5
Most read
6
Most read
8
Most read
1
THE DEFINITIVE GUIDE TO DATA LOSS PREVENTION
THE DEFINITIVE
GUIDE TO
DATA LOSS
PREVENTION
2
THE DEFINITIVE GUIDE TO DATA LOSS PREVENTION
03 Introduction
04 Part One: What is Data Loss Prevention
08 Part Two: How DLP Has Evolved
11 Part Three: The Resurgence of DLP
24 Part Four: The Shift to Data-Centric Security
28 Part Five: Determining the Right Approach to DLP
40 Part Six: Business Case for DLP
47 Part Seven: Buying DLP
53 Part Eight: Getting Successful with DLP
62 Part Nine: Digital Guardian—Next Generation Data Protection
66 Conclusion
67 Resources at a Glance
TABLE OF CONTENTS
3
INTRODUCTION
WHAT'S OLD IS NEW AGAIN
As security professionals struggle with how to keep up with non-stop threats from every angle, a 10+ year old technology, data loss prevention (DLP) is hot again. A number of
macro trends are driving the wider adoption of DLP. But as we looked at the resources out there, we couldn’t find one source that could provide all the essential information in
one place. So we created this guide to provide answers to the most common questions about DLP all in an easy to digest format.
IF YOU ARE...											GO TO...
New to DLP		 									Part One: What is Data Loss Prevention
Familiar with DLP, but want to learn what’s new					 Part Two: How DLP has Evolved
Not sure where to start?				 					 Part Four: A Data Centric Security Framework
Trying to determine the best DLP architecture for your organization	 	 Part Five: Determining the Right Approach to DLP
Looking to buy DLP		 								Part Six: Buying DLP
Looking for a quick win deployment	 						Part Eight: Getting Successful with DLP
Looking to understand what makes Digital Guardian different			 Part Nine: Digital Guardian’s Next Generation Data Protection
WHY READ THIS GUIDE?
HOW TO USE THIS GUIDE
THE DEFINITIVE GUIDE TO DATA LOSS PREVENTION
4
PART ONE
WHAT IS DATA LOSS
PREVENTION?
5
PART ONE: WHAT IS DATA LOSS PREVENTION?
DLP DEFINED
DLP BASICS
WHAT: In short, DLP is a set of technology tools and processes that
ensure sensitive data is not stolen or lost.
HOW: DLP detects and protects your organization’s sensitive data by:
• Scanning data in motion, in use and at rest
• Identifying sensitive data that requires protection
• Taking remedial action—alert, prompt, quarantine, block, encrypt
• Providing reporting for compliance, auditing, forensics and
incident response purposes
WHY: accidental (i.e. employee error) or malicious actions (i.e. cyber
criminal breach) put your organization's data at risk.
WHO USES DLP?
COMPANY SIZES: Large enterprises in the Fortune Global 500
have invested in DLP for almost 15 years. Today’s DLP puts this
critical security strategy within the reach of mid-size enterprises.
INDUSTRIES: Historically DLP has been heavily utilized in regulated
industries such as financial services, healthcare, manufacturing,
energy, even government. But new and motivated adversaries aren’t
limiting themselves; services companies across a wide range of
industries are a major target for example.
“DLP [Data Loss Prevention] is a system that performs real-time scanning of data at rest and in motion,
evaluates that data against existing policy definitions, identifies policy violations and automatically
enforces some type of pre-defined remediation actions such as alerting users and administrators,
quarantining suspicious files, encrypting data or blocking traffic outright.”
50%have some form of DLP in place, but Gartner
predicts that will rise to 90% by 2018. (source:
Gartner “Magic Quadrant for Enterprise Data
Loss Prevention”, 1 February, 2016 , Brian Reed
and Neil Wynne)
OF ORGANIZATIONS
–451 Research, “The
Data Loss Prevention
Market by the Numbers,”
July 2015
6
PART ONE: WHAT IS DATA LOSS PREVENTION?
DO WE NEED DLP?Take a look at these common situations. If any of them apply to your organization, DLP will almost always make sense.
OBJECTIVE SITUATION
Your organization is required by national or local regulations to ensure protection and
confidentiality of your customers' information such as Personally Identifiable Information
(PII), Personal Health Information (PHI), or payment card information (PCI).
