What is DLP?

Data leakage has become today one of the most serious threats. Information leaking from everywhere - from banks, public institutions, retailers, online stores. Not a secret, that the main culprits of the leak are just employees. Since all of the company could not be verified, this need to do something.

What is DLP?

Workers keep on their laptops offer, settlements, technical diagrams - and all of this information without the use of DLP It remains unprotected. They can then copy it to removable media or, eg, send mail. Often, computer data can be left unattended or is "under supervision" in children.

The threat at the same time the possibility of new developments have caused concern among analysts on security and development. Result was the emergence of new solutions, helps to protect against data loss.

The market of this type of solution is quite young - about him two years, so there is still quite narrow terminology. For a description of the same technology used different names – OCC (Outbound Content Compliance), EP (Extrusion Prevention), ILP (Information Leakage Prevention) and, finally, DLP (Data Leakage Prevention).

internal security

traditionally,, Safety is aimed at blocking access to the outside. The DLP is the opposite - the information is blocked and is not discharged to the outside. At first sight, the problem seems to be not very complicated. However, problems with the implementation of a sufficiently technology - e.g., The same setting is SSL encrypted traffic or processing attachments in e-mail.

The problem also lies in the performance. Naturally, in the case of e-mail is easier - a two-second delay in the delivery of the message is not significant, while filtering services in real-time is becoming increasingly difficult. Разработчики используют для своих решений маркетинговое название “data leak”, but their products are significantly different depending on the vendor.

types of DLP

They actually can be divided according to three criteria:

  • Addiction:
  • standalone products;
  • Solutions, integrated with other systems;

Place compliance policy:

  • At the final station in the form of the agent;
  • The network as a sniffer, gateway or proxy server;
  • at the last station in the network;

fulness:

  • DLP full protection coating;
  • Specialized solutions, helps prevent certain data.
Rate article
IT News
Add a comment