Download presentation
Presentation is loading. Please wait.
Published byEustacia White Modified over 9 years ago
1
Protection from internal threats: Evolution of DLP or Who sets trends
2
EARLY DLP Tasks that DLPs were designed to address: Control of maximum number of communication channels Corporate data leakage prevention Archiving business communications Incidents management
3
DEVELOPMENT OF DLP Email messages, including encrypted onesFTP/FTPS, HTTP/HTTPS file transferSkype, Viber, ICQ and other IM messages and files Messages in social networks, blogs, forums, chats External devices, СD/DVD, printers Audio monitoring
4
USER ACTIVITY MONITORING SYSTEMS Control of work hours Logging user actions Application activity monitoring Reporting
5
THE EMERGENCE OF COMPREHENSIVE INSIDER THREAT PROTECTION SYSTEMS Conventional DLP system User Activity Monitoring System User Activity Monitoring System Conventional DLP system
6
REQUIREMENTS TO COMPREHENSIVE INSIDER THREAT PROTECTION SYSTEMS can control the maximum number of data transmission channels are easily integrated into any network with no need to change infrastructure operate on gateway level and on endpoints both are modularized are easily installed and configured, show high performance along with inconsiderable impact on endpoint operation are user-friendly and easy to interact with Market needs solutions that:
7
AN INTEGRATED APPROACH TO PROTECTION FROM INTERNAL THREATS Information flows control and data leak protection Work processes control Operational risk management Reputational risk management
8
SHIFT OF TRENDS
10
TOP 7 REASONS FOR DISMISSAL IN 2014 According to Falcongaze Analytics Center Misuse of work hours and internet — 37 % Corruption and bribery — 21 % Comments on management board and corporate policy — 17 % Search for new job — 11 % Violation of corporate rules — 6 % Negligent treatment of confidential data — 4 % Industrial espionage — 4 %
11
USER ACTIVITY STATISTICS
12
WORK HOURS MONITORING
13
INFORMATION ON VISITED SITES
14
USER RELATIONS GRAPH ANALYZER
15
USE OF APPLICATIONS ANALYSIS
16
REPORTING
17
CURRENT TRENDS Fast introduction Deployment in high complexity networks Flexibility — several ways to intercept traffic Comprehensive tool for information and economic security Usability Modularity Low TCO
18
Thank you
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.