Interpreting the misunderstanding of data leakage Protection Technology

Source: Internet
Author: User

The expert group at the RSA meeting pointed out that the deployment of data leakage protection technology has been suspended for many enterprises due to misleading information and incorrect publicity on data leakage protection, they missed the opportunity to use the in-depth content detection provided by data leakage protection technology.

"What bothers me very much is that many people I have met say that the data leakage protection technology is too difficult to use, because before you deploy it, you must manually classify all data, "said Rich Mogull, founder of the analysis company Securosis." This is not a fact. Companies can fully enjoy the benefits of this technology as long as they are properly deployed. I know that people who are already using data leakage protection solutions will not complain about this. When you talk to these people who are actually using this technology, no one will tell you that this technology is perfect or unavailable, but they will tell you the real operation of the data leakage protection technology."

Mogull said he divided people complaining about the technology into three categories: those who did not buy a complete data leakage protection solution and were not satisfied with the effects of the products they purchased; those who bought the solution, people who only select some settings and perform quick deployment without any plans; competing vendors hope that you can buy their products instead of data leakage protection.

Larry Whiteside, a member of the Expert Group, has been using data leakage protection technology for a year. He seems to be inclined to accept misleading information about data leakage protection.

"This is an interesting process. When I first started looking at the data leakage protection solution, many people in the same industry felt like, 'Oh, my God, you don't know how troublesome this is, no one has the ability to deploy comprehensive data leakage protection. This is not what you can do, '"Whiteside said." But, you know, I don't agree."

Whiteside builds a very distributed environment to use data leakage protection solution, with over 15000 users. He believes that many misunderstandings about the data leakage protection technology stem from the confusion about the data leakage protection technology. A few years ago, data leakage protection was the first popular product, it is only part of the product promotion for suppliers, but we do not know exactly what it is.

Category definition has always been a problem with Mogull. He said that in the early days, he prefers to define data leakage protection as a technology that performs deep content detection on all channels. Now he began to gradually compromise, because some other less advanced tools were also merged into the "data leakage Protection Suite" category. Although these tools may only be able to detect one channel, such as email, lack of advanced detection technology, error judgment, and other problems.

"I didn't slander these products, but they played different roles," he said. "Many users may just want to know the running status of the enterprise environment, you don't need to deal with all the problems. You can only handle error judgment. In my opinion, as long as you have the ability to analyze, this is the most important part. But in fact, the less comprehensive the data leakage protection deployed, the more difficult it is to manage ."

Whiteside explains that when an enterprise is looking for a data leakage protection solution, if the enterprise is looking for a data leakage protection solution with less functions, you need to remember to consider the problem of incorrect judgment.

"I have seen many vendors put devices in the data center and watched the data output. I heard them tell me, 'You see: we have too many matches, we need to do this, '"he said." Then I can see a person's phone number or information that looks like a credit card number. I will say,' This is not a credit card number at all. '"

These vendors will tell him that this is only a "fine-tuning" problem of the system, but he said he prefers a comprehensive data leakage protection solution, at least not requiring too much management work.

"This is what you need to consider," he said. "You must understand the scope you can manage and your tolerance for 'System fine-tuning ', because it is very important, 15000 of my users emailed me out. When I saw the rapid rise in the data, I began to feel a bit panic and sweaty."

Whiteside says it is equally important to consider long-term enterprise needs to prevent replacement of data leakage protection systems after several years of use.

"I think the important thing is that you need to think clearly about your strategy," he said. "If you just want to solve the imminent problem, you may encounter problems in the future, because you may choose the wrong product and then need to purchase another completely different product in a few years, your strategy should be far-sighted and far-sighted."

The final consideration for data leakage protection deployment is the blocking function. "You cannot suddenly decide to immediately stop sending information. In many cases, this has a negative impact on your business and is not the best choice, "says Dave Meizlik, A Websense company." monitoring actions and releasing notifications have a big impact on your business risks."

In fact, Whitesiade said that during the year of his deployment, he was still only out of monitoring mode.

"During the 12-month period, we were still only monitoring, but monitoring helped me better understand the company. I was able to access different business departments and help them," he said. "This makes a lot of sense ."

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.