Security School

Browse Sections


This content is part of the Security School: Learn how DLP technologies lock down enterprise assets
Manage Learn to apply best practices and optimize your operations.

Practical advice for managing DLP technology effectively

In this podcast, Kevin Beaver provides advice for managing DLP technology in your environment to ensure a successful data loss prevention program.

A BYOD environment can be plagued with many security complexities, providing IT security managers with challenges and hurdles to jump over. Integrating data loss prevention (DLP) into a BYOD environment certainly falls into the challenging category. It is crucial for IT security managers to allow employees access to corporate data on mobile devices, but to also keep that data secure. Finding that balance is not easy.

In this podcast, Kevin Beaver explores essential questions and considerations about DLP technology as it relates to the BYOD movement in businesses. Beaver offers his expertise when it comes to concern for DLP for mobile computing, and explains why traditional MDM solutions are no longer enough to keep your data secure. Additionally, Beaver discusses various pitfalls he sees in organizations with DLP and BYOD including not knowing where to get started and the fear of addressing security controls on executive mobile devices. Beaver then touches upon what technologies compliment DLP in the mobile realm, such as antimalware and encryption.

This podcast closes with Beaver’s advice on the best way to ensure DLP success in the context of BYOD. It comes down to having the right people on board and keeping them in the loop. It is important to demonstrate what these controls are contributing to the business and how it will continue to do so for the future.

This was last published in July 2013

Dig Deeper on Data loss prevention technology

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

By discovering sensitive information at rest, and monitoring and blocking sensitive information in motion, using content-aware scanning technology. The discovery, monitoring and blocking DLP components run either on the network servers reaching out to scan repositories or intercepting network information flows or on endpoints end user computers or laptops