What is Data Loss Prevention (DLP) How does It Work - Virtual Desktop Infrastructure | NEtechy

[How To]_$show=/search/label/How%20to$type=grid$meta=0$readmore=0$snippet=0$count=4$page=true

[What is]_$show=/search/label/What%20is$type=grid$meta=0$readmore=0$snippet=0$count=4$page=true

[Hindi]_$show=/search/label/Hindi$type=grid$meta=0$readmore=0$snippet=0$count=4$page=true

[News]$show=home$type=grid$meta=0$readmore=0$snippet=0$count=4$page=true

What is Data Loss Prevention (DLP) How does It Work - Virtual Desktop Infrastructure

What is Data Loss Prevention (DLP) How does It Work - Virtual Desktop Infrastructure What is Data Loss Prevention (DLP) How does It Work - Virtual Desktop Infrastructure

What is Data Loss Prevention (DLP)

DLP stands for Data Loss Prevention, which is a bit of a misleading moniker as most people quickly conjure up thoughts of data being deleted, and whilst this is critical a term that would better capture the gravity of DLP is Data Leak Prevention.

What is Data Loss Prevention (DLP) How does It Work


In today’s economy, data is the most important asset that a company has. Whether it’s intellectual properties, business strategy documents, specific market insights it’s one of the most prized assets of an organization. It’s a little interesting, however, that we don’t treat data the same way we treat money, one of the more visible assets that a company as – though it has the same if not more important.

Two examples – Google vs Uber on trade secrets that Google thought were stolen by the former Google executives. The other example being the NSA and Edward Snowden. Regardless of which side of the argument you sit (regarding mass surveillance), what can be agreed on is that it was not in the NSA’s interests for this information to leak, regardless of the ethics of the decision to leak the information.

Most companies have strict controls on who can approve purchases, recruitment, move money around, etc because these decisions have a direct bearing on the bottom line of the company. We don’t have the same type of controls when it comes to internal company data.

There’s very little in the way of restricting who accesses data, who can copy data, who can send the data externally, even though this sort of information tends to have longer term bearing on the profitability of a company. The ability to keep company secrets internal and to prevent the market (read; your competition) getting a good idea what you want to do in the longer run constitutes a competitive edge.

Too many times we have cases of employees who leave organizations and take trade secrets with them, customer lists, information on the companies intellectual property, or for software development companies, entire products. For this reason, data needs to be treated the same way financial assets are treated. With controlled access on who can do what with your data.

One caveat is that you can never really fully prevent loss of data, all you can do is make it remarkably difficult for the casual user to distribute it. A huge element of DLP is simply hiring people who you can trust and putting up adequate contractual deterrents for leaks. For instance, Google took their former engineer to court, Edward Snowden had to flee the country. These costs would deter most save for the most determined – the same applies to finances. Companies will lose money, but oft to the more determined individuals.

Securing Endpoints

Worker mobility has created tremendous productivity benefits for companies, but at the same time has created inherent risks when it comes to preventing data loss. For instance – if a team member is using their phone to access company email, they have a copy of company data on that device.

They also have a copy of this data on their laptop and this information can be:


  • Physically shown to a competitor
  • Forwarded to a personal email account etc
  • Copied off on a flash drive


What options do companies have?

Virtual Desktop Infrastructure

One technology that manages both requirements for mobility but control is virtual desktop infrastructure. It allows for companies to give their staff members the flexibility needed to work remotely, but at the same time securing multiple endpoints.

For instance – you can disable USB sticks and screenshots from this, whilst at the same time ensuring that the worker has access to all the company data they need to be productive in an environment that is centrally controlled and managed. Should an employee leave, access to the virtual machine will be remotely terminated and the employee will no longer have access to corporate data?

Securing email

What is Data Loss Prevention (DLP) How does It Work


One of the bigger ways that data can leak from companies is email. Many companies don’t bother securing their email platform, as it many times comes off as a headache, but there are multiple tools you can use to secure your email. The primary one being rule-based filters. For instance, if ACME corporation competes with XYZ corporation, there probably won’t be too much in the way of communication between the two companies, therefore, only pre-approved people in a certain level of management can send email to those companies.

Anyone working in certain departments can be prevented from sending emails to public domains (@gmail.com, @yahoo.com, etc), this way you can’t send yourself the email. It’s possible that you could collaborate with someone in another department whose rules allow them to send out the email, but this normally requires vocalizing intent, and leaves an audit trail should anything come up. This is a behavioral disincentive.


