Security School

DLP deployments: Understanding your options

Understand the different DLP technologies to ensure your organization has a successful DLP deployment.


Security School logoSecuring sensitive data stored in traditional networks was a formidable task. But today's complex business and IT environments are creating seemingly impossible scenarios for keeping data in check. DLP technologies can provide the answer to the challenges you face but only when they're selected, implemented and managed properly.

CPE credits

 This School lesson explains the difference between data loss prevention suite and point product approaches, assesses what you'll need to focus on within your own organization and examines pitfalls you will need to avoid in your organization's DLP implementation.

Watch the video, listen to the podcast, read the tech tip then take the quiz to see how much you have learned. Passing the quiz earns you one CPE credit from (ISC)².

View our Security School Course Catalog to view more lessons eligible for CPE credits.


The realities of DLP

In the presentation, information security expert Kevin Beaver shares his real-world experiences with data loss prevention technologies that will help you understand what data is at risk and what DLP can and can't do.


Video: The realities of DLP

Understand common pitfalls with DLP implementations and learn what areas and data types are most important to focus on once you deploy a DLP solution.


Lessons learned from real-world DLP technologies

A successful data loss prevention deployment hinges on your organization's data governance maturity. George Hulme explains how to avoid the pitfalls and get the most value out of your DLP system.


DLP technology deployments

Gain real-world insight into successful DLP deployments. Continue Reading



Just because an enterprise doesn't own the variety of cutting-edge mobile devices its employees use at home and at work, doesn't mean there isn't a critical need to apply data leakage protection capabilities to them.


Practical advice for managing DLP technology effectively

In this podcast, we'll delve into some "essential questions you need to ask" regarding the capabilities of DLP on employee-owned mobile devices. Continue Reading


Test your knowledge

Take this five-question quiz to see if you've mastered your understanding of the important DLP technologies and how to use them successfully to detect unauthorized data access.

Take the quiz


About the expert

Learn more about the author of this Security School, Kevin Beaver, and view his collection of videos and technical tips.

Kevin Beaver

Kevin Beaver, CISSP, is an independent information security consultant, speaker and expert witness with Atlanta-based Principle Logic, LLC. He has over 20 years experience in the industry and specializes in performing information security and compliance assessments revolving around information risk management. Kevin has authored/co-authored seven books on information security including "Hacking For Dummies" (Wiley) and "The Practical Guide to HIPAA Privacy and Security Compliance" (Auerbach). Continue Reading

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.