Data Leak Prevention – What You Should Know

By supertech01 | Published July 14, 2016

Businesses face many information security risks that must be balanced with the need for information to flow, enabling business productivity. Between mobile devices, remote data centers and cloud-based applications, there’s no longer a well-defined security perimeter. Instead of fixed devices and endpoints, there’s a constant state of flux.

To mitigate the risk associated with the flow of modern business information, organizations must look beyond just using a firewall. Today, you need to examine the location and classification of data and continuously monitor sensitive data sets. This is the basis of today’s data leak protection solutions.

Data leak protection resources  focus on making sure that end users do not send sensitive or critical information outside the corporate network by breaking down the phases of the data: in-motion, in use or at rest.

Data in motion

Data in motion is that which is being transmitted over a network. To protect sensitive data in this state, solutions  examine network traffic patterns within the data being transmitted and report findings back to a centralized server. This is a good way to detect unauthorized insider leakages through email or instant messaging.

Data in use

Data in use is actively being used on a device. Solutions to protect data in use are typically running on desktop computers or mobile devices. These systems monitor and in some cases  provide application controls to block attempted transmissions of confidential information all while giving immediate feedback to the user. 

Data at rest

Data at rest is when it is resident in its data store, typically as part of a file system on a server within the company. The solutions addressing this phase of data rely heavily on encryption and restricting access to the data through internal user controls.

For help preventing data leaks in your organization, please contact Superior Technology at 845-735-3555 or online at www.superiortechnology.com.


Comments are closed.

Archive by Date