Page 71 - Cyber Warnings
P. 71







Enlisted below is the list of data leak solutions:

Network-based Data Loss Prevention (DLP) Solutions. Are centered on protecting data even
though it is moving. This loss of data prevention solutions are set up in the "perimeter" of
enterprise systems. They monitor network visitors to identify sensitive data that's being leaked
or sent from the enterprise.

Solutions may investigate email traffic, instant messaging, social networking interactions, web
2.0 applications, SSL traffic and much more. Their analysis engines are searching for violations
of predefined information disclosure policies, for example data leaks.

Datacenter or Storage-based Data Loss Prevention (DLP) Solutions. Concentrate on
protecting data resting inside an organization’s datacenter infrastructure, for example file
servers, SharePoint and databases.

These losses of data prevention solutions uncover where private data resides and let users find
out whether it's being stored safely. When private information resides on insecure platforms, it is
almost always a sign of problematic business processes or poorly performed data retention
policies.

End-point Based Data Loss Prevention (DLP) Solutions. Concentrate on monitoring PC-
based systems (laptops, tablets, POS, etc.) for those actions for example print or transfer to
CD/DVD, webmail, social networking, USB and much more.

End-point based solutions are usually event driven for the reason that the agent resident around
the finish-point is monitoring for particular user actions, for example delivering an e-mail,
copying personal files to some USB, dripping data or printing personal files.

These solutions could be configured for passive monitoring mode in order to positively block
specific kinds of activities.

Content-aware Data Loss Prevention (DLP) Tools. Address the chance of accidental
exposure of sensitive data outdoors approved channels, using monitoring, blocking and removal
functionality.

These power tools let the enforcement of company policies in line with the classification of
content.

Data leak prevention technology is being more and more leveraged for data discovery and
classification purposes.

Make use of this listing like a reference tool when creating loss of data prevention
purchase decisions:

• Develop obvious loss of data prevention strategies with concrete needs before
evaluating products.



71 Cyber Warnings E-Magazine – July 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   66   67   68   69   70   71   72   73   74   75   76