sincity Posted January 21, 2014 Share Posted January 21, 2014 http://cdn.mos.techradar.com/art/TRBC/Abstract/Laptop%20locked%20up/iStock_000015911331Small-Bet_Noire-470-75.jpgTo maintain relevance in a landscape where most workers are mobile, Data Loss Prevention technology must move from the server to the endpoint. If you are unable to monitor data movement because a device is off the network, then you put corporate data at a greater risk.Key ConsiderationsInvest in DLP technology that extends to the endpoint. Without it, you will only be able to secure a small subset of data stored on devices that are never off the networkKnow your users. Qualify user access to data based on their role within the company and investigate if someone is accessing data that is outside of their authority. Hopefully your DLP solution integrates well with Active Directory so that this organisational infrastructure can be easily importedKnow your data. Work with senior management, HR, legal, and any other stakeholders to determine the types of data that must be securedQuantify the risk. Once the different categories of data have been identified, rank each group based on sensitivity and potential impact to the organisationDesign appropriate security protocols. Some categories of data may require a cautionary approach from IT while other types of data may need to be locked down completely. Build a protocol that applies an appropriate response based on the significance of the dataAnalyse data activity. Patterns of activity may signal a potential security incident. Perform regular analyses of data movementRegulatory compliance. With the above criteria in place, you should be able to respond immediately (and appropriately) to any data security incident that may arise relative to data movement. It's important to record the response and the ultimate result to prove your compliance with corporate and government regulationsStephen Midgley oversees all aspects of global marketing and product management at Absolute Software including corporate communications, product marketing, demand generation, and the company's presence on the web.http://rss.feedsportal.com/c/669/f/415085/s/362de7cd/sc/46/mf.gifhttp://res3.feedsportal.com/social/twitter.png http://res3.feedsportal.com/social/facebook.png http://res3.feedsportal.com/social/linkedin.png http://res3.feedsportal.com/social/googleplus.png http://res3.feedsportal.com/social/email.pnghttp://da.feedsportal.com/r/186529302934/u/49/f/415085/c/669/s/362de7cd/sc/46/rc/1/rc.imghttp://da.feedsportal.com/r/186529302934/u/49/f/415085/c/669/s/362de7cd/sc/46/rc/2/rc.imghttp://da.feedsportal.com/r/186529302934/u/49/f/415085/c/669/s/362de7cd/sc/46/rc/3/rc.imghttp://da.feedsportal.com/r/186529302934/u/49/f/415085/c/669/s/362de7cd/a2.imghttp://pi.feedsportal.com/r/186529302934/u/49/f/415085/c/669/s/362de7cd/a2t.imghttp://feeds.feedburner.com/~r/techradar/software-news/~4/ZxBLLoOlq2I Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.