How to Integrate Data Loss Protection in Web 2.0 Security Strategies

By Bob Hinden  |  Posted 2010-04-29 Print this article Print

Businesses in all types of industries today are investing in data loss protection technology at increasingly higher rates because of the increase in corporate insider threats. As more employees utilize Web applications for real-time communications, data leak prevention has become even more complex. Here, Knowledge Center contributor Bob Hinden discusses the trends driving this new generation of insider threats and shows how businesses can implement data loss protection into their Web 2.0 security strategies.

Social networking sites and Web 2.0 applications have become pervasive in the enterprise. As Web-based tools bridge gaps between communities and wipe away physical borders, they enable people and businesses to communicate in real time. While instant messaging, Web conferencing, and peer to peer file-sharing and social networking sites can provide a wealth of advantages in the enterprise, they are becoming the newest entry points for Internet threats, compliance violations and data loss.

The Web 2.0 world has made security more complex, and organizations are looking for a comprehensive approach to security that reduces-not multiplies-the number of threats, as well as eases management and regulatory challenges faced by IT managers.

For many companies, social networking and Web 2.0 applications have moved well beyond just personal use to help businesses market their products and optimize workforces.

For example, human resources may be using LinkedIn to research employee prospects, sales teams may leverage Facebook to legitimately interact with customers, and marketing departments may utilize Twitter to share headlines or expand the visibility of their latest news announcement.

The ease of sharing information, combined with real-time communications, makes many of these tools very compelling. And such trends are expected to continue, with enterprise spending on Web 2.0 technologies projected to reach $4.6B globally by 2013. Businesses can't ignore the opportunity to increase productivity by leveraging these new tools.

Bob Hinden is a Check Point Software Fellow. Previously, Bob was a Chief Internet Technologist at Nokia Networks. Bob has worked on the Internet since its early days as a DARPA research project to the current Internet, and has seen threats start, from a few hackers showing off to their friends to the sophisticated and coordinated cybercrime it has evolved into today. Bob is the chair of the Administrative Oversight Committee (IAOC) and the IPv6 working group at the Internet Engineering Task Force (IETF). Bob has been active in the IETF since 1985 and is the author of 36 Request for Comments (RFC). Prior, Bob served on the Internet Architecture Board (IAB) and was Area Director for Routing in the Internet Engineering Steering group from 1987 to 1994. He is also a member of the RFC Editorial Board. Bob was the co-recipient of the 2008 IEEE Internet Award for pioneering work in the development of the first Internet routers. Bob holds a Bachelor's of Science degree in Electrical Engineering and a Master's of Science degree in Computer Science from Union College, Schenectady, NY. He can be reached at

Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters

Rocket Fuel