For VendorsBlog
Login

DLP - Data Leak Prevention

DLP - Data Leak Prevention

Data leak prevention (DLP) is a suite of technologies aimed at stemming the loss of sensitive information that occurs in enterprises across the globe. By focusing on the location, classification and monitoring of information at rest, in use and in motion, this solution can go far in helping an enterprise get a handle on what information it has, and in stopping the numerous leaks of information that occur each day. DLP is not a plug-and-play solution. The successful implementation of this technology requires significant preparation and diligent ongoing maintenance. Enterprises seeking to integrate and implement DLP should be prepared for a significant effort that, if done correctly, can greatly reduce risk to the organization. Those implementing the solution must take a strategic approach that addresses risks, impacts and mitigation steps, along with appropriate governance and assurance measures.

The most popular products in category DLP - Data Leak Prevention All category products

Suppliers DLP - Data Leak Prevention

CoSoSys

CoSoSys

CoSoSys offers a rich portfolio of security products and features for device control, data loss prevention (DLP), and eDiscovery for Windows, macOS... Read more
Vendor, Supplier
Digital Guardian

Digital Guardian

Digital Guardian is a vendor and supplier of DLP solutions. Read more
Vendor, Supplier
Falcongaze

Falcongaze

Falcongaze was founded in 2007 and is now a developer and supplier of high-performance data security products. The company provides compound... Read more
Vendor, Supplier

F.A.Q about DLP - Data Leak Prevention

How to protect the company from internal threats associated with leakage of confidential information?

In order to protect against any threat, you must first realize its presence. Unfortunately, not always the management of companies is able to do this if it comes to information security threats. The key to successfully protecting against information leaks and other threats lies in the skillful use of both organizational and technical means of monitoring personnel actions.

How should the personnel management system in the company be organized to minimize the risks of leakage of confidential information?

A company must have a special employee responsible for information security, and a large department must have a department directly reporting to the head of the company.

Which industry representatives are most likely to encounter confidential information leaks?

More than others, representatives of such industries as industry, energy, and retail trade suffer from leaks. Other industries traditionally exposed to leakage risks — banking, insurance, IT — are usually better at protecting themselves from information risks, and for this reason they are less likely to fall into similar situations.

What should be adequate measures to protect against leakage of information for an average company?

For each organization, the question of protection measures should be worked out depending on the specifics of its work, but developing information security policies, instructing employees, delineating access to confidential data and implementing a DLP system are necessary conditions for successful leak protection for any organization. Among all the technical means to prevent information leaks, the DLP system is the most effective today, although its choice must be taken very carefully to get the desired result. So, it should control all possible channels of data leakage, support automatic detection of confidential information in outgoing traffic, maintain control of work laptops that temporarily find themselves outside the corporate network...

Is it possible to give protection against information leaks to outsourcing?

For a small company, this may make sense because it reduces costs. However, it is necessary to carefully select the service provider, preferably before receiving recommendations from its current customers.

What data channels need to be monitored to prevent leakage of confidential information?

All channels used by employees of the organization - e-mail, Skype, HTTP World Wide Web protocol ... It is also necessary to monitor the information recorded on external storage media and sent to print, plus periodically check the workstation or laptop of the user for files that are there saying should not.

What to do when the leak has already happened?

First of all, you need to notify those who might suffer - silence will cost your reputation much more. Secondly, you need to find the source and prevent further leakage. Next, you need to assess where the information could go, and try to somehow agree that it does not spread further. In general, of course, it is easier to prevent the leakage of confidential information than to disentangle its consequences.