Skip to main content

Have you ever heard about DLP?? What is it ??🤔

 Have you ever heard about DLP?? What is it ??


DLP also known as Data Loss Prevention. It is a Software which detects the data breaches transmissions and prevents them by monitoring, detecting and also blocking the data in motion means in network traffic.


Data loss, information leakage, Content filtering are the terms mostly used in the prevention system. In the tech industry employees dealing with data leakage are mainly divided into categories standard security measures, advanced security measures, access control and encryption and designated DLP systems. 


Standard security measures are using antivirus software, IDS intrusion detection systems and using firewalls. Firewalls prevents from outsider to access any data inside of the organization.

IDS - intrusion detection system detects intrusion attempts by outsiders. 


Advanced security measures detect abnormal access to data by using the algorithms, abnormal  email exchange,  honeypots for detecting authorized personnel with malicious intentions. And using UAM - user activity monitoring for detecting abnormal data access.


DLP systems detect and prevent unauthorized attempts to copy or send sensitive data, intentionally or unintentionally, mainly by personnel who are authorized to access the sensitive information. Few mechanisms, such as exact data matching, structured data fingerprinting, rule and regular expression matching, conceptual definitions, keywords and contextual information such as the source of the data.


Types of DLP 


Network : Network technology is typically installed at network where there is transmission of data. It analyzes network traffic to detect sensitive data that is being sent in violation of information security policies.


Endpoint : Endpoint systems run on internal end-user workstations or servers. Like network-based systems, endpoint-based technology can address internal as well as external communications. It can therefore be used to control information flow between groups or types of users. They can also control email and Instant Messaging communications before they reach the corporate archive, so that can  block the communication. End point systems can monitor and control access to physical devices (such as mobile devices with data storage capabilities) and in some cases can access information before it is encrypted.


Cloud : Cloud now a days have a lot of sensitive information, and the data present in the cloud should be protected as there are many attacks happening these days. Cloud level DLP monitors all the information present in the cloud before leaking any data.


Now a days there are many DLP software's available in the market. So it is very important to know which one is better for the organization and genuine, in few cases DLP software companies sell the information to the third parties for their own benefit. 


In the coming years there is very huge demand for DLP software's as every organization rely on this technology from being attacked ant any level. Google like companies have there own DLP procedure for there applications.


As per the gartner peer insights reports, Forcepoint DLP by Forcepoint, Symantec Data Loss Prevention by Broadcom (Symantec), Trellix Data Loss Prevention (DLP) Endpoint are on high on rating. (source : internet)


Data Loss Prevention Global Market is Projected to Reach $6.3 Billion by 2030. The U.S. Market is Estimated at $425.1 Million, While China is Forecast to Grow at 19.2% CAGR. (source : internet)


Some recent news articles


https://www.globenewswire.com/news-release/2023/04/20/2650757/0/en/Data-Loss-Prevention-Global-Market-is-Projected-to-Reach-6-3-Billion-by-2030-Enterprises-Prioritize-Network-DLP-to-Secure-Network-Communications-and-Data-Transfer-Mechanisms.html (source : internet)


https://www.computerworld.com/article/3694172/google-adds-data-loss-prevention-security-features-to-chrome.html


https://www.openpr.com/news/3017364/content-aware-data-loss-prevention-dlp-market-to-witness-huge

Comments

Popular posts from this blog

Attacks that are happening in our daily lives!!!

Lets see Few more attacks that are happening in our daily lives but are unaware about it . Social engineering is a term we are hearing now a days a  lot. But  what is it?  Social engineering is a technique which is aimed to target a victim to reveal the information or performing some illegitimate tasks for his benefits. It is like psychological manipulation for the performing actions. Lets see few techniques with examples below Phishing refers to a technique of fraudulently obtain the private information. It is an attack to steal your money, by getting to know about the personal information by the person. Example : The e-mail which gets especially in festival times usually contains a link to a fraudulent web page that seems legitimate—with company logos and content—and has a form requesting everything from a home address to an ATM card's PIN or a credit card number. Vishing also known as " voice phishing ", is again the same practice of revealing the information over a ...

What is Malware?

What is Malware? Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Few are listed Below A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. It infect other computer without the permission or knowledge of the user. Virus may corrupt the system or can steal any data. A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files.  A backdoor is a computer program that allows an attacker to gain unauthorized remote access to a victim's machine often without their knowledge. A Trojan horse is any malware that misleads ...

What are SSL and TLS?? What is the difference between SSL and TLS??

What are SSL and TLS?? What is the difference between SSL and TLS?? What is SSL? SSL (Secure Sockets Layer) is networking protocols which helps in securing the network. Transport Layer Security (TLS)  is the upgrade version of SSL. SSL is a digital document that secure the identity of any website. Basically it encrypts the data by using cryptographic key pairs which consists of public and private key. The public key is present in the certificate and allows the web browser to start off the communication given to the server. The private key is on the server and is used to digitally retrieve or sign the web pages and other files such as images, videos, scripting files. In SSL certificate we can see much information also which includes identifying information about the website, its domain name and identifying information about the site's owner. We could also see expiry information, serial number, company issued also about the certificates. To keep the website secure one should buy the...