Data Loss/ Leakage Prevention

Until a few years ago, organizations thought of data/information security only in terms of protecting their network from intruders (e.g. hackers). But with growing amount of data, rapid growth in the sizes of organizations (e.g. due to globalization), rise in number of data points (machines and servers) and easier modes of communication (e.g. IM, USB, cell phones), accidental or even deliberate leakage of data from within the organization has become a painful reality.

Broadly, the core DLP process has three components: Identification, Monitoring and Prevention.

The first, identification, is a process of discovering what constitutes sensitive content within an organization. For this, an organization first has to define “sensitive”, which is identified via executing a Data Classification Assessment.

The second component, monitoring, typically deployed at the network egress point or on end-user endpoints, is used to flag data or information that should not be going out of the organization. The monitoring component taps into raw data going over the wire, does some (optional) semantic reconstruction and applies policies on it. Raw data can be captured at many levels – network level (e.g. TCP/IP), session level (e.g. HTTP, FTP) or application level (e.g. Yahoo! Mail, Gmail).

The third component, prevention, is the process of taking some action on the data flagged by the identification or monitoring component. Many types of actions are possible – blocking the data, quarantining it, deleting, encrypting, compressing, notifying and more.

In addition to the above three core components, there is a fourth piece which can be called Control. This is basically the component using which the user can [centrally] manage and monitor the whole DLP process. This typically includes the GUI, policy/rule definition and deployment module, process control, reporting and various dashboards.


Articles

Trend Micro Leakproof

Published on January 23, 2011

Loss of proprietary information and intellectual property can trigger fines, litigation, and bad press for your brand, hurting your reputation. Trend Micro™ Leak Proof™ protects sensitive data and supports regulatory compliance by monitoring and preventing information leaks at the point of use.

LeakProof prevents data leaks with a unique approach that combines endpoint-based policy enforcement with highly accurate fingerprinting and content matching technology. Two key components, the Anti-Leak Client software and the DataDNA Server appliance, collaborate to protect sensitive information assets from data loss, data theft, and insider threats.

LeakProof provides the broadest protection for any endpoint whether on or offline, including monitoring and preventing data leaks via USB devices, and network Webmail, encrypted Webmail, IM, and HTTPS. Plus, interactive alerts educate enterprise employees on the proper handling of confidential information. Turn your employees into security assets with LeakProof

Key Features

  • Real-time content filtering detects sensitive data at rest, in use, and in motion
  • Endpoint-based enforcement uses powerful algorithms to create a unique DataDNA™ “fingerprint” for each document
  • Web-based interface supports administrative workflows for specific data discovery, classification, policy setting, and reporting
  • Interactive alerts educate employees on the proper handling of confidential information
Broadest endpoint protection including USB, Webmail, encrypted Webmail, IM, and HTTPS

Other Links

» Security Solutions
» Data Loss/ Leakage Prevention
» Encryption
» End Point Security
» Web Application Firewall
» SSL-VPN

Featured Partners