THE BIG THING in the IT world! Many organizations strive round the clock to secure their information, on premises or in transit or possibly anywhere else. This domain is an ever growing one, where the efforts put in, need to be focused in the right direction otherwise a single misdirection can become a Security Nightmare for your valuable information.
We have simplified this for you by broadly classifying into a Solutions based approach and Services based approach keeping in mind the Confidentiality, Integrity, Availability (CIA) triad
This term needs no further definition as pretty much everyone out there knows that this disciplineis a strategy for making sure that end users do not send sensitive or critical information outside of the corporate network intentional or un-intentional.
So how is DLP different from any other security technology? While tools such as firewalls and IDS/IPS look for anything that can pose a threat to an organization, DLP is interested in identifying sensitive data. It looks for content that is critical to an organization.
It would seem as though DLP is a solution whose only purpose is to prevent data breaches from intruders. While it can prevent such data leaks, more often than not thissolution is used as a mechanism for discovering broken processes in the normal course of business. Such an example would be the presence of sensitive data on an associate’s laptop. Organizations spend abundance of time and money on user awareness training. Hence, one would assume data leaks as a result of actions by an unwitting user should be very minimal. This is not true. We know for a fact that majority of all malware outbreaks companies suffer are due to such user actions. This trend has not changed much even with the ongoing user awareness training.
It would seem as though DLP is a solution whose only purpose is to prevent data breaches from intruders. While it can prevent such data leaks, more often than not thissolution is used as a mechanism for discovering broken processes in the normal course of business. Such an example would be the presence of sensitive data on an associate’s laptop. Organizations spend abundance of time and money on user awareness training. Hence, one would assume data leaks as a result of actions by an unwitting user should be very minimal. This is not true. We know for a fact that majority of all malware outbreaks companies suffer are due to such user actions. This trend has not changed much even with the ongoing user awareness training.
Features to look out for:-