file. It then scans all files for sensitive data.          We can automatically move files to a protected
                                                        2. Local Software Agent: Remote scanning uses              server to quarantine them, delete them, or some-
                                                        network bandwidth, so while it can reach anywhere          times even encrypt them.
                                                        users can, it isn’t always the most efficient method.
                                                        For major repositories, we can install a more effi-
                                                        cient software agent to scan information locally and
                                                        then send results back to the management server.
How DLP Works
Data-In-Use                                              Understanding Content Analysis
As we’ve already discussed, we use software agents       Deep content analysis is the distinguishing and           • Database Matching: The DLP solution connects
on employee systems to identify, monitor, and pro-       most important feature of Data Loss Prevention.           to a database, and only looks for content from that
tect data-in-motion and data-at-rest. These same         It’s how the DLP solution identifies sensitive            database, such as customer records.
agents can also protect data-in-use, such as employ-     information, which it then matches against policies
ees trying to move files to portable storage drives,     for enforcement. Two steps occur in content analysis      • Statistical: A large volume of documents is
using sensitive data in unapproved applications, or      — breaking apart files to get to the information,         loaded into the system, and the DLP solution
even printing the data to take it home.                  and then the analysis itself. There are six main          uses statistical analysis to identify new content
                                                         content analysis techniques in use, although their        that resembles the sources. This is much more
Since laptops and desktops aren’t as powerful as         availability and effectiveness vary greatly across        prone to false positives, but may allow you to
servers, and we use them differently, we can’t al-       different products.                                       protect new content automatically, instead of
ways enforce all the same DLP policies on our end-                                                                 relying on direct matching.
points, and not all endpoint DLP tools provide the         • Rules/Expressions: The DLP solution looks
same features. Usually we need to make trade-offs          for information that matches a defined pattern,         • Conceptual: The system uses predefined
in the kinds of policies we enforce due to content         such as the structure of a credit card or Social        dictionaries and rules to find content that matches
analysis limitations. Some DLP solutions improve           Security Number.                                        an “idea” — such as sexual harassment, job
security and performance by using different policies                                                               seeking, or industrial espionage.
if the endpoint is on the corporate network versus         • Partial Document Matching: Documents are
remote.                                                    submitted to the DLP solution, which then looks         • Categories: Pre-defined categories for
                                                           for complete or partial matches. For example,           common types of sensitive data, such as financial
Central Management                                         partial document matching can identify a single         records or health care information. Often kept
                                                           paragraph from a protected document pasted              up-to-date with current regulatory requirements
The central management server is the brains of the         into an email, and is very effective for protecting     via subscription.
DLP solution; it’s where we define policies and man-       intellectual property.
age workflow, and in many cases it performs some                                                                 Most DLP solutions allow you to combine different
or most of the monitoring and protection functions.                                                              analysis techniques into a single policy.
Since DLP is focused on a business problem (pro-
tecting sensitive information) as opposed to a techni-   The Data Loss Prevention Cycle
cal problem (network attacks) it’s important for DLP     All these features are tied together in the Data Loss Prevention Cycle:
products to support both non-technical and technical
users. Policy creation shouldn’t demand a degree in
computer science, and incident management should
be an activity a compliance, risk, or even human re-     1. Define: Build a policy that de-    3. Monitor: Track usage of the
sources manager can perform.                             fines the information to protect,     defined information at rest, in
                                                         and how to protect it.                motion, and in use. Generate
Other key features include robust reporting; inte-       2. Discover: Use the DLP solu-        alerts on policy violations.
gration with user directories to tie policies to users   tion to find the defined informa-     4. Protect: Quarantine emails,
and groups; hierarchical management for multiple         tion throughout the organization.     relocate files, block copies to
systems in large environments; and standard perfor-      Relocate or remove information        portable storage, and other en-
mance, reliability, and management features com-         where it shouldn’t be.                forcement actions.
mon to most security tools.
Pricing Models and Resource Expectations
DLP Pricing                                              Resource Expectations
Data Loss Prevention solution pricing varies by ven-     As with pricing, resource requirements vary greatly based on the nature and scale of deployment.
dor, but tends to fall into one of a few models. Most
DLP solutions are priced as per-user annual sub-           • Initial Deployment: Network monitoring and            • Ongoing Management: A mid-sized organi-
scriptions, with a flat rate for the initial hardware/     remote scanning (for data-at-rest) deploy very          zation with a basic deployment typically requires
software tiered based on performance. Many DLP             rapidly, typically in a matter of hours for small-      only 1-2 FTEs for ongoing system management,
providers offer perpetual licensing for the equivalent     er deployments, and no more than a few days             policy creation, and incident handling. This is
of a 3-year subscription. Support and maintenance          or weeks for larger deployments with multiple           often split across a group of employees working
fees are normally calculated at 10-20% of overall          monitors, using 1-3 Full Time Equivalent (FTE)          part time with the system, with one person han-
contract value per year, depending on the level of         employees. Very complex networks with addi-             dling system management and policy creation,
support desired. Some vendors split pricing based          tional integration requirements require addition-       and a group of security, compliance, risk, legal,
on which DLP components are deployed (network,             al time. Endpoint agent deployment on employee          and/or human resources employees dealing with
endpoint, and discovery) for organizations which           systems and servers varies more, depending on           incidents. As deployments scale, we typically
wish to phase in their deployments. All vendors of-        existing system infrastructure and management.          see .25-1 FTE per 10,000 employees, again de-
fer volume discounts.                                      This typically demands no more effort than any          pending on the number and nature of policies de-
                                                           other piece of software, with little initial config-    ployed. Some mid-sized organizations find they
Street pricing varies widely, and the following ex-        uration, since tuning occurs later on the central       use considerably less than a single FTE.
amples are just rough estimates to give you an idea        management server.
of what to expect. For a mid-sized organization of
5,000 employees, pricing for only network monitor-         • Initial Configuration: This includes develop-
ing usually costs in the neighborhood of $100,000,         ment of initial policies, integration of the system
while a full-suite deployment (with endpoint, dis-         with existing infrastructure such as user directo-
covery, multiple systems, and infrastructure inte-         ries, and testing and deployment of initial poli-
gration) can grow to $300,000-$500,000. Larger             cies. Although basic policies can be deployed in
organizations can expect the customary significant         days, expect to spend 3-6 months tuning the
volume discounts.                                          initial set, defining workflow, and building pro-
                                                           cesses to manage incidents. Mid-size organiza-
                                                           tions typically require a single FTE to manage
                                                           the system and develop policies, with additional
                                                           part-time FTEs to manage incidents.



