Data leak and data theft protection
The most popular technology in this security area is Data Loss Prevention or Data Leak Prevention (DLP). Whichever concept we choose, the goal is to protect the organization from data leaks. This is accompanied by data encryption technologies that can be applied to different scenarios and security requirements. Most commonly, cryptography is used on entire drives, folders, files, and email communication.
The next level is Data Access Rights Management (ARM, DRM,...) and Application Access Rights Management (PIM, PAM, EPM,...) technologies that create and use the data. User Behaviour Analysis (UEBA) is nowadays also an effective method of protecting data primarily from wanted and unwanted misuse by internal users. However, these tools' basics are a thorough analysis of the work with data throughout their life cycle and their subsequent classification. Only then can the policies under which these technologies work be defined.