For VendorsBlog

IPC - Information Protection and Control

IPC - Information Protection and Control

Information Protection and Control (IPC) is a technology for protecting confidential information from internal threats. IPC solutions are designed to protect information from internal threats, prevent various types of information leaks, corporate espionage, and business intelligence. The term IPC combines two main technologies: encryption of storage media at all points of the network and control of technical channels of information leakage using Data Loss Prevention (DLP) technologies. Network, application and data access control is a possible third technology in IPC class systems. IPC includes solutions of the Data Loss Prevention (DLP) class, a system for encrypting corporate information and controlling access to it. The term IPC was one of the first to use IDC analyst Brian Burke in his report, Information Protection and Control Survey: Data Loss Prevention and Encryption Trends.

IPC technology is a logical continuation of DLP technology and allows you to protect data not only from leaks through technical channels, that is, insiders, but also from unauthorized user access to the network, information, applications, and in cases where the direct storage medium falls into the hands of third parties. This allows you to prevent leaks in those cases when an insider or a person who does not have legal access to data gain access to the direct carrier of information. For example, removing a hard drive from a personal computer, an insider will not be able to read the information on it. This allows you to prevent the compromise of confidential data even in the event of loss, theft or seizure (for example, when organizing operational events by special services specialists, unscrupulous competitors or raiders).

The main objective of IPC systems is to prevent the transfer of confidential information outside the corporate information system. Such a transfer (leak) may be intentional or unintentional. Practice shows that most of the leaks (more than 75%) do not occur due to malicious intent, but because of errors, carelessness, carelessness, and negligence of employees - it is much easier to detect such cases. The rest is connected with the malicious intent of operators and users of enterprise information systems, in particular, industrial espionage and competitive intelligence. Obviously, malicious insiders, as a rule, try to trick IPC analyzers and other control systems.

The most popular products in category IPC - Information Protection and Control All category products

UserGate Proxy & Firewall
0
0
Check Point программный блейд IPS
0
0
Hideez Key (HK)
0
0
DATIPHY Enterprise Solution
0
0
PREVALENT Third-Party Risk Management Platform
0
0
SINGULAR SECURITY’S Privileged Access Management
0
0
FIREEYE Network Security (NX)
0
0
ISID Industrial Threat Detection
0
0
CLAROTY Platform
0
0
CLAROTY Continuous Threat Detection
0
0
LEIDOS Arena Insider Threat Identification
0
0
FireEye SmartVision
0
0

F.A.Q about IPC - Information Protection and Control

What is Information Protection and Control (IPC)?

IPC (English Information Protection and Control) is a generic name for technology to protect confidential information from internal threats.

IPC solutions are designed to prevent various types of information leaks, corporate espionage, and business intelligence. IPC combines two main technologies: media encryption and control of technical channels of information leakage (Data Loss Prevention - DLP). Also, the functionality of IPC systems may include systems of protection against unauthorized access (unauthorized access).

What are the objectives of IPC class systems?

  • preventing the transfer of confidential information beyond the corporate information system;
  • prevention of outside transmission of not only confidential but also other undesirable information (offensive expressions, spam, eroticism, excessive amounts of data, etc.);
  • preventing the transmission of unwanted information not only from inside to outside but also from outside to inside the organization’s information system;
  • preventing employees from using the Internet and network resources for personal purposes;
  • spam protection;
  • virus protection;
  • optimization of channel loading, reduction of inappropriate traffic;
  • accounting of working hours and presence at the workplace;
  • tracking the reliability of employees, their political views, beliefs, collecting dirt;
  • archiving information in case of accidental deletion or damage to the original;
  • protection against accidental or intentional violation of internal standards;
  • ensuring compliance with standards in the field of information security and current legislation.

Why is DLP technology used in IPC?

IPC DLP technology supports monitoring of the following technical channels for confidential information leakage:

  • corporate email;
  • webmail;
  • social networks and blogs;
  • file-sharing networks;
  • forums and other Internet resources, including those made using AJAX technology;
  • instant messaging tools (ICQ, Mail.Ru Agent, Skype, AOL AIM, Google Talk, Yahoo Messenger, MSN Messenger, etc.);
  • P2P clients;
  • peripheral devices (USB, LPT, COM, WiFi, Bluetooth, etc.);
  • local and network printers.

DLP technologies in IPC support control, including the following communication protocols:

  • FTP;
  • FTP over HTTP;
  • FTPS;
  • HTTP;
  • HTTPS (SSL);
  • NNTP;
  • POP3;
  • SMTP.

What information protection facilities does IPC technology include?

IPC technology includes the ability to encrypt information at all key points in the network. The objects of information security are:

  • Server hard drives;
  • SAN;
  • NAS;
  • Magnetic tapes;
  • CD/DVD/Blue-ray discs;
  • Personal computers (including laptops);
  • External devices.

IPC technologies use various plug-in cryptographic modules, including the most efficient algorithms DES, Triple DES, RC5, RC6, AES, XTS-AES. The most used algorithms in IPC solutions are RC5 and AES, the effectiveness of which can be tested on the project [distributed.net]. They are most effective for solving the problems of encrypting data of large amounts of data on server storages and backups.

Materials