                                                         Summary
                                                         Data Loss Prevention is a powerful tool for pro-         and desktops through deep content analysis, which
                                                         tecting information assets. DLP identifies sensitive     allows you to define what information to protect and
                                                         information, monitors its use, and protects it from      how to protect it. DLP isn’t perfect, and can’t stop all
                                                         abuse. DLP tools accomplish this by monitoring           misuse of information or malicious attacks, but is a
                                                         your network, scanning your storage infrastructure,      powerful tool for reducing compliance costs and the
                                                         and tracking data use on endpoints such as laptops       risks of information loss and data breaches.

Más contenido relacionado

La actualidad más candente

Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationWatchful Software
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification PresentationDerroylo
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWSylvain Martinez
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityEryk Budi Pratama
 
State of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetCrowdStrike
 

La actualidad más candente (20)

Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data Classification
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification Presentation
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
DLP
DLPDLP
DLP
 
DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEW
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 
State of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers Mindset
 
Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 

Destacado

The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionDigital Guardian
 
Wccp introduction final2
Wccp introduction final2Wccp introduction final2
Wccp introduction final2bui thequan
 
What Does a Data Breach Cost?
What Does a Data Breach Cost?What Does a Data Breach Cost?
What Does a Data Breach Cost?CBT Nuggets
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDDATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDPriyanka Aash
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Planbenefitexpress
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionBlue Coat
 
The Anatomy of a Data Breach
The Anatomy of a Data BreachThe Anatomy of a Data Breach
The Anatomy of a Data BreachDavid Hunt
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Blue Coat
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider ThreatLancope, Inc.
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Groupaengelbert
 

Destacado (10)

The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
Wccp introduction final2
Wccp introduction final2Wccp introduction final2
Wccp introduction final2
 
What Does a Data Breach Cost?
What Does a Data Breach Cost?What Does a Data Breach Cost?
What Does a Data Breach Cost?
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDDATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
 
The Anatomy of a Data Breach
The Anatomy of a Data BreachThe Anatomy of a Data Breach
The Anatomy of a Data Breach
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider Threat
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
 

Similar a DLP Executive Overview

10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the CloudPeak 10
 
Software_defines_the_future_infrastructure (1)_final
Software_defines_the_future_infrastructure (1)_finalSoftware_defines_the_future_infrastructure (1)_final
Software_defines_the_future_infrastructure (1)_finalKhiro Mishra
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trendsChristopher Bennett
 
10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the CloudIron Mountain
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationTejaswi Agarwal
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxalex hincapie
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET Journal
 
Gtb Dlp & Irm Solution Product And Deployment Overview
Gtb Dlp & Irm Solution   Product And Deployment OverviewGtb Dlp & Irm Solution   Product And Deployment Overview
Gtb Dlp & Irm Solution Product And Deployment Overviewgtbsalesindia
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptxTranVu383073
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...Manish Sahani
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security ChallengesSTO STRATEGY
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudIRJET Journal
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET Journal
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
data-leakage-prevention
 data-leakage-prevention data-leakage-prevention
data-leakage-preventionanuepcet
 
BMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 YearsBMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 YearsChris Farwell
 

Similar a DLP Executive Overview (20)

10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 
Software_defines_the_future_infrastructure (1)_final
Software_defines_the_future_infrastructure (1)_finalSoftware_defines_the_future_infrastructure (1)_final
Software_defines_the_future_infrastructure (1)_final
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
 
Gtb Dlp & Irm Solution Product And Deployment Overview
Gtb Dlp & Irm Solution   Product And Deployment OverviewGtb Dlp & Irm Solution   Product And Deployment Overview
Gtb Dlp & Irm Solution Product And Deployment Overview
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security Challenges
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
data-leakage-prevention
 data-leakage-prevention data-leakage-prevention
data-leakage-prevention
 
234 237
234 237234 237
234 237
 
234 237
234 237234 237
234 237
 
BMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 YearsBMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 Years
 

Más de Kim Jensen

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsKim Jensen
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter packKim Jensen
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedKim Jensen
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Kim Jensen
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003Kim Jensen
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Kim Jensen
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportKim Jensen
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat ReportKim Jensen
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UKKim Jensen
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Kim Jensen
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012Kim Jensen
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Kim Jensen
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Kim Jensen
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011Kim Jensen
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Kim Jensen
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web SecurityKim Jensen
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Kim Jensen
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011Kim Jensen
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Kim Jensen
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Kim Jensen
 

Más de Kim Jensen (20)

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter pack
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web Security
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

