Access "Deploying DP systems: Four DLP best practices for success"
This article is part of the May 2012 issue of New security strategies for the bring-your-own-device era
Data loss prevention technology is garnering a lot of attention these days thanks to publicized data leaks and increasingly stringent regulatory compliance mandates concerning data protection. While the technology itself is not a regulatory requirement, the ability to identify sensitive or private data, secure it (by rendering it illegible to unauthorized parties via encryption), and prevent its unauthorized disclosure – all objectives of DLP systems – can help organizations stay out of the headlines and meet their compliance and data security goals. However, technology is only one small part of a full-blown DLP implementation. It also requires a significant amount of effort dedicated to strategy, people and process. When DLP deployment projects go wrong, it is usually due to common mistakes that arise in relation to these other non-technical components. Here are four DLP best practices to help ensure your organization’s data loss prevention initiative is a success. 1. Understand your requirements The most critical DLP deployment mistakes are made before the... Access >>>
Premium Content for Free.
Mobile device management systems help mitigate BYOD risks
by Lisa Phifer, Contributor
Understand the benefits and limitations of multi-platform MDM technology.
Deploying DP systems: Four DLP best practices for success
by Crystal Bedell
Plan your data loss prevention project carefully to avoid missteps.
- Mobile device management systems help mitigate BYOD risks by Lisa Phifer, Contributor
VMware strategy for security partners undergoes overhaul
by Marcia Savage, Editor
Virtualization giant revamps its security partner program after hitting some bumps in the road.
Thwarting BYOD risks starts with a mobile security policy, experts say
by Robert Westervelt, News Director
Organizations need to establish formal mobile policies before buying a mobile device management system.
- VMware strategy for security partners undergoes overhaul by Marcia Savage, Editor
Verizon DBIR: Organizations are forgetting computer security basics
by Marcia Savage
Verizon data breach report illustrates need to get back to basics.
Cybersecurity education vs. cybersecurity training
by Ron Woerner, Contributor
Security professionals need to understand the difference and plan accordingly.
Security staffing: Why information security positions go unfilled
by Lee Kushner, Contributor
Be aware of potential roadblocks and adjust your recruiting accordingly.
- Verizon DBIR: Organizations are forgetting computer security basics by Marcia Savage
More Premium Content Accessible For Free
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...
Not only is modern malware getting more prevalent and sophisticated, it's also now focusing on a broader array of targets. Attackers would still love...
IT Decision Center
Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.