Your organization has valuable intellectual property, trade secrets or state secrets
that, if lost or stolen by a malicious employee or accidentally shared by an unwitting
employee, would cause significant monetary or brand damage.
Your organization is the target of industry competitors or nation states who are trying
to break into your networks and pose as legitimate insiders to steal sensitive data.
Your organization is contractually obligated to ensure that your customers' intellectual
property is protected. Failure to do so would require you to pay a large financial
penalty to the customer.
Your corporate clients are auditing you to determine that you have the ongoing security
mechanisms necessary to protect the sensitive data they have entrusted with you.
DLP OBJECTIVES CHECKLIST
Check if this
applies to you
Personal Information
Protection / Compliance
Intellectual Property (IP) Protection
Business Partner Compliance
CASE
STUDY
IP Protection:
F50 Energy
Company
CASE
STUDY
Business Partner
Compliance: Jabil
CASE
STUDY
Compliance:
St. Charles
Health System
7
THE
GREAT
BRAIN
ROBBERY
Intellectual property
is increasingly being
compromised.
In January 2016, 60 Minutes ran a feature, "The Great Brain Robbery," by Lesley Stahl that covered China’s wide-
scale attack on U.S. companies to steal their intellectual property. Rather than competing with the U.S. economy
through innovation and development, the 60 Minutes report shows how China is committed to stealing IP through
acts of cyber-espionage.
The Justice Department declared that China’s espionage activities are so wide in scale that they constitute a
national security emergency, as China targets almost every sector in U.S. business. According to 60 Minutes, this
activity is costing U.S. companies hundreds of billions of dollars in losses and more than 2 million jobs.
DID YOU KNOW?
SEE OUR BLOG
To learn more we
recommend, WIPOut:
The Devastating
Business Effects of
Intellectual Property
Theft on our blog.
8
PART ONE: WHAT IS DATA LOSS PREVENTION?
ENTERPRISE DLP
OR INTEGRATED DLP?
DG: Because of the increased interest and the
demand for DLP, more security vendors are adding
DLP functionality into their products in what is
referred to as integrated DLP. So we asked Jared
Thorkelson of DLP Experts, to explain the difference
between Enterprise DLP and Integrated DLP.
JT: Enterprise or Full Suite DLP technologies, are
focused on the task of preventing sensitive data loss
and providing comprehensive coverage. They provide
coverage across the complete spectrum of leakage
vectors. Significantly, Full Suite DLP addresses the
full range of network protocols, including email,
HTTP, HTTPS, FTP and other TCP traffic. Another
critical distinction of most Full Suite DLP solutions
is the depth and breadth of their sensitive data
detection methodologies, which translates into
meaningful increases in DLP effectiveness. Another
unique and critical feature of Full Suite DLP solutions
is a central management console. This eliminates
the need for multiple management interfaces and
significantly reduces the management overhead of a
comprehensive DLP initiative.
Integrated DLP or Channel DLP solutions were
designed for some function other than DLP then
were modified to add some DLP functionality.
Common Channel DLP offerings include email
security solutions, device control software and
secure web gateways. In each case, Channel DLP
solutions are limited in their coverage and detection
methodologies.
THOUGHT LEADER INSIGHT: JARED THORKELSON, PRESIDENT DLP EXPERTS
· Get the DLP Experts
2016 DLP Vendor
Review Report.
FREE
DOWNLOAD
THE DEFINITIVE GUIDE TO DATA LOSS PREVENTION
9
PART TWO
HOW DLP
HAS EVOLVED
10
PART TWO: HOW DLP HAS EVOLVED
DLP BACK IN THE LIMELIGHT
DLPDeployments
Data Loss Incident
Compliance
IP Protection
Insider Threat Protection
2004 2006 2008 2010 2012 2014 2016
Steep Learning Curve,
Significant Resource
Requirement
DLP as a Managed Service
Mitigate Internal
and External Threats
Hackers Breach Sony and Leak
a Wide Range of Data
Cloud Data Protection
Factors driving DLP deployment growth
DLP came to market with big interest and bigger expectations. Demand softened as organizations struggled with
the cost and complexity of deploying first generation DLP software. The dramatic increase in big breaches, coupled
with factors such as DLP as a service, DLP functionality extending into the cloud and advanced threat protection,
have put DLP back into the limelight.
11
PART TWO: HOW DLP HAS EVOLVED
3 MYTHS OF DATA LOSS
PREVENTIONToday’s DLP is sophisticated, automated and within the reach of more enterprises than ever. DLP’s history has been
one of hype and disillusionment, resulting in a few myths that need to be dispelled up front.
MYTH 1:
DLP REQUIRES SIGNIFICANT
INTERNAL RESOURCES TO
MANAGE AND MAINTAIN.
While this was true in the past, new DLP options re-
quire no dedicated internal resources to manage and
maintain. The introductions of automation and managed
security services have eased what was perceived as the
“heavy lift” of DLP: hosting, setup, ongoing monitoring,
tuning and maintenance.
MYTH 2:
DLP REQUIRES AT LEAST 18
MONTHS TO DELIVER VALUE.
DLP implementations are no longer a “big bang” that
take up to two years to return measurable value.
Organizations can see results in days rather than
months or years. Today’s DLP solutions are modular and
allow for iterative deployment as part of a continuously
evolving, ongoing data protection program.
MYTH 3:
DLP REQUIRES POLICY
CREATION FIRST.
Today’s DLP does not depend on a policy driven
approach to get started. Context-aware DLP enables
you to collect information on data usage and movement,
and then work with the business unit leader to define
the right policies.
TO READ ON, CLICK HERE & DOWNLOAD THE COMPLETE GUIDE
WE HOPE YOU ENJOYED THIS SAMPLE!
1	 Select the right DLP for your organization.
2	 Make the case for DLP to your executive team.
3	 Get fast wins. Build from there.
THE FULL GUIDE INCLUDES INSIGHTS FROM 451 RESEARCH, DLP EXPERTS, FORRESTER RESEARCH AND OUR SECURITY
ANALYSTS TO HELP YOU:
TO READ ON, FILL OUT OUR SHORT FORM AND DOWNLOAD THE COMPLETE GUIDE NOW >>

More Related Content

PDF
Introducing Data Loss Prevention 14
PPTX
Data Loss Prevention from Symantec
PDF
DLP Data leak prevention
PPT
Data loss prevention (dlp)
PDF
Overview of Data Loss Prevention (DLP) Technology
PDF
Data Leakage Prevention (DLP)
PPTX
Symantec Data Loss Prevention 9
PPTX
Data Loss Prevention
Introducing Data Loss Prevention 14
Data Loss Prevention from Symantec
DLP Data leak prevention
Data loss prevention (dlp)
Overview of Data Loss Prevention (DLP) Technology
Data Leakage Prevention (DLP)
Symantec Data Loss Prevention 9
Data Loss Prevention

What's hot (20)

PPT
PDF
Data Loss Threats and Mitigations
PPT
Shariyaz abdeen data leakage prevention presentation
PDF
Symantec Data Loss Prevention 11
PPTX
Microsoft Azure Information Protection
PDF
Best Practices for Implementing Data Loss Prevention (DLP)
PPTX
Security operation center (SOC)
PPTX
Azure information protection
PPTX
Technology Overview - Symantec Data Loss Prevention (DLP)
PPTX
Privileged Access Management (PAM)
PDF
PaloAlto Enterprise Security Solution
PPTX
Data Leakage Prevention
PDF
FireEye Solutions
PDF
Cisco Security Presentation
PDF
DLP Systems: Models, Architecture and Algorithms
PDF
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PDF
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
PPTX
Splunk Enterprise Security
PDF
Splunk-Presentation
Data Loss Threats and Mitigations
Shariyaz abdeen data leakage prevention presentation
Symantec Data Loss Prevention 11
Microsoft Azure Information Protection
Best Practices for Implementing Data Loss Prevention (DLP)
Security operation center (SOC)
Azure information protection
Technology Overview - Symantec Data Loss Prevention (DLP)
Privileged Access Management (PAM)
PaloAlto Enterprise Security Solution
Data Leakage Prevention
FireEye Solutions
Cisco Security Presentation
DLP Systems: Models, Architecture and Algorithms
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Cybersecurity Attack Vectors: How to Protect Your Organization
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Splunk Enterprise Security
Splunk-Presentation
Ad

Viewers also liked (15)

PPTX
Data Loss Prevention
PPTX
Information Leakage & DLP
PPT
Data Leakage Presentation
PDF
ISSA DLP Presentation - Oxford Consulting Group
PPTX
PPTX
How to Use OWASP Security Logging
PDF
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
PDF
Практические особенности внедрения систем класса DLP
PDF
Protect your data in / with the Cloud
PPT
Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...
PPS
SearchInform. Дмитрий Стельченко. "Нестандартные методы использования DLP в б...
PPTX
Charity: A Secret for Cyberspace by Jon Creekmore
PPTX
Evolution of Malware and Attempts to Prevent by Michael Angelo Vien
PDF
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
PDF
Demystifying Cloud Security
Data Loss Prevention
Information Leakage & DLP
Data Leakage Presentation
ISSA DLP Presentation - Oxford Consulting Group
How to Use OWASP Security Logging
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
Практические особенности внедрения систем класса DLP
Protect your data in / with the Cloud
Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...
SearchInform. Дмитрий Стельченко. "Нестандартные методы использования DLP в б...
Charity: A Secret for Cyberspace by Jon Creekmore
Evolution of Malware and Attempts to Prevent by Michael Angelo Vien
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Demystifying Cloud Security
Ad

Similar to The Definitive Guide to Data Loss Prevention (20)

PDF
Data Lost Prevention (DLP).pdf
PDF
trellix-dlp-buyers-guide.pdf
PDF
Data Loss Prevention (DLP): Protecting Your Sensitive Data
PDF
DATA LOSS PREVENTION OVERVIEW
PDF
DLP 101: Help identify and plug information leaks
PDF
05.05.2021-webinar-presentation-experts-series-How-to-Switch-to-a-Better-DLP.pdf
PDF
2010 za con_stephen_kreusch
PPTX
Data Security Explained
PDF
Symantec Data Loss Prevention- From Adoption to Maturity
PPTX
Ciso round table on effective implementation of dlp & data security
PDF
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
PPTX
DLP.pptx
PPTX
The CISO’s Guide to Data Loss Prevention
PPTX
Global Thought Leadership Webcast, March 23
PPT
Information Leakage - A knowledge Based Approach
PPT
C:\fakepath\wg xcs data_lossprevention
PDF
SCB 2013 DLP, công nghệ, và phương pháp triển khai
PDF
Data Loss Prevention as a Service_ Safeguarding Your Sensitive Information.pdf
DOCX
Digital guardian data loss prevention tools
PDF
SCI Data Security Beyond DLP SCI Data Security Beyond DLP
Data Lost Prevention (DLP).pdf
trellix-dlp-buyers-guide.pdf
Data Loss Prevention (DLP): Protecting Your Sensitive Data
DATA LOSS PREVENTION OVERVIEW
DLP 101: Help identify and plug information leaks
05.05.2021-webinar-presentation-experts-series-How-to-Switch-to-a-Better-DLP.pdf
2010 za con_stephen_kreusch
Data Security Explained
Symantec Data Loss Prevention- From Adoption to Maturity
Ciso round table on effective implementation of dlp & data security
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
DLP.pptx
The CISO’s Guide to Data Loss Prevention
Global Thought Leadership Webcast, March 23
Information Leakage - A knowledge Based Approach
C:\fakepath\wg xcs data_lossprevention
SCB 2013 DLP, công nghệ, và phương pháp triển khai
Data Loss Prevention as a Service_ Safeguarding Your Sensitive Information.pdf
Digital guardian data loss prevention tools
SCI Data Security Beyond DLP SCI Data Security Beyond DLP

Recently uploaded (20)

PDF
Module 1 - Introduction to Generative AI.pdf
PDF
Mobile App Backend Development with WordPress REST API: The Complete eBook
PPTX
Human Computer Interaction lecture Chapter 2.pptx
PDF
Difference Between Website and Web Application.pdf
PDF
infoteam HELLAS company profile 2025 presentation
PDF
Sanket Mhaiskar Resume - Senior Software Engineer (Backend, AI)
PDF
Top 10 Project Management Software for Small Teams in 2025.pdf
PDF
Understanding the Need for Systemic Change in Open Source Through Intersectio...