DLP Executive Overview

  • 1. THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION Technology Overview, Business Justification, and Resource Requirements
  • 2. Introduction to Data Loss Prevention Intelligent Protection for Digital Assets Although we’ve long recognized the importance of our digital assets, in recent years it has become in- creasingly difficult to effectively protect them. We can’t simply lock the data away behind walls and guards — much of its value is directly tied to our ability to easily and seamlessly use it throughout our organizations, and any security that interferes with business process is likely as damaging as the loss it’s intended to prevent. In the information age, “loss prevention” is no longer To meet these challenges we have seen the emergence limited to reducing theft along the supply chain and of a new technology: Data Loss Prevention. DLP is in retail or office locations. Our most sensitive as- designed to protect information assets with minimal sets are more likely to be found in databases, email, interference in business processes. It provides new and files — rather than in boxes, filing cabinets, and insights into how information is used, and enforces warehouses. From customer lists, payment informa- protective controls to prevent unwanted incidents. tion, and corporate financials, to product and engi- It’s not perfect, and no technology can completely neering plans — the lifeblood of any enterprise is eliminate information loss, but in combination with found as much in electronic bits on networks and appropriate security processes DLP can reduce risk, laptops as in offices, retail stores, manufacturing improve data management practices, and even lower plants, and shipments. certain compliance costs. Defining Data Loss Prevention (DLP) suites combine an array of technologies to pro- In practice you define what information you want to This definition encapsulates the core components tect information throughout its lifecycle, with mini- find or protect, then use DLP to automatically locate of a DLP solution: centralized management, iden- mal impact on business process. They accomplish where it’s stored, where it’s being communicated, tification of defined information, monitoring of us- this by ‘understanding’ both the content and context and where it’s being moved (e.g., to laptops or USB age, and protection from policy violations. A DLP of information, matching them against central poli- sticks). You can merely audit and alert if something solution does this in storage, on networks, and on cies, and enforcing business rules. At the core, DLP violates policy, or implement a variety of protective employee computers, using advanced analysis tech- uses deep content analysis to peer inside files and actions. niques. While there are tools that just solve parts of network communications to identify sensitive con- the problem (such as endpoint-only tools) we gener- tent, rather than relying on manual processes such We define DLP as: ally recommend full suites which include all the ma- as tagging, watermarking, and hand-classification. jor components, since they provide better protection In other words, DLP actually recognizes the infor- Products that, based on central poli- and are more cost effective in the long term. We’ll mation it is looking at (within limits), and matches it cies, identify, monitor, and protect data describe how it all works later in this report, after to policies set for acceptable use of the content. at rest, in motion, and in use through we outline the business justifications for investing deep content analysis. in DLP. Licensed by Websense — www.websense.com Securosis, L.L.C. — www.securosis.com
  • 3. Reasons to Invest in Data Loss Prevention Example Use Cases for DLP • A retailer uses DLP to inventory their entire storage infrastructure and employee laptops to identify unencrypted credit card numbers which could be in violation of the Payment Card Industry (PCI) Data Security Standard. These reports are first used to remove as much of the data as possible, and then provided to PCI auditors to demonstrate compliance. This cut 3 months off their compliance cycle and reduced PCI audit costs by 20%. • A financial institution uses a full-suite DLP deployment to protect customer financial information. They link the DLP system to their primary customer database, and then monitor network communications and generate alerts if customer records are transmitted without encryption. They use data-at-rest scanning to make sure customer records aren’t stored on employee laptops or on servers except where explicitly permitted, and block the transfer of files with customer records to portable storage Data Loss Prevention is Typically Justified Using Five Drivers: (USB thumb drives). They also allow employees to use personal email, like Hotmail, but block outbound messages with customer records. Since • Risk Reduction: By knowing where your data • Policy Enforcement: Many data management implementation, they’ve seen an 80% reduction is stored and how it’s being used, you can reduce policies in enterprises are difficult or impossible in data misuse and prevented 2 potential data your overall exposure to potential loss. to enforce. DLP supports enforcement of accept- breaches. able use of information, not just security con- • Cost Savings: DLP may help reduce other trols. • An engineering firm uses DLP to track the costs associated with data management and se- movement of sensitive engineering plans for new curity. • Data Security and Threat Management: While products. The plans are normally stored on a central no security tool stops all threats, DLP reduces the server, so the DLP solution monitors that server • Compliance Support: DLP helps reduce the risk of certain malicious activity. and identifies any of those documents, or parts of direct costs associated with some regulatory com- them, being sent outside the organization. pliance, can ease audits, and reduces the risks of certain compliance-related incidents.
