This allows your staff the convenience and security of using cloud apps and cloud storage without risk of data breach or loss. Properly deploying DLP security can ensure legal compliance.
DLP also protects against personal data accidentally being copied, pasted, uploaded, or printed to other areas of the network to be used in unintended ways. Data loss prevention software prevents the unauthorized use of all sensitive data by making sure that no person or script can transfer sensitive data to the wrong place. Such attempts will be blocked or restricted. These breaches are sometimes malicious or intentional, but are more often simply caused by human error such as an employee mistakenly attempting to print or email a sensitive document.
No matter what the intent, having a well-configured DLP in place will prevent these mistakes from becoming breaches. This takes the burden of data protection away from human judgement and places it on the software.
These examples of DLP systems keeping data safe are of obvious benefit for IT and security staff, but what is the broader business case? DLPs prevent data breaches, and data breaches are expensive. Having to perform a cleanup on breached data can have an exorbitant price tag. Companies that offer free credit monitoring to clients whose data was exposed, for example, can spend millions on that alone. In addition, it is commonplace for data subjects to take legal action against companies that put their data at risk, which, depending on the scale of the breach, can be crippling.
The most frustrating aspect of working with traditional DLP running is its lack of flexibility and the fact that false positives can be high. This happens because the software is rigid by design. Say, for example, that you have hired a freelancer, and you need to share data with that person.
IT administrators therefore often find themselves in the unenvious position of creating different rules for different users, which ultimately cannot scale across medium or larger organizations, and takes time to implement which can be frustrating for users that "need to send this email now". Often, this leads to DLP rules being relaxed over time, weakening an organization's security posture. Additionally, traditional DLP will not stop all data breaches, such as phishing scams and misdirected emails.
Note that these limitations are specific to traditional DLP security. Advanced data loss prevent software packages, such as those offered by Egress , virtually eliminate the limitations of traditional DLP. Egress Prevent prompts users when they include a recipient that is outside of their normal pattern but who they are technically authorized to email under other circumstances.
For example, the sender is authorized to share financial data externally but never normally sends it Person A at Company X; they usually send it to someone with a similar name at the same company.
They are legitimately allowed to email both recipients; they just normally share different types of data with them. Egress' intelligent DLP will prompt the sender to ensure only authorized recipients are contained within the email, stopping emails from landing in the inboxes of the wrong recipients. The software scans email text and the contents of the attachments to detect potential data breaches before they happen. One thing to consider is that while many DLP vendors have developed their own content engines, some employ third-party technology that is not designed for DLP.
For example, rather than building pattern matching for credit card numbers, a DLP vendor may license technology from a search engine provider to pattern match credit card numbers. When evaluating DLP solutions, pay close attention to the types of patterns detected by each solution against a real corpus of sensitive data to confirm the accuracy of its content engine.
Data protection is one of the primary concerns when adopting cloud services. The average enterprise uses 1, cloud services , and employees often introduce new services on their own. Analyzing cloud usage data for 30 million users, McAfee formerly Skyhigh Networks found that It follows that employing the right DLP solution in the cloud encompassing accuracy, real-time monitoring, analysis of data in motion, incident remediation, and data loss policy authoring is essential for successful cloud adoption.
What is DLP? Download Now. How does DLP work? This technique is an excellent first-pass filter since the rules can be configured and processed quickly, although they can be prone to high false positive rates without checksum validation to identify valid patterns. Popular Topics: Data Protection.
Security News. Threat Research. Industry Insights. Search the Site. Build a successful data loss prevention program with a proven framework. Get the Guide. Related Blog Posts. What is Security as a Service? Chris Brook. What is Data Classification? A Data Classification Definition. Juliana De Groot. What is Advanced Threat Detection? Nate Lord.
0コメント