Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity
    • Database
    • Networking
    • Storage

    DLP, DAM Share Common Data Security Objectives

    Written by

    Brian Prince
    Published February 6, 2008
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Database Activity Monitoring and Data Leak Prevention may have the same focus-securing data-but they operate in two different areas.

      Still, it all comes down to data, and while that may not mean the two products will become one, DAM could benefit from the content-awareness of DLP (Data Leak Prevention) products, analysts said.

      “Most every security monitoring technology would benefit from DLP content awareness, which is the ability to recognize sensitive content on the fly,” said Paul Proctor, an analyst with Gartner. “DAM [Database Activity Monitoring] and DLP tools will not likely become one product because they have different buying centers and purpose, but DAM tools will likely become content-aware.”

      Being able to recognize sensitive data on the fly reduces the necessity of proactively tagging or classifying it, he explained. As a result, more granular and effective policies can be built to address sensitive data.

      “For example, record the administrator’s actions if the transaction involves SSNs or other privacy related data,” Proctor said. “With current technology this is something that can only be done based on the definition and classification of the column or field. Content-aware technologies can catch sensitive data in a comment field, for example.”

      DLP tools use different data analysis techniques to monitor the use of sensitive content and enforce policies on data in motion, at rest and in use. The strength of DAM however is being able to watch administrator activity on the database and detect policy violations.

      “DAM will definitely get content aware-in fact it’s easier, because databases provide all sorts of structure and context you can’t get off the network,” said Ted Julian, vice president of marketing and director of strategy at Application Security. “One key thing to consider is exactly how this happens. If the customer is required to have deployed monitoring on the database in question for this to work, they’ll miss stuff.”

      DLP and DAM solve different problems

      “We think its critical customers can discover sensitive data automatically, even on databases they don’t know they have,” Julian continued. “Network appliance-based solutions just aren’t practical in this regard, simply way too cumbersome and expensive.”

      According to Bill Bartow, vice president of product management at Tizor, DLP and DAM solve very different but related problems.

      “Longer term, it’s possible that the two areas could converge but, frankly, we see DAM as a much larger market than DLP,” Bartow said. “Lately, we are seeing more and more DLP customers deploying DAM for a more complete data security strategy.”

      Some database monitoring products already include blocking capabilities, such as Guardium DBLP, which Guardium says locates and classifies sensitive data, then monitors traffic to and from database servers for unauthorized or suspicious activity.

      It can also block transactions that violate policy if the appliance is configured as an in-line database firewall or as a passive monitoring device that initiates other enforcement actions such as TCP reset blocking, automated logouts of database users and VPN port shutdowns.

      “DLP and DAM are important controls that most organizations should consider in their priorities,” Proctor said. “If you have DLP at the network and endpoints you will likely still need DAM controls inside your database.”

      Gartner analyst Mark Nicolett said some DAM vendors are definitely enhancing the content awareness of their products, and may look to gobble up smaller companies to do so.

      “We expect a few acquisitions of DAM vendors by large vendors that have DLP technology,” he said.

      Brian Prince
      Brian Prince

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.