I would like others input on the topic of data leak prevention. I work for a small company that has about 70 users but we deal with a lot of sensitive information. The owner of the company wants to be able to monitor the data we have and know who is accessing it, when and how as well as know if it is being downloaded to CD/DVD or USB and leaving the company office.
I have been looking at a few DLP programs and the one thing that I am concerned about is that they make a copy of the data as an inventory to compare against the data that it is meant to protect. With that in mind, DLP programs sit on the perimeter of the network watching. Theoretically, if I were looking to get my hands on the crown jewels, malicious intent would dictate that I go straight to the queen herself, so you can see how this could be a potential security problem.
What suggestions do you have for monitoring our data without putting something on the perimeter of our network? What ideas do you have for being able to log the movement of our data and who is accessing it?
Any information would be a great help and I look forward to seeing your responses. Thanks.
I have been looking at a few DLP programs and the one thing that I am concerned about is that they make a copy of the data as an inventory to compare against the data that it is meant to protect. With that in mind, DLP programs sit on the perimeter of the network watching. Theoretically, if I were looking to get my hands on the crown jewels, malicious intent would dictate that I go straight to the queen herself, so you can see how this could be a potential security problem.
What suggestions do you have for monitoring our data without putting something on the perimeter of our network? What ideas do you have for being able to log the movement of our data and who is accessing it?
Any information would be a great help and I look forward to seeing your responses. Thanks.
Comment