  • 4. How DLP Works A Non-Technical Overview Data-In-Motion Rather than talking about specific technology com- When discussing DLP, we use data-in-motion to offers additional options for protection — such ponents, we categorize DLP architectures based on describe content moving around our networks, as automatically routing emails with sensitive where they protect information: data-in-motion for including email, web traffic, instant messaging, and data to a manager for approval before letting email and other network communications, data-at- other communications. We use three components to them out. To achieve this, we just pass email rest for stored data, and data-in-use as for interac- monitor and protect data in motion: traffic through a DLP email component. tions with the data on computers, such as copying it to USB drives. Behind all this is the central man- • Network Monitor: An appliance or server that • Endpoint Software Agent: All organizations agement server where we define polices and manage sniffs your network to identify and monitor your have mobile workers who connect to the incidents. data. Typically these are used in a passive mode, Internet from outside the corporate network, where they just scan all data passing by, but some such as remote workers at home and sales staff As we outline the architecture, keep in mind that tools also proxy traffic to directly block policy at wireless-enabled coffee houses. A software we’re showing you every possible DLP component. violations. Many DLP tools can also work with agent on their computers can monitor and You won’t always need every piece, and in practice existing web gateways to block unacceptable control their network traffic. some pieces are commonly combined together. traffic (including some encrypted traffic), such as someone trying to send a customer list to In practice, the network monitor and email agent are their personal site. usually combined on the central management server, but can be split out for distributed organizations and • Email: Email is a bit different than other network larger businesses. The software agents on laptops traffic, and the most important channel for protect both data-at-rest and data-in-use, so they protecting information. The way email works don’t require multiple packages. Data-At-Rest One of the most valuable capabilities of a DLP so- Agents are also the best option for monitoring and lution is its ability to search deep into stored data to protecting files on employee laptops and desktops. identify sensitive information. Consider the value of 3. Application Integration: Some enterprises use knowing every location where customer records are document management solutions such as Microsoft stored, even if someone’s moved them onto a laptop SharePoint and EMC Documentum. DLP solutions or an unapproved server. We use three components integrate directly with these tools to take advantage for data-at-rest: of their capabilities. 1. Remote Scanning: The DLP solution connects to Just as we can block network traffic to protect the the storage repository, just like a user looking for a data, we have enforcement options for data-at-rest. file. It then scans all files for sensitive data. We can automatically move files to a protected 2. Local Software Agent: Remote scanning uses server to quarantine them, delete them, or some- network bandwidth, so while it can reach anywhere times even encrypt them. users can, it isn’t always the most efficient method. For major repositories, we can install a more effi- cient software agent to scan information locally and then send results back to the management server.
  • 5. How DLP Works Data-In-Use Understanding Content Analysis As we’ve already discussed, we use software agents Deep content analysis is the distinguishing and • Database Matching: The DLP solution connects on employee systems to identify, monitor, and pro- most important feature of Data Loss Prevention. to a database, and only looks for content from that tect data-in-motion and data-at-rest. These same It’s how the DLP solution identifies sensitive database, such as customer records. agents can also protect data-in-use, such as employ- information, which it then matches against policies ees trying to move files to portable storage drives, for enforcement. Two steps occur in content analysis • Statistical: A large volume of documents is using sensitive data in unapproved applications, or — breaking apart files to get to the information, loaded into the system, and the DLP solution even printing the data to take it home. and then the analysis itself. There are six main uses statistical analysis to identify new content content analysis techniques in use, although their that resembles the sources. This is much more Since laptops and desktops aren’t as powerful as availability and effectiveness vary greatly across prone to false positives, but may allow you to servers, and we use them differently, we can’t al- different products. protect new content automatically, instead of ways enforce all the same DLP policies on our end- relying on direct matching. points, and not all endpoint DLP tools provide the • Rules/Expressions: The DLP solution looks same features. Usually we need to make trade-offs for information that matches a defined pattern, • Conceptual: The system uses predefined in the kinds of policies we enforce due to content such as the structure of a credit card or Social dictionaries and rules to find content that matches analysis limitations. Some DLP solutions improve Security Number. an “idea” — such as sexual harassment, job security and performance by using different policies seeking, or industrial espionage. if the endpoint is on the corporate network