Intrusion Prevention Systems

What is Data Loss Prevention (DLP) How does It Work


These are devices that are within the corporate network of organizations to prevent unauthorized third parties from accessing internal corporate data (for instance, Target).

These can be physical or virtual devices and typically look for loopholes in a company’s IT infrastructure (this is regardless of whether it’s hosted internally or externally, data security is a necessary part of your ICT Policy. Most major IT security vendors have tools that you can use.

Read Also

What is Search Engine Optimization (SEO) - Why do I need Search Engine Optimization?
What is Virtual Private Network (VPN) - Secured Private Network Connection
What is Windows Server Essentials? Microsoft Windows Server 2019 Essentials 1 Device Product License Key

We Hope You Love The Articles- "What is Data Loss Prevention (DLP) How does It Work - Virtual Desktop Infrastructure" Do Share On Facebook And Whatsapp. Subscribe Us For More Awesome Content.

No comments:

You May Like

Name

Accessories,1,Advantages and Disadvantages,23,Affiliate Marketing,5,Amazon,2,Android,8,Antivirus,4,Application,2,Battery,3,BIOS,1,Bitcoin,1,Blogger,3,Blogs,16,Bluetooth,3,Business,15,Cable,1,Camera,1,Card,1,Categories,1,CD,1,CDMA,1,Cell Phone,2,Cloud Computing,1,Company,1,Computer,32,Computer Architecture,1,Computer Repairing,1,Computing,1,CPU,5,Data,1,Difference between,3,DNS,1,Domain,4,Download,9,E commerce,1,E-Commerce,1,eBay,1,EBooks,2,Email,2,Encryption,1,Error,1,Facebook,3,Facts,3,Features,2,Firewall,1,Floppy Disk,2,Free,3,Freelancer,2,Full Form,1,Games,14,Google,3,Graphics,1,Guide,1,Hard disk,1,Hardware,9,Headphone,1,Hindi,63,History,13,How,14,How to,40,HTML,2,Information,3,Instagram,1,Internet,17,Internet Marketing,1,Introduction,2,IVR System,1,Keyboard,1,Laptop,9,Mac Os,2,Machine,1,Marketing,6,Microsoft,5,Mobile,1,Money Transfer,1,Monitor,2,Motherboard,2,Mouse,2,Network,9,News,22,Online,2,Online Chat,1,Online Money,12,Online Surveys,1,Operating System,8,Password,1,PC Games,7,Pendrive,1,Plotter,1,Plugins,1,Pocket PC,1,Processor,3,Product,2,Programming Language,1,Refurbished,1,Refurnished,1,Satellite,2,Screen,1,SD Card,1,Search Engine,2,SEO,4,Server,3,SMS,1,Social Media,3,Software,18,SSD,1,Success,5,Tablet PC,2,Technology,7,Telephone,1,Television,4,TikTok,1,Tips,8,Tools,1,Top List,1,Touch Screen,2,Tricks,2,Types,2,USB,5,Video Card,2,Virus,5,VPN,1,Web Browser,3,Web Server,1,Website,14,Website Traffic,1,What is,138,Why,5,WiFi,4,Wikipedia,1,Windows,7,WordPress,3,XML Programming Language,1,YouTube,2,
ltr
item
NEtechy: What is Data Loss Prevention (DLP) How does It Work - Virtual Desktop Infrastructure
What is Data Loss Prevention (DLP) How does It Work - Virtual Desktop Infrastructure
What is Data Loss Prevention (DLP) How does It Work - Virtual Desktop Infrastructure What is Data Loss Prevention (DLP) How does It Work - Virtual Desktop Infrastructure
https://1.bp.blogspot.com/-Ne6pVPTi9U8/XSmPJGI_B1I/AAAAAAAAHSM/s17cLxBWXbcuqR6PvamkElMdkhSxJbOCgCLcBGAs/s1600/What-is-Data-Loss-Prevention-DLP-How-does-It-Work.jpg
https://1.bp.blogspot.com/-Ne6pVPTi9U8/XSmPJGI_B1I/AAAAAAAAHSM/s17cLxBWXbcuqR6PvamkElMdkhSxJbOCgCLcBGAs/s72-c/What-is-Data-Loss-Prevention-DLP-How-does-It-Work.jpg
NEtechy
https://www.netechy.com/2019/07/What-is-Data-Loss-Prevention-How-does-It-Work.html
https://www.netechy.com/
https://www.netechy.com/
https://www.netechy.com/2019/07/What-is-Data-Loss-Prevention-How-does-It-Work.html
true
751342609679224409
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy