Understanding What Data Needs Protection

 
 
By Dave Meizlik  |  Posted 2008-12-23 Print this article Print
 
 
 
 
 
 
 


Understanding what data needs protection

Perhaps the most critical capability of a DLP solution is its ability to accurately understand the data that needs to be protected. Confidential data comes in many forms: It can be in an Excel file, a presentation, a database, a Word document, an e-mail or an instant message.

The ability to look beyond the "wrapper," or format type, and examine the data itself is the core strength of DLP technology. Content-aware DLP technology has data intelligence and can identify critical differences (such as whether a list is a confidential customer list or a grocery list). It can tell if the data is source code or a merger document, or even if it's just an innocuous e-mail between colleagues.

With a DLP system that identifies what is confidential and accurately protects that data, an acquiring organization can secure its investment early on, better understand the business it has acquired and reduce risk.

 

Dave Meizlik is a senior manager for Data Security Solutions at Websense Inc., a security software company. Dave also has a blog covering data loss issues at http://ondlp.com. He can be reached on his blog's site or at dmeizlik@websense.com.



 
 
 
 
Dave Meizlik is a Senior Manager for Data Security Solutions at Websense, Inc., a security software company. Dave also has a blog covering data loss issues at http://ondlp.com. He can be reached on his blog's site or at dmeizlik@websense.com.
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel