Access "Endpoint DLP fills data protection gap"
This article is part of the January/February 2010 issue of Filling the data protection gap
Be it as part of a full-suite solution or as a standalone product, organizations are increasingly turning to endpoint data loss prevention (DLP) to close the gap on data protection. Although most organizations start with network DLP to gain the broadest coverage as quickly as possible, loss of sensitive data isn't exactly a problem limited to the network or storage repositories. From remote users to portable storage, the endpoint is not only a significant repository for sensitive information, it's where users spend much, if not most, of their time accessing the data. But endpoint DLP is also the least mature segment of this increasingly popular class of technology. Due to processor and memory limitations it's where we see the biggest differences between competing products, and the greatest feature and performance constraints. We also see competing solutions targeting the endpoint from different genealogical backgrounds, with offerings from traditional DLP, traditional endpoint, portable device control, and even encryption vendors. With such a confusing ... Access >>>
Premium Content for Free.
New data protection laws
by Richard E. Mackey, Jr., Contributor
Massachusetts 201 CMR 17.00 and Nevada's data protection law establish new standards for personal data protection
Disaster recovery plans and DLP solutions top 2010 priorities
Disaster recovery plans, DLP solutions, and regulatory compliance are top enterprise priorities, according to Information Security's Priorities 2010 survey
- New data protection laws by Richard E. Mackey, Jr., Contributor
Endpoint DLP fills data protection gap
by Rich Mogull
Learn how endpoint data loss prevention technology complements network DLP and secures data that users interact with on laptops, mobile and portable storage devices.
Attackers zero in on Web application vulnerabilities
Secure coding and vulnerability scanning could mitigate many Web application attacks
- Endpoint DLP fills data protection gap by Rich Mogull
Perspectives: Pet information security risks
by Ron Woerner
IT and security managers often make the mistake of being consumed with a specific risk or threat to the detriment of security
Schneier-Ranum Face-Off: Should we ban anonymity on the Internet?
Security experts Bruce Schneier and Marcus Ranum debate the possibility of eliminating anonymity on the Internet.
Leverage Google Attacks to Improve Cybersecurity
China's hacker attacks against Google's infrastructure, including Gmail accounts of human rights activists as well as Google's source code, should be used to educate enterprises about the reality of cyberespionage from nation states and organized criminals.
- Perspectives: Pet information security risks by Ron Woerner
More Premium Content Accessible For Free
You can fight compliance or embrace it, but one way or the other, you can’t escape it. Increasingly, smart organizations are not just accepting ...
Antivirus and intrusion prevention aren’t the threat detection stalwarts they used to be. With mobile endpoints and new attack dynamics, enterprises ...
The world in which successful IAM programs must be implemented is increasingly complex, a mix of legacy on-premise IAM infrastructures, cloud-based ...