Data leak and data theft protection

The most popular technology in this security area is Data Loss Prevention or Data Leak Prevention (DLP). Whichever concept we choose, the goal is to protect the organization from data leaks. This is accompanied by data encryption technologies that can be applied to different scenarios and security requirements. Most commonly, cryptography is used on entire drives, folders, files, and email communication.

The next level is Data Access Rights Management (ARM, DRM,...) and Application Access Rights Management (PIM, PAM, EPM,...) technologies that create and use the data. User Behaviour Analysis (UEBA) is nowadays also an effective method of protecting data primarily from wanted and unwanted misuse by internal users. However, these tools' basics are a thorough analysis of the work with data throughout their life cycle and their subsequent classification. Only then can the policies under which these technologies work be defined.

 

Data lost prevention

Data lost prevention (DLP) protects the data and identifies employees with potential risk behavior. DLP can classify data using content control - dictionaries or RegEx terms, context, fingerprint, or Machine Learning. 

Data encryption

Data encryption works well with DLP and helps secure the data by giving access only to those who have a key.

ARM, DRM

Whereas data access rights management (ARM, DRM) helps identify and secure data using detailed logging and determining the data owner by simple audits, Managing Application Access Rights (PIM, PAM) ensures activities security. 

UEBA

User Behaviour Analysis (UEBA) identifies the model of typical and atypical behavior. Suspicious behavior is then evaluated by safety score, and according to its value, the reaction could be immediately defined. 

Do you want more information?