Data Loss Prevention tools, like any other software, require security features that ensure no hacker, malicious individual or curious characters bypass it and manage to leak sensitive data from an organization. Besides specific DLP capabilities, performance and price, the security of the solution itself and the anti-tampering measures are also key criteria that make a DLP solution complete and powerful.
Here are the top security features most CSOs ask about and you should also search for in an endpoint DLP solution:
DLP at the endpoint level has server-client architecture. The server part is where the management of the security policies is done while the client software is installed on each computer of the network that needs to be controlled for sensitive data transfers. To stop users from uninstalling the client-software, thus cutting the communication…Read more
Not long ago we faced the BadUSB threat and now, security researchers have discovered another sophisticated malware which can spread through USB devices. The “USB Thief”, as it is called, seems to be a highly specialized “thief”, since it can penetrate networks undetected, leaving no traces and working only on the USB drive on which it was injected by the attacker. According to the Eset researchers, it is also empowered with mechanisms that prevent the reproduction that could be used for malware analysis or discovery.How it works
When connecting an infected USB device, the malware executes simultaneously with portable applications and runs in the background, posing as a plug-in or a DLL file. It makes its way into the user’s computer to steal data and, in no time, it vanishes, with no evidence of the damage it made. It is also capable of protecting itself against reverse-engineering…Read more
I admit I am not a Linux user. I recently had the chance to work with a laptop with Linux Mint, and it just sat on my desk a few weeks because it had a root password (my brother set it up and forgot it; my brother is reckless, don’t be like my brother!). I didn’t know how to reset it, but finally succeeded because of my special research skills that got me to the root shell (thanks, Linux Mint community!). The experience quickly helped me comprehend the strong bond the Linux users have. They are like motorcyclists who also have a strong sense of community which you can see immediately by their special motorcycle wave.
If we also think about Linux distributions’ logos, we can discover the nature of the Linux users. Take the gecko, the openSuse lizard, the RedHat Shadowman and the Ubuntu circle of friends. Any IT Admin or IT professional from the Linux community can identify himself with the gecko …Read more
There is an old saying that knowledge is power. In the age of smartphones, where everything is digital, data has become the equivalent of knowledge and power. The news is constantly filled with hacking, cyber criminals, identity and data theft and various other incidents. So why are bad things happening to good people? Or, from a business perspective, why are bad things constantly happening to good companies? To answer that question, let’s take a look at the most likely causes of data loss.1. Uncontrolled use of USB and mobile devices
Although we live in the age of smartphones which are successfully helping employees to perform their job easier and that are dominating the workplace and personal lives, uncontrolled USB use can still pack a pretty good punch in the data loss prevention plan of a company. Data breaches caused by lost or stolen unencrypted USB storage devices are still among…Read more
This month we have joined the Linux Foundation as members. The Linux Foundation is a non-profit organization founded in 2007 by the merger of the Open Source Development Labs and the Free Standards Group. The association promotes and supports Linux and the open source projects trough training, events, workgroups, publications and other programs.
“The Linux Foundation protects and promotes the ideals of freedom and generous collaboration established through the development of Linux, and shares these ideals to power any endeavor aiming to make the future a better place in which to live.”
Source: Linux Foundation website
Why we joined Linux Foundation?
We had several reasons to become members of the Linux Foundation. The most important one is the fact that we develop Data Loss Prevention (DLP) and Mobile Device Management (MDM) solutions which are Linux based. As developers …Read more
Every year, some of the most influential companies and professionals gather for 5 days at the flagship information security event – RSA Conference USA held in San Francisco. Innovation is at its best at this event, always bringing fresh and relevant topics.
For us, it is the second year we attend as exhibitors and the experience from last year left us excited for the 2016 edition. More than 600 speakers will address key issues regarding information security, like insider threats, the dark web and cyber espionage, IoT security and others. You can find the full agenda here. If the sessions or exhibitors did not convince you to attend this year’s RSA, here are more reasons.
Data Loss Prevention (DLP) is a hot topic so we are happy to welcome you at our booth #N4328 in the north area of the expo with live demos and great giveaways.
Additionally, we will participate as members of the Trusted Computing…Read more
We talked about the top data security concerns for 2016+ in our previous article, so now we want to continue by giving some pointers on how to protect data against these threats.1. Increase your budget for data security
One of the problems most organizations face is the low budget they assign for data security, being seen as a low priority. In the last few years, budgets have grown, but it happened for big companies and enterprises, leaving small and medium businesses behind. The pressure to increase budgets comes from several directions: industry rules and regulations (HIPAA, PCI, SOX, etc.), more and more breaches that come to light, more complex work environments with more platforms and devices that store sensitive data, etc. With things changing and threats being more sophisticated, increasing budgets to invest in security solutions that prevent data breaches is mandatory.
Statistics about Cloud Services, Shadow IT, Wearables, and IoT show that they are amongst the top data security concerns for organizations. Now, more than ever, apps and interconnected devices are part of our lives and, with data moving back and forth between wearables and smartphones / computers, it is no wonder organizations are becoming more vulnerable.
Cloud services like file sharing tools, social media, etc. are a top data security concern for many organizations due to the fast adoption among employees who use them for easy collaboration and uploading / copying files. Most of the time, these services and applications are not authorized by IT departments but through a Data Loss Prevention solution, businesses have the option to limit data transfers only to trusted web addresses.
Shadow IT is a concern for 71% of security professionals, being justified by the fact that uncontrolled…Read more
As we’re getting ready to circle the 28th of January on the calendar, it’s time to take a second and wish everybody Happy Data Privacy Day! If you’re from a European country, then we meant Happy Data Protection Day!What is Data Privacy Day?
Data Privacy Day is an international holiday created in 2007 that takes place every 28th of January. Initiated by the Council of Europe, the Data Privacy & Protection Day it is recognized by 47 European states, USA and Canada and its purpose is to raise awareness and promote privacy and data protection best practices. With the ever increasing data breaches occurring worldwide and numerous privacy and data security scandals, multiple global organizations have embraced Data Privacy Day.Why should I care?
It’s not just about corporate data, leaked surveillance documents, celebrity naked pictures, personal bank details and social media…Read more
In our encounters and conversations with IT Administrators, IT Managers and data security staff, there are always some questions that pop-up. Some of them are valid concerns or doubts while others are signs of confusion, most of them being fed by vendors’ different approaches to DLP.
Here are 6 frequently asked questions about Data Loss Prevention (DLP):1. Can I detect malware with DLP?
No. Data Loss Prevention is a technology that prevents data breaches and detects confidential data being transferred, used or stored on endpoints based on specific detection techniques, like data matching, rule and regular expression matching, keywords, etc. Dedicated DLP solutions focus on insider threats, while antivirus solutions, on outsider threats. However, there are antivirus solutions that provide light DLP capabilities, like blocking data transfers to e-mail.2. Can I block the…Read more