1
To protect their sensitive data, organizations must deal with a variety of threats – including cybercriminals, advanced persistent threats, malicious insiders and unintentional leaks. A GROWING THREAT VIGILANT DEFENSE An effective data loss prevention program requires the right technologies and policies in place and working together. DLP: COORDINATED SECURITY 88% 25,566 As organizations address the wide variety of threats they face, from around the world to inside their own offices, they need a holistic approach to security and data loss prevention (DLP). ey must take into account how different users and different data sets all interconnect on different systems. A 2014 security study found that every 49 minutes, sensitive data is unintentionally sent outside an enterprise. An effective DLP system will identify essential data, monitor it and protect it whether the data is in motion on a network, at rest in a storage system or in use on an endpoint. Among the elements of an effective DLP system: discovery technology for sensitive data at rest, in use and in motion; prevention technology to stop the unintentional leakage of data; and data governance technology to provide data owner identification and visibility into file usage details. 39% list social media applications, while 38% say cloud-based apps are most vulnerable A wide variety of organizations have suffered high-profile data breaches, including federal, state and local government agencies; educational institutions and school districts; nonprofit groups; and small, midsize and large businesses. e percentage of organizations that experienced at least one data loss incident in 2013 e number of federal agency data breaches in 2013 involving information such as taxpayer data, census data, Social Security information or patient health information THE ROGUES’ GALLERY PIECING THE PUZZLE TOGETHER 57% SOURCES To learn more about data loss prevention and CDW’s security expertise, visit CDW.com/datasecurity. http://www.checkpoint.com/documents/ebooks/security-report-2014/files/assets/common/downloads/Check%2 0Point%20Security%20Report%202014.pdf http://www.gao.gov/products/GAO-14-487T http://www.trustedcs.com/resources/whitepapers/Ponemon-RaytheonPrivilegedUserAbuseResearchReport.pdf http://www.sophos.com/en-us/threat-center/medialibrary/PDFs/other/sophos-security-threat-report-2014.pdf http://www.trustedcs.com/resources/whitepapers/Ponemon-RaytheonPrivilegedUserAbuseResearchReport.pdf A trusted partner can help organizations plan and deploy a DLP system. CDW’s certified specialists can assist with every phase of choosing and leveraging the right solution for any IT environment. e percentage of IT professionals who use automated tools to grant privileged user access to IT resources BUILDING TRUST e number of smartphones lost every minute in the United States 113 e percentage of IT professionals who list mobile applications as among the most at risk in their organizations 48% Trends such as mobility, cloud computing, social media and the Internet of ings all pose increasing challenges for data security. 89% e percentage of IT professionals who are increasingly concerned about insider threats PRESSURE PACKED

DLP: COORDINATED SECURITY · 2015. 2. 24. · they need a holistic approach to security and data loss prevention (DLP). ˚ey must take into account how different users and different

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: DLP: COORDINATED SECURITY · 2015. 2. 24. · they need a holistic approach to security and data loss prevention (DLP). ˚ey must take into account how different users and different

To protect their sensitive data, organizations must deal with a variety of threats – including cybercriminals, advanced persistent threats, malicious insiders and unintentional leaks.

A GROWING THREAT

VIGILANT DEFENSE

An effective data loss prevention program requires the right technologies and policies in place and working together.

DLP: COORDINATED SECURITY

88%25,566

As organizations address the wide variety of threats they face, from around the world to inside their own offices, they need a holistic approach to security and data loss prevention (DLP). �ey must take into account how different users and different data sets all interconnect on different systems.

A 2014 security study found that every 49 minutes, sensitive data is unintentionally sent outside an enterprise. An effective DLP system will identify essential data, monitor it and protect it whether the data is in motion on a network, at rest in a storage system or in use on an endpoint.

Among the elements of an effective DLP system: discovery technology for sensitive data at rest, in use and in motion; prevention technology to stop the unintentional leakage of data; and data governance technology to provide data owner identification and visibility into file usage details.

39% list social media applications, while

38% say cloud-based appsare most vulnerable

A wide variety of organizations have suffered high-profile data breaches, including federal, state and local government agencies; educational institutions and school districts; nonprofit groups; and small, midsize and large businesses.

�e percentage of organizations that experienced at least one data loss incident in 2013

�e number of federal agency data breaches in 2013 involving information such as taxpayer data, census data, Social Security information or patient health information

THE ROGUES’ GALLERY

PIECING THE PUZZLE TOGETHER

57%

SOURCES

To learn more about data loss prevention and CDW’s security expertise,visit CDW.com/datasecurity.

http://www.checkpoint.com/documents/ebooks/security-report-2014/files/assets/common/downloads/Check%20Point%20Security%20Report%202014.pdfhttp://www.gao.gov/products/GAO-14-487Thttp://www.trustedcs.com/resources/whitepapers/Ponemon-RaytheonPrivilegedUserAbuseResearchReport.pdfhttp://www.sophos.com/en-us/threat-center/medialibrary/PDFs/other/sophos-security-threat-report-2014.pdfhttp://www.trustedcs.com/resources/whitepapers/Ponemon-RaytheonPrivilegedUserAbuseResearchReport.pdf

A trusted partner can help organizations plan and deploy a DLP system. CDW’s certified specialists can assist with every phase of choosing and leveraging the right solution for any IT environment.

�e percentage of IT professionals who use automated tools to grant privileged

user access to IT resources

BUILDING TRUST

�e number of smartphones lost every minute in the United States

113

�e percentage of IT professionals who list mobile

applications as among the most at risk in their organizations

48%

Trends such as mobility, cloud computing, social media and the Internet of �ings all pose increasing challenges for data security.

89%�e percentage of IT professionals who are increasingly concerned about insider threats

PRESSURE PACKED