PPTX
ROI from Efficient Content & Campaign Management in the Digital Media Industry
PPTX
ESDS_SAP Application Cloud Offerings.pptx
PPTX
UNIT II: Software design, software .pptx
PDF
IT Consulting Services to Secure Future Growth
PPTX
StacksandQueuesCLASS 12 COMPUTER SCIENCE.pptx
PDF
WhatsApp Chatbots The Key to Scalable Customer Support.pdf
PPTX
AI Tools Revolutionizing Software Development Workflows
PDF
How to Set Realistic Project Milestones and Deadlines
PPTX
SAP Business AI_L1 Overview_EXTERNAL.pptx
PPTX
Lesson-3-Operation-System-Support.pptx-I
PDF
solman-7.0-ehp1-sp21-incident-management
PPTX
Post-Migration Optimization Playbook: Getting the Most Out of Your New Adobe ...
Module 1 - Introduction to Generative AI.pdf
Mobile App Backend Development with WordPress REST API: The Complete eBook
Human Computer Interaction lecture Chapter 2.pptx
Difference Between Website and Web Application.pdf
infoteam HELLAS company profile 2025 presentation
Sanket Mhaiskar Resume - Senior Software Engineer (Backend, AI)
Top 10 Project Management Software for Small Teams in 2025.pdf
Understanding the Need for Systemic Change in Open Source Through Intersectio...
ROI from Efficient Content & Campaign Management in the Digital Media Industry
ESDS_SAP Application Cloud Offerings.pptx
UNIT II: Software design, software .pptx
IT Consulting Services to Secure Future Growth
StacksandQueuesCLASS 12 COMPUTER SCIENCE.pptx
WhatsApp Chatbots The Key to Scalable Customer Support.pdf
AI Tools Revolutionizing Software Development Workflows
How to Set Realistic Project Milestones and Deadlines
SAP Business AI_L1 Overview_EXTERNAL.pptx
Lesson-3-Operation-System-Support.pptx-I
solman-7.0-ehp1-sp21-incident-management
Post-Migration Optimization Playbook: Getting the Most Out of Your New Adobe ...

The Definitive Guide to Data Loss Prevention

  • 1. 1 THE DEFINITIVE GUIDE TO DATA LOSS PREVENTION THE DEFINITIVE GUIDE TO DATA LOSS PREVENTION
  • 2. 2 THE DEFINITIVE GUIDE TO DATA LOSS PREVENTION 03 Introduction 04 Part One: What is Data Loss Prevention 08 Part Two: How DLP Has Evolved 11 Part Three: The Resurgence of DLP 24 Part Four: The Shift to Data-Centric Security 28 Part Five: Determining the Right Approach to DLP 40 Part Six: Business Case for DLP 47 Part Seven: Buying DLP 53 Part Eight: Getting Successful with DLP 62 Part Nine: Digital Guardian—Next Generation Data Protection 66 Conclusion 67 Resources at a Glance TABLE OF CONTENTS
  • 3. 3 INTRODUCTION WHAT'S OLD IS NEW AGAIN As security professionals struggle with how to keep up with non-stop threats from every angle, a 10+ year old technology, data loss prevention (DLP) is hot again. A number of macro trends are driving the wider adoption of DLP. But as we looked at the resources out there, we couldn’t find one source that could provide all the essential information in one place. So we created this guide to provide answers to the most common questions about DLP all in an easy to digest format. IF YOU ARE... GO TO... New to DLP Part One: What is Data Loss Prevention Familiar with DLP, but want to learn what’s new Part Two: How DLP has Evolved Not sure where to start? Part Four: A Data Centric Security Framework Trying to determine the best DLP architecture for your organization Part Five: Determining the Right Approach to DLP Looking to buy DLP Part Six: Buying DLP Looking for a quick win deployment Part Eight: Getting Successful with DLP Looking to understand what makes Digital Guardian different Part Nine: Digital Guardian’s Next Generation Data Protection WHY READ THIS GUIDE? HOW TO USE THIS GUIDE
  • 4. THE DEFINITIVE GUIDE TO DATA LOSS PREVENTION 4 PART ONE WHAT IS DATA LOSS PREVENTION?
