Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. The practice protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. Extrusion detection, by contrast, simply alerts an administrator to a potential issue.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Network administrators and anyone responsible for maintaining a secure database faces unprecedented challenges in controlling the flow of proprietary data across gigabit networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and compliance status. Pervasive use of P2P file sharing, FTP file transfer, webmail and USB drives offer multiple vectors for information to escape an organization's traditional gateway controls. Extrusion prevention software offers the administrator a set of tools to manage risk.
Extrusion prevention software uses a combination of network monitoring systems and real-time packet filtering. In general, database extrusion prevention (DBEP) software provides a central interface to regulate traffic regardless of its origin. There are three broad categories of DBEP:
- packet sniffer s that filter incoming calls to Web servers
s or proxies on network SQL injection, or prevent unauthorized access based on user permission settings or activity that does not match with usage profiles. Pattern recognition techniques, like network behavior anomaly detection (NBAD) and network behavior analysis (NBA) both allow administrators to identify and stop abnormally large data transfers.
Continue Reading About extrusion prevention
- Neil Roiter discusses extrusion prevention in 'Springing leaks: Getting smart about data loss prevention.'
- Charles Thompson explored the use of extrusion prevention software to deal with internal security threats in school systems.
Dig Deeper on Data loss prevention technology