Security School

DLP deployments: Understanding your options

This Security School is a free multimedia learning guide designed to help you understand and address the strategic and tactical implications of this topic.

Practical advice for managing DLP technology effectively

In this podcast, Kevin Beaver provides advice for managing DLP technology in your environment to ensure a successful data loss prevention program.

FROM THE SECURITY SCHOOL:

DLP deployments: Understanding your options

SECURITY SCHOOL SECTIONS

  1. Webcast
  2. Tip
  3. Podcast
  4. Quiz
  5. Expert
+ Show More

A BYOD environment can be plagued with many security complexities, providing IT security managers with challenges and hurdles to jump over. Integrating data loss prevention (DLP) into a BYOD environment certainly falls into the challenging category. It is crucial for IT security managers to allow employees access to corporate data on mobile devices, but to also keep that data secure. Finding that balance is not easy.

In this podcast, Kevin Beaver explores essential questions and considerations about DLP technology as it relates to the BYOD movement in businesses. Beaver offers his expertise when it comes to concern for DLP for mobile computing, and explains why traditional MDM solutions are no longer enough to keep your data secure. Additionally, Beaver discusses various pitfalls he sees in organizations with DLP and BYOD including not knowing where to get started and the fear of addressing security controls on executive mobile devices. Beaver then touches upon what technologies compliment DLP in the mobile realm, such as antimalware and encryption.

This podcast closes with Beaver’s advice on the best way to ensure DLP success in the context of BYOD. It comes down to having the right people on board and keeping them in the loop. It is important to demonstrate what these controls are contributing to the business and how it will continue to do so for the future.

This was last published in July 2013

PRO+

Content

Find more PRO+ content and other member only offers, here.

Security School

DLP deployments: Understanding your options

SECURITY SCHOOL SECTIONS

  1. Webcast
  2. Tip
  3. Podcast
  4. Quiz
  5. Expert

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

By discovering sensitive information at rest, and monitoring and blocking sensitive information in motion, using content-aware scanning technology. The discovery, monitoring and blocking DLP components run either on the network servers reaching out to scan repositories or intercepting network information flows or on endpoints end user computers or laptops
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close