  • 5. 5 PART ONE: WHAT IS DATA LOSS PREVENTION? DLP DEFINED DLP BASICS WHAT: In short, DLP is a set of technology tools and processes that ensure sensitive data is not stolen or lost. HOW: DLP detects and protects your organization’s sensitive data by: • Scanning data in motion, in use and at rest • Identifying sensitive data that requires protection • Taking remedial action—alert, prompt, quarantine, block, encrypt • Providing reporting for compliance, auditing, forensics and incident response purposes WHY: accidental (i.e. employee error) or malicious actions (i.e. cyber criminal breach) put your organization's data at risk. WHO USES DLP? COMPANY SIZES: Large enterprises in the Fortune Global 500 have invested in DLP for almost 15 years. Today’s DLP puts this critical security strategy within the reach of mid-size enterprises. INDUSTRIES: Historically DLP has been heavily utilized in regulated industries such as financial services, healthcare, manufacturing, energy, even government. But new and motivated adversaries aren’t limiting themselves; services companies across a wide range of industries are a major target for example. “DLP [Data Loss Prevention] is a system that performs real-time scanning of data at rest and in motion, evaluates that data against existing policy definitions, identifies policy violations and automatically enforces some type of pre-defined remediation actions such as alerting users and administrators, quarantining suspicious files, encrypting data or blocking traffic outright.” 50%have some form of DLP in place, but Gartner predicts that will rise to 90% by 2018. (source: Gartner “Magic Quadrant for Enterprise Data Loss Prevention”, 1 February, 2016 , Brian Reed and Neil Wynne) OF ORGANIZATIONS –451 Research, “The Data Loss Prevention Market by the Numbers,” July 2015
  • 6. 6 PART ONE: WHAT IS DATA LOSS PREVENTION? DO WE NEED DLP?Take a look at these common situations. If any of them apply to your organization, DLP will almost always make sense. OBJECTIVE SITUATION Your organization is required by national or local regulations to ensure protection and confidentiality of your customers' information such as Personally Identifiable Information (PII), Personal Health Information (PHI), or payment card information (PCI). Your organization has valuable intellectual property, trade secrets or state secrets that, if lost or stolen by a malicious employee or accidentally shared by an unwitting employee, would cause significant monetary or brand damage. Your organization is the target of industry competitors or nation states who are trying to break into your networks and pose as legitimate insiders to steal sensitive data. Your organization is contractually obligated to ensure that your customers' intellectual property is protected. Failure to do so would require you to pay a large financial penalty to the customer. Your corporate clients are auditing you to determine that you have the ongoing security mechanisms necessary to protect the sensitive data they have entrusted with you. DLP OBJECTIVES CHECKLIST Check if this applies to you Personal Information Protection / Compliance Intellectual Property (IP) Protection Business Partner Compliance CASE STUDY IP Protection: F50 Energy Company CASE STUDY Business Partner Compliance: Jabil CASE STUDY Compliance: St. Charles Health System
  • 7. 7 THE GREAT BRAIN ROBBERY Intellectual property is increasingly being compromised. In January 2016, 60 Minutes ran a feature, "The Great Brain Robbery," by Lesley Stahl that covered China’s wide- scale attack on U.S. companies to steal their intellectual property. Rather than competing with the U.S. economy through innovation and development, the 60 Minutes report shows how China is committed to stealing IP through acts of cyber-espionage. The Justice Department declared that China’s espionage activities are so wide in scale that they constitute a national security emergency, as China targets almost every sector in U.S. business. According to 60 Minutes, this activity is costing U.S. companies hundreds of billions of dollars in losses and more than 2 million jobs. DID YOU KNOW? SEE OUR BLOG To learn more we recommend, WIPOut: The Devastating Business Effects of Intellectual Property Theft on our blog.
