0% found this document useful (0 votes)
317 views

The Definitive Guide To Data Loss Prevention

All the essential information you need about DLP in one eBook. As security professionals struggle with how to keep up with threats, DLP - a technology designed to ensure sensitive data isn't stolen or lost - is hot again. This comprehensive guide provides what you need to understand, evaluate, and succeed with today's DLP. It includes insights from DLP Experts, Forrester Research, Gartner, and Digital Guardian's security analysts. What's Inside: -The seven trends that have made DLP hot again -How to determine the right approach for your organization -Making the business case to executives -How to build an RFP and evaluate vendors -How to start with a clearly defined quick win -Straight-forward frameworks for success

Uploaded by

Digital Guardian
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
317 views

The Definitive Guide To Data Loss Prevention

All the essential information you need about DLP in one eBook. As security professionals struggle with how to keep up with threats, DLP - a technology designed to ensure sensitive data isn't stolen or lost - is hot again. This comprehensive guide provides what you need to understand, evaluate, and succeed with today's DLP. It includes insights from DLP Experts, Forrester Research, Gartner, and Digital Guardian's security analysts. What's Inside: -The seven trends that have made DLP hot again -How to determine the right approach for your organization -Making the business case to executives -How to build an RFP and evaluate vendors -How to start with a clearly defined quick win -Straight-forward frameworks for success

Uploaded by

Digital Guardian
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

THE DEFINITIVE GUIDE TO DATA LOSS PREVENTION

THE DEFINITIVE
GUIDE TO
DATA LOSS
PREVENTION

1
THE DEFINITIVE GUIDE TO DATA LOSS PREVENTION

TABLE OF CONTENTS
03 Introduction
04 Part One: What is Data Loss Prevention
08 Part Two: How DLP Has Evolved
11 Part Three: The Resurgence of DLP
24 Part Four: The Shift to Data-Centric Security
28 Part Five: Determining the Right Approach to DLP
40 Part Six: Business Case for DLP
47 Part Seven: Buying DLP
53 Part Eight: Getting Successful with DLP
62 Part Nine: Digital Guardian—Next Generation Data Protection
66 Conclusion
67 Resources at a Glance

2
INTRODUCTION

WHY READ THIS GUIDE?


WHAT'S OLD IS NEW AGAIN
As security professionals struggle with how to keep up with non-stop threats from every angle, a 10+ year old technology, data loss prevention (DLP) is hot again. A number of
macro trends are driving the wider adoption of DLP. But as we looked at the resources out there, we couldn’t find one source that could provide all the essential information in
one place. So we created this guide to provide answers to the most common questions about DLP all in an easy to digest format.

HOW TO USE THIS GUIDE


IF YOU ARE... GO TO...
New to DLP Part One: What is Data Loss Prevention
Familiar with DLP, but want to learn what’s new Part Two: How DLP has Evolved
Not sure where to start? Part Four: A Data Centric Security Framework
Trying to determine the best DLP architecture for your organization Part Five: Determining the Right Approach to DLP
Looking to buy DLP Part Six: Buying DLP
Looking for a quick win deployment Part Eight: Getting Successful with DLP
Looking to understand what makes Digital Guardian different Part Nine: Digital Guardian’s Next Generation Data Protection

3
THE DEFINITIVE GUIDE TO DATA LOSS PREVENTION

PART ONE
WHAT IS DATA LOSS
PREVENTION?

4
PART ONE: WHAT IS DATA LOSS PREVENTION?

DLP DEFINED
“DLP [Data Loss Prevention] is a system that performs real-time scanning of data at rest and in motion,
evaluates that data against existing policy definitions, identifies policy violations and automatically –451 Research, “The
Data Loss Prevention
enforces some type of pre-defined remediation actions such as alerting users and administrators, Market by the Numbers,”
quarantining suspicious files, encrypting data or blocking traffic outright.” July 2015

50%
DLP BASICS WHO USES DLP?
WHAT: In short, DLP is a set of technology tools and processes that COMPANY SIZES: Large enterprises in the Fortune Global 500
ensure sensitive data is not stolen or lost. have invested in DLP for almost 15 years. Today’s DLP puts this
critical security strategy within the reach of mid-size enterprises.
HOW: DLP detects and protects your organization’s sensitive data by:
• Scanning data in motion, in use and at rest INDUSTRIES: Historically DLP has been heavily utilized in regulated
• Identifying sensitive data that requires protection industries such as financial services, healthcare, manufacturing,
• Taking remedial action—alert, prompt, quarantine, block, encrypt
• Providing reporting for compliance, auditing, forensics and
energy, even government. But new and motivated adversaries aren’t
limiting themselves; services companies across a wide range of
OF ORGANIZATIONS
have some form of DLP in place, but Gartner
incident response purposes industries are a major target for example. predicts that will rise to 90% by 2018. (source:
Gartner “Magic Quadrant for Enterprise Data
WHY: accidental (i.e. employee error) or malicious actions (i.e. cyber Loss Prevention”, 1 February, 2016 , Brian Reed
criminal breach) put your organization's data at risk. and Neil Wynne)

5
PART ONE: WHAT IS DATA LOSS PREVENTION?

DO WE NEED DLP?
Take a look at these common situations. If any of them apply to your organization, DLP will almost always make sense.

DLP OBJECTIVES CHECKLIST


Check if this
OBJECTIVE SITUATION applies to you
CASE
Personal Information Your organization is required by national or local regulations to ensure protection and STUDY
Protection / Compliance confidentiality of your customers' information such as Personally Identifiable Information Compliance:
(PII), Personal Health Information (PHI), or payment card information (PCI). St. Charles
Health System
Intellectual Property (IP) Protection Your organization has valuable intellectual property, trade secrets or state secrets
that, if lost or stolen by a malicious employee or accidentally shared by an unwitting
employee, would cause significant monetary or brand damage.
CASE
STUDY
Your organization is the target of industry competitors or nation states who are trying IP Protection:
to break into your networks and pose as legitimate insiders to steal sensitive data. F50 Energy
Company
Your organization is contractually obligated to ensure that your customers' intellectual
Business Partner Compliance property is protected. Failure to do so would require you to pay a large financial
penalty to the customer. CASE
STUDY
Your corporate clients are auditing you to determine that you have the ongoing security Business Partner
mechanisms necessary to protect the sensitive data they have entrusted with you. Compliance: Jabil

6
THE DID YOU KNOW?

GREAT
BRAIN SEE OUR BLOG
To learn more we
recommend, WIPOut:

ROBBERY
The Devastating
Business Effects of
Intellectual Property
Theft on our blog.

Intellectual property
is increasingly being
compromised.

In January 2016, 60 Minutes ran a feature, "The Great Brain Robbery," by Lesley Stahl that covered China’s wide-
scale attack on U.S. companies to steal their intellectual property. Rather than competing with the U.S. economy
through innovation and development, the 60 Minutes report shows how China is committed to stealing IP through
acts of cyber-espionage.

The Justice Department declared that China’s espionage activities are so wide in scale that they constitute a
national security emergency, as China targets almost every sector in U.S. business. According to 60 Minutes, this
activity is costing U.S. companies hundreds of billions of dollars in losses and more than 2 million jobs.

7
PART ONE: WHAT IS DATA LOSS PREVENTION?

ENTERPRISE DLP
OR INTEGRATED DLP?
THOUGHT LEADER INSIGHT: JARED THORKELSON, PRESIDENT DLP EXPERTS
DG: Because of the increased interest and the detection methodologies, which translates into FREE
demand for DLP, more security vendors are adding meaningful increases in DLP effectiveness. Another DOWNLOAD
DLP functionality into their products in what is unique and critical feature of Full Suite DLP solutions
referred to as integrated DLP. So we asked Jared is a central management console. This eliminates · Get the DLP Experts
Thorkelson of DLP Experts, to explain the difference the need for multiple management interfaces and 2016 DLP Vendor
between Enterprise DLP and Integrated DLP. significantly reduces the management overhead of a Review Report.
comprehensive DLP initiative.
JT: Enterprise or Full Suite DLP technologies, are
focused on the task of preventing sensitive data loss Integrated DLP or Channel DLP solutions were
and providing comprehensive coverage. They provide designed for some function other than DLP then
coverage across the complete spectrum of leakage were modified to add some DLP functionality.
vectors. Significantly, Full Suite DLP addresses the Common Channel DLP offerings include email
full range of network protocols, including email, security solutions, device control software and
HTTP, HTTPS, FTP and other TCP traffic. Another secure web gateways. In each case, Channel DLP
critical distinction of most Full Suite DLP solutions solutions are limited in their coverage and detection
is the depth and breadth of their sensitive data methodologies.

8
THE DEFINITIVE GUIDE TO DATA LOSS PREVENTION

PART TWO
HOW DLP
HAS EVOLVED

9
PART TWO: HOW DLP HAS EVOLVED

DLP BACK IN THE LIMELIGHT


DLP came to market with big interest and bigger expectations. Demand softened as organizations struggled with
the cost and complexity of deploying first generation DLP software. The dramatic increase in big breaches, coupled
with factors such as DLP as a service, DLP functionality extending into the cloud and advanced threat protection,
have put DLP back into the limelight.

Steep Learning Curve,


Significant Resource Mitigate Internal
Insider Threat Protection Requirement and External Threats
DLP Deployments

Cloud Data Protection


IP Protection Hackers Breach Sony and Leak
a Wide Range of Data
Compliance DLP as a Managed Service

Data Loss Incident


Factors driving DLP deployment growth

2004 2006 2008 2010 2012 2014 2016

10
PART TWO: HOW DLP HAS EVOLVED

3 MYTHS OF DATA LOSS


PREVENTION
Today’s DLP is sophisticated, automated and within the reach of more enterprises than ever. DLP’s history has been
one of hype and disillusionment, resulting in a few myths that need to be dispelled up front.

MYTH 1: MYTH 2: MYTH 3:


DLP REQUIRES SIGNIFICANT DLP REQUIRES AT LEAST 18 DLP REQUIRES POLICY
INTERNAL RESOURCES TO MONTHS TO DELIVER VALUE. CREATION FIRST.
MANAGE AND MAINTAIN. DLP implementations are no longer a “big bang” that Today’s DLP does not depend on a policy driven
take up to two years to return measurable value. approach to get started. Context-aware DLP enables
While this was true in the past, new DLP options re-
Organizations can see results in days rather than you to collect information on data usage and movement,
quire no dedicated internal resources to manage and
months or years. Today’s DLP solutions are modular and and then work with the business unit leader to define
maintain. The introductions of automation and managed
allow for iterative deployment as part of a continuously the right policies.
security services have eased what was perceived as the
evolving, ongoing data protection program.
“heavy lift” of DLP: hosting, setup, ongoing monitoring,
tuning and maintenance.

11
WE HOPE YOU ENJOYED THIS SAMPLE!
TO READ ON, CLICK HERE & DOWNLOAD THE COMPLETE GUIDE
THE FULL GUIDE INCLUDES INSIGHTS FROM 451 RESEARCH, DLP EXPERTS, FORRESTER RESEARCH AND OUR SECURITY
ANALYSTS TO HELP YOU:
1 Select the right DLP for your organization.
2 Make the case for DLP to your executive team.
3 Get fast wins. Build from there.

TO READ ON, FILL OUT OUR SHORT FORM AND DOWNLOAD THE COMPLETE GUIDE NOW >>

You might also like