versus • Partial Document Matching: Documents are remote. submitted to the DLP solution, which then looks • Categories: Pre-defined categories for for complete or partial matches. For example, common types of sensitive data, such as financial Central Management partial document matching can identify a single records or health care information. Often kept paragraph from a protected document pasted up-to-date with current regulatory requirements The central management server is the brains of the into an email, and is very effective for protecting via subscription. DLP solution; it’s where we define policies and man- intellectual property. age workflow, and in many cases it performs some Most DLP solutions allow you to combine different or most of the monitoring and protection functions. analysis techniques into a single policy. Since DLP is focused on a business problem (pro- tecting sensitive information) as opposed to a techni- The Data Loss Prevention Cycle cal problem (network attacks) it’s important for DLP All these features are tied together in the Data Loss Prevention Cycle: products to support both non-technical and technical users. Policy creation shouldn’t demand a degree in computer science, and incident management should be an activity a compliance, risk, or even human re- 1. Define: Build a policy that de- 3. Monitor: Track usage of the sources manager can perform. fines the information to protect, defined information at rest, in and how to protect it. motion, and in use. Generate Other key features include robust reporting; inte- 2. Discover: Use the DLP solu- alerts on policy violations. gration with user directories to tie policies to users tion to find the defined informa- 4. Protect: Quarantine emails, and groups; hierarchical management for multiple tion throughout the organization. relocate files, block copies to systems in large environments; and standard perfor- Relocate or remove information portable storage, and other en- mance, reliability, and management features com- where it shouldn’t be. forcement actions. mon to most security tools.
  • 6. Pricing Models and Resource Expectations DLP Pricing Resource Expectations Data Loss Prevention solution pricing varies by ven- As with pricing, resource requirements vary greatly based on the nature and scale of deployment. dor, but tends to fall into one of a few models. Most DLP solutions are priced as per-user annual sub- • Initial Deployment: Network monitoring and • Ongoing Management: A mid-sized organi- scriptions, with a flat rate for the initial hardware/ remote scanning (for data-at-rest) deploy very zation with a basic deployment typically requires software tiered based on performance. Many DLP rapidly, typically in a matter of hours for small- only 1-2 FTEs for ongoing system management, providers offer perpetual licensing for the equivalent er deployments, and no more than a few days policy creation, and incident handling. This is of a 3-year subscription. Support and maintenance or weeks for larger deployments with multiple often split across a group of employees working fees are normally calculated at 10-20% of overall monitors, using 1-3 Full Time Equivalent (FTE) part time with the system, with one person han- contract value per year, depending on the level of employees. Very complex networks with addi- dling system management and policy creation, support desired. Some vendors split pricing based tional integration requirements require addition- and a group of security, compliance, risk, legal, on which DLP components are deployed (network, al time. Endpoint agent deployment on employee and/or human resources employees dealing with endpoint, and discovery) for organizations which systems and servers varies more, depending on incidents. As deployments scale, we typically wish to phase in their deployments. All vendors of- existing system infrastructure and management. see .25-1 FTE per 10,000 employees, again de- fer volume discounts. This typically demands no more effort than any pending on the number and nature of policies de- other piece of software, with little initial config- ployed. Some mid-sized organizations find they Street pricing varies widely, and the following ex- uration, since tuning occurs later on the central use considerably less than a single FTE. amples are just rough estimates to give you an idea management server. of what to expect. For a mid-sized organization of 5,000 employees, pricing for only network monitor- • Initial Configuration: This includes develop- ing usually costs in the neighborhood of $100,000, ment of initial policies, integration of the system while a full-suite deployment (with endpoint, dis- with existing infrastructure such as user directo- covery, multiple systems, and infrastructure inte- ries, and testing and deployment of initial poli- gration) can grow to $300,000-$500,000. Larger cies. Although basic policies can be deployed in organizations can expect the customary significant days, expect to spend 3-6 months tuning the volume discounts. initial set, defining workflow, and building pro- cesses to manage incidents. Mid-size organiza- tions typically require a single FTE to manage the system and develop policies, with additional part-time FTEs to manage incidents. Summary Data Loss Prevention is a powerful tool for pro- and desktops through deep content analysis, which tecting information assets. DLP identifies sensitive allows you to define what information to protect and information, monitors its use, and protects it from how to protect it. DLP isn’t perfect, and can’t stop all abuse. DLP tools accomplish this by monitoring misuse of information or malicious attacks, but is a your network, scanning your storage infrastructure, powerful tool for reducing compliance costs and the and tracking data use on endpoints such as laptops risks of information loss and data breaches.