  • 8. 8 PART ONE: WHAT IS DATA LOSS PREVENTION? ENTERPRISE DLP OR INTEGRATED DLP? DG: Because of the increased interest and the demand for DLP, more security vendors are adding DLP functionality into their products in what is referred to as integrated DLP. So we asked Jared Thorkelson of DLP Experts, to explain the difference between Enterprise DLP and Integrated DLP. JT: Enterprise or Full Suite DLP technologies, are focused on the task of preventing sensitive data loss and providing comprehensive coverage. They provide coverage across the complete spectrum of leakage vectors. Significantly, Full Suite DLP addresses the full range of network protocols, including email, HTTP, HTTPS, FTP and other TCP traffic. Another critical distinction of most Full Suite DLP solutions is the depth and breadth of their sensitive data detection methodologies, which translates into meaningful increases in DLP effectiveness. Another unique and critical feature of Full Suite DLP solutions is a central management console. This eliminates the need for multiple management interfaces and significantly reduces the management overhead of a comprehensive DLP initiative. Integrated DLP or Channel DLP solutions were designed for some function other than DLP then were modified to add some DLP functionality. Common Channel DLP offerings include email security solutions, device control software and secure web gateways. In each case, Channel DLP solutions are limited in their coverage and detection methodologies. THOUGHT LEADER INSIGHT: JARED THORKELSON, PRESIDENT DLP EXPERTS · Get the DLP Experts 2016 DLP Vendor Review Report. FREE DOWNLOAD
  • 9. THE DEFINITIVE GUIDE TO DATA LOSS PREVENTION 9 PART TWO HOW DLP HAS EVOLVED
  • 10. 10 PART TWO: HOW DLP HAS EVOLVED DLP BACK IN THE LIMELIGHT DLPDeployments Data Loss Incident Compliance IP Protection Insider Threat Protection 2004 2006 2008 2010 2012 2014 2016 Steep Learning Curve, Significant Resource Requirement DLP as a Managed Service Mitigate Internal and External Threats Hackers Breach Sony and Leak a Wide Range of Data Cloud Data Protection Factors driving DLP deployment growth DLP came to market with big interest and bigger expectations. Demand softened as organizations struggled with the cost and complexity of deploying first generation DLP software. The dramatic increase in big breaches, coupled with factors such as DLP as a service, DLP functionality extending into the cloud and advanced threat protection, have put DLP back into the limelight.
  • 11. 11 PART TWO: HOW DLP HAS EVOLVED 3 MYTHS OF DATA LOSS PREVENTIONToday’s DLP is sophisticated, automated and within the reach of more enterprises than ever. DLP’s history has been one of hype and disillusionment, resulting in a few myths that need to be dispelled up front. MYTH 1: DLP REQUIRES SIGNIFICANT INTERNAL RESOURCES TO MANAGE AND MAINTAIN. While this was true in the past, new DLP options re- quire no dedicated internal resources to manage and maintain. The introductions of automation and managed security services have eased what was perceived as the “heavy lift” of DLP: hosting, setup, ongoing monitoring, tuning and maintenance. MYTH 2: DLP REQUIRES AT LEAST 18 MONTHS TO DELIVER VALUE. DLP implementations are no longer a “big bang” that take up to two years to return measurable value. Organizations can see results in days rather than months or years. Today’s DLP solutions are modular and allow for iterative deployment as part of a continuously evolving, ongoing data protection program. MYTH 3: DLP REQUIRES POLICY CREATION FIRST. Today’s DLP does not depend on a policy driven approach to get started. Context-aware DLP enables you to collect information on data usage and movement, and then work with the business unit leader to define the right policies.
  • 12. TO READ ON, CLICK HERE & DOWNLOAD THE COMPLETE GUIDE WE HOPE YOU ENJOYED THIS SAMPLE! 1 Select the right DLP for your organization. 2 Make the case for DLP to your executive team. 3 Get fast wins. Build from there. THE FULL GUIDE INCLUDES INSIGHTS FROM 451 RESEARCH, DLP EXPERTS, FORRESTER RESEARCH AND OUR SECURITY ANALYSTS TO HELP YOU: TO READ ON, FILL OUT OUR SHORT FORM AND DOWNLOAD THE COMPLETE GUIDE NOW >>