Access your Pro+ Content below.
Deploying DP systems: Four DLP best practices for success
This article is part of the Information Security magazine issue of May 2012
Data loss prevention technology is garnering a lot of attention these days thanks to publicized data leaks and increasingly stringent regulatory compliance mandates concerning data protection. While the technology itself is not a regulatory requirement, the ability to identify sensitive or private data, secure it (by rendering it illegible to unauthorized parties via encryption), and prevent its unauthorized disclosure – all objectives of DLP systems – can help organizations stay out of the headlines and meet their compliance and data security goals. However, technology is only one small part of a full-blown DLP implementation. It also requires a significant amount of effort dedicated to strategy, people and process. When DLP deployment projects go wrong, it is usually due to common mistakes that arise in relation to these other non-technical components. Here are four DLP best practices to help ensure your organization’s data loss prevention initiative is a success. 1. Understand your requirements The most critical DLP ...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
Understand the benefits and limitations of multi-platform MDM technology.
Virtualization giant revamps its security partner program after hitting some bumps in the road.
Plan your data loss prevention project carefully to avoid missteps.
Organizations need to establish formal mobile policies before buying a mobile device management system.
Columns in this issue
Verizon data breach report illustrates need to get back to basics.
Security professionals need to understand the difference and plan accordingly.
Be aware of potential roadblocks and adjust your recruiting accordingly.