Data loss prevention

What is Data Loss prevention ?

Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can transfer.

Data Loss prevention Tools

DLP products come in three categories: perimeter-based, client-based and those that take a combined approach. In this test, we evaluated perimeter-based appliances from Fidelis Security Systems, Palisade Systems, Code Green Networksand GTB Technologies.

 Some of the products that did well at detecting harmful files were less adept at blocking.

 None of the products were able to analyze or block encrypted traffic.

 There’s a network performance hit that needs to be taken into account when running these products in-line.

Installation

Generally DLP vendors deploy engineers to the customer site to set up and configure the device, but we decided to do it ourselves to get a hands-on understanding of how the product works from installation through reporting.

Configuration: Code Green is tops

Code Green’s Content Inspector was the easiest product to configure and write rules for. The rule language is simple and the graphical interface is very usable. Code Green breaks rule creation down into two categories: data and policy. One defines data to be blocked using a variety of tools, and then configures a policy to check for it. This was very straightforward and easy to change, with no need to restart the device or reload the settings. In the configuration simplicity arena, Code Green goes above and beyond all the other products.

Fingerprinting: GTB Inspector gets high marks

Fingerprinting is a concept that is implemented fairly well in these DLP products. Fingerprinting will hash a file and look for parts of that file leaving the network.

Code Green, Fidelis are tops

One of the most useful parts of a DLP product is its reporting feature. For an administrator, knowing what a product is seeing and blocking is extremely useful.

What is Data Mining?

Symantec Data Loss Prevention

Implement DLP at the core of your Data Protection plan

Data privacy regulations, such as GDPR require you to ensure sensitive data is properly managed.  Symantec DLP is configured to identify sensitive data (including that defined by GDPR) and uses a variety of advanced data detection techniques to identify data in many forms.

  • Confidently identify regulated data, track its use, and location
  • Protection policies allow you to block the flow of sensitive data
  • Integrate with encryption and CASB technologies to protect email, removable media, individual files and data in the cloud

5 best data loss prevention software

Data loss prevention software. Data loss prevention software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in-use (endpoint actions), in-motion (network traffic), and at-rest (data storage).

1. Symantec Data Loss Prevention

2. Trustwave Data Loss Prevention

3. McAfee Total Protection for Data Loss Prevention

4. Check Point Data Loss Prevention

5. Digital Guardian Endpoint DLP

Data loss prevention Solution

Deeper analysis and fingerprinting

Analyze email content in detail. When needed, block parts of outgoing email and similar content from being sent. Email DLP also looks for all standard forms of restricted content, such as PCI, HIPAA, FINRA and other regulated material.

Data Loss Prevention: Best Practices for Success

Data loss prevention (DLP) is a critical part of comprehensive data-centric security. The technology is designed to perform both content inspection and contextual analysis in order to prevent the loss of data. It is often thought of as a way to keep users from uploading sensitive information into email, cloud storage services and unauthorized file transfer platforms.

Proper Preparation

DLP requires careful planning, including the development of clear and achievable goals and the establishment of proper expectations among executives and business unit leaders. While there are numerous considerations when preparing for a DLP deployment, it is important not to overlook the following five factors:

1. Deployment Strategy

2. Encrypted Traffic

3. Alignment with Business Units

4. Endpoint Standardization

5. Cloud and Mobile Issues

Big Data Trends 2018

Data Loss Prevention Policy

Data Loss Prevention (DLP) controls accidental data loss. DLP enables you to monitor and restrict the transfer of files containing sensitive data. For example, you can prevent a user sending a file containing sensitive data home using web-based email.

You do this by creating rules, see Data Loss Prevention Rules. You then add the rules to policies, as described below. You can then apply these policies to users, computers and Windows servers, see About Policies.

Data Loss Prevention (DLP) policies include one or more rules that specify conditions and actions to be taken when the rule is matched. When a DLP policy contains several rules, a file that matches any of the rules in the DLP policy violates the policy. A rule can be included in multiple policies. You can add text to the messages shown on protected endpoints or Windows servers when the rules are triggered. There are two types of message:

  • A confirmation notification that asks the user to confirm the file transfer.
  • A block notification that informs the user that they cannot transfer the file.

You can create custom policies or policies from templates. The templates cover standard data protection for different regions. You can apply these policies to users, computers or Windows servers.

Data Loss Prevention Companies

  • Blue Coat Systems. …
  • Check Point Software. …
  • CipherCloud. …
  • Cisco Systems. …
  • Code Green Networks. …
  • Device Lock. …
  • Digital Guardian. …
  • Drainware…

Data leak detection
Sometimes a data distributor gives sensitive data to one or more third parties. Sometime later, some of the data is found in an unauthorized place (e.g., on the web or on a user’s laptop). The distributor must then investigate the source of the leak.

Data at-rest
“Data at rest” specifically refers to old archived information. This information is of great concern to businesses and government institutions simply because the longer data is left unused in storage, the more likely it might be retrieved by unauthorized individuals. Protecting such data involves methods such as access control, data encryption and data retention policies.

Data in-use
“Data in use” refers to data that the user is currently interacting with. DLP systems that protect data in-use may monitor and flag unauthorized activities.These activities include screen-capture, copy/paste, print and fax operations involving sensitive data. It can be intentional or unintentional attempts to transmit sensitive data over communication channels.

Data in-motion
“Data in motion” is data that is traversing through a network to an endpoint destination. Networks can be internal or external. DLP systems that protect data in-motion monitor sensitive data traveling across a network through various communication channels.

Why Is Data Loss Prevention Important?

According to a Gartner CISO survey, data loss prevention (DLP) is a top priority for CISOs. Data loss prevention (DLP) is typically defined as any solution or process that identifies confidential data, tracks that data as it moves through and out of the enterprise and prevents unauthorized disclosure of data by creating and enforcing disclosure policies. Since confidential data can reside on a variety of computing devices (physical servers, virtual servers, databases, file servers, PCs, point-of-sale devices, flash drives and mobile devices) and move through a variety of network access points (wireline, wireless, VPNs, etc.), there are a variety of solutions that are tackling the problem of data loss, data recovery and data leaks.

Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this: