Security School

DLP deployments: Understanding your options

Understand the different DLP technologies to ensure your organization has a successful DLP deployment.

Introduction

Security School logoSecuring sensitive data stored in traditional networks was a formidable task. But today's complex business and IT environments are creating seemingly impossible scenarios for keeping data in check. DLP technologies can provide the answer to the challenges you face but only when they're selected, implemented and managed properly.

 This SearchSecurity.com School lesson explains the difference between data loss prevention suite and point product approaches, assesses what you'll need to focus on within your own organization and examines pitfalls you will need to avoid in your organization's DLP implementation.

1Webcast-

The realities of DLP

In the presentation, information security expert Kevin Beaver shares his real-world experiences with data loss prevention technologies that will help you understand what data is at risk and what DLP can and can't do.

Video

Video: The realities of DLP

Understand common pitfalls with DLP implementations and learn what areas and data types are most important to focus on once you deploy a DLP solution.

2Tip-

Lessons learned from real-world DLP technologies

A successful data loss prevention deployment hinges on your organization's data governance maturity. George Hulme explains how to avoid the pitfalls and get the most value out of your DLP system.

News

DLP technology deployments

Gain real-world insight into successful DLP deployments. Continue Reading

3Podcast-

DLP for BYOD

Just because an enterprise doesn't own the variety of cutting-edge mobile devices its employees use at home and at work, doesn't mean there isn't a critical need to apply data leakage protection capabilities to them.

Podcast

Practical advice for managing DLP technology effectively

In this podcast, we'll delve into some "essential questions you need to ask" regarding the capabilities of DLP on employee-owned mobile devices. Continue Reading

4Quiz-

Test your knowledge

Take this five-question quiz to see if you've mastered your understanding of the important DLP technologies and how to use them successfully to detect unauthorized data access.

Take the quiz

5Expert-

About the expert

Learn more about the author of this Security School, Kevin Beaver, and view his collection of videos and technical tips.

Expert

Kevin Beaver

Kevin Beaver, CISSP, is an independent information security consultant, speaker and expert witness with Atlanta-based Principle Logic, LLC. He has over 20 years experience in the industry and specializes in performing information security and compliance assessments revolving around information risk management. Kevin has authored/co-authored seven books on information security including "Hacking For Dummies" (Wiley) and "The Practical Guide to HIPAA Privacy and Security Compliance" (Auerbach). Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close