When it comes to data security, preventing data exfiltration and exposure is often top of mind for organizations. However, reactive technologies (like DLP) that aim to protect business by interrupting the flow of information from one place to another (less desirable) place are frequently disruptive to the natural workflow of a business.
When evaluating or purchasing expensive tooling that could potentially be disruptive, it's key to ensure that it is implemented for the right reason and in the right way. Otherwise, it is likely that the permissions given to the tool will be withdrawn until it is simply operating in monitoring mode, leaving a company with an uninterrupted workflow but false sense of security.
It's important to tune your DLP solution to the real problem you're experiencing today, and data discovery and classification can support that. Which brings us to our question: Is your DLP running?
When it comes to data security, preventing data exfiltration and exposure is often top of mind for organizations. However, reactive technologies (like DLP) that aim to protect business by interrupting the flow of information from one place to another (less desirable) place are frequently disruptive to the natural workflow of a business.
When evaluating or purchasing expensive tooling that could potentially be disruptive, it's key to ensure that it is implemented for the right reason and in the right way. Otherwise, it is likely that the permissions given to the tool will be withdrawn until it is simply operating in monitoring mode, leaving a company with an uninterrupted workflow but false sense of security.
It's important to tune your DLP solution to the real problem you're experiencing today, and data discovery and classification can support that. Which brings us to our question: Is your DLP running?
Phil has a background in Computer Science from Western University, Canada. With over 12 years of experience in the Networking, Embedded Development, IoT, and Cybersecurity domains, Phil uses his expertise to help customers identify and map effective solutions that enrich security and technology program rollouts.