SecPoint - Best IT Security
The best Innovative and powerful IT Security products

Resources / IT Security Resources Part4 /

DLP (Data Loss Protection)

DLP or Data Loss Prevention is an IT security term that refers to systems that protect, monitor, and identify data in rest such as data storage, data in motion such as network actions, and data in use such as endpoint actions, through a centralized management framework, contextual security analysis of transaction (attributes of recipient/destination, timing, medium, data object, originator, and so forth), and deep content inspection. These DLP systems are precision engineered and carefully developed to prevent and detect unauthorized access and manipulation of personal or confidential data as well as protecting them from file degradation through human or computer errors and whatnot as well.

Data Leak Prevention

Systems that are specifically designed to avoid getting "leaked" into the wrong hands are referred to as Extrusion Prevention System (by analogy to intrusion-prevention system), IPC or Information Protection and Control, CMF or Content Monitoring and Filtering, Information Leak Prevention or ILP, ILDP or Information Leak Detection and Prevention, and Data Leak Prevention (not to be confused with DLP or Data Loss Prevention). At any rate, here are the different types of DLP systems.

HTTPS Protection

The Network DLP is a type of DLP that's gateway-based (hence, it is also know as gateway-based system). It usually analyzes network traffic in order to look for illicit and unauthorized access and data transmissions, which includes communication mediums like HTTPS, HTTP, FTP, IM, and email (referred to as data in motion, which was already discussed earlier). They have benefits and advantages such as low ownership cost and easy installation. Furthermore, a Network DLP is capable of detecting data at rest or stored information that's found in unsecured or inappropriate places as well. This DLP type is typically a dedicated hardware or software platform that's installed and run on a corporation's Internet network connection.

Host Protection

On the other hand, Host-Based DLP systems are installed in an organization's end-user servers or workstations. Just like their network-based counterpart, a Host-Based DLP can answer both internal and external communications. Ergo, it can manage data flow between types of users or groups (for example, "Chinese walls"). A Host-Based DLP can also supervise and control IM and email communications before they're retained in the company archive, wherein a blocked message or a communication that was never sent and therefore isn't necessarily queued for corporate storage will not be recognized in a following legal discovery occurrence.

Mobile Phone data leak

Host systems are advantageous to companies because they can track down and handle access to hardware and physical machines such as mobile devices that are capable of storing data. They can even retrieve content before it's been encrypted during certain instances. There are also host systems that offer program controls that specifically block transmission attempts at acquiring personal or confidential info, such that they'll provide automatic feedback to the user if ever such a transgression transpires. Unfortunately, they require separate installations on each and every network workstation available, they can't be used on mobile gadgets like PDAs or cell phones, and they cannot be practically installed in certain circumstances.

With Protector UTM  Firewall you get DLP.

 Utm firewall Appliance 

➤ Related pages
802.11 Protocol
CSRF
DDoS
DLP
Ethical Hacker
IPX
NetBEUI
OpenBSD
OSI
RC4
RSA
SEO Check links
SOX
TCP/IP
The Sarbanes-Oxley Act of 2002
Types of Hacker
UTM Appliance Review
Vulnerability Testing Appliance
Web Scan
What is Bandwidth Management ?
Wireless Access Point
WPA Handshake
WPA2
WPA2 Password Handshake

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef