Overview

Data loss/leak prevention solution is a system that is designed to detect potential data breach / data ex-filtration transmissions and prevent them by monitoring, detecting & blocking sensitive data while in-use (endpoint actions), in-motion (network traffic), and at-rest (data storage) In data leakage incidents, sensitive data is disclosed to unauthorized personnel either by malicious intent or inadvertent mistake. Such sensitive data can come in the form of private or company information, intellectual property (IP), financial or patient information, credit-card data, and other information depending on the business and the industry.

Backup

Data backup is a process of duplicating data to allow retrieval of the duplicate set after a data loss event. Today, there are many kinds of data backup services that help enterprises and organizations ensure that data is secure and that critical information is not lost in a natural disaster, theft situation or other kind of emergency.

DLP

Data loss prevention (DLP) is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users. DLP software classifies regulated, confidential and business critical data and identifies violations of policies defined by organizations or within a predefined policy pack, typically driven by regulatory compliance such as HIPAA, PCI-DSS, or GDPR. Once those violations are identified, DLP enforces remediation with alerts, encryption, and other protective actions to prevent end users from accidentally or maliciously sharing data that could put the organization at risk.

Data Classification

Data classification is broadly defined as the process of organizing data by relevant categories so that it may be used and protected more efficiently. On a basic level, the classification process makes data easier to locate and retrieve. Data classification is of particular importance when it comes to risk management, compliance, and data security.

Data classification involves tagging data to make it easily searchable and trackable. It also eliminates multiple duplications of data, which can reduce storage and backup costs while speeding up the search process. Though the classification process may sound highly technical, it is a topic that should be understood by your organization’s leadership.

Data Encryption

Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext. Currently, encryption is one of the most popular and effective data security methods used by organizations. Two main types of data encryption exist – asymmetric encryption, also known as public-key encryption, and symmetric encryption.

Data Loss Prevention

Forcepoint DLP
Safetica DLP
SecurEnvoy DLP
Teramind DLP
Symantic DLP
McAfee DLP

Forcepoint  Data Security Suite secures organizations against a wide range of data loss  scenarios with a single policy framework for network and endpoint data loss prevention and confidential data discovery – TRITON AP-DATA and AP-ENDPOINT extends data security controls to enterprise cloud applications and to your endpoints. Safely leverage powerful cloud services like Microsoft Office 365, Google for Work and SalesForce.com, as well as protecting your sensitive data and intellectual property on Windows and Mac laptops, both on and off-network. Learn More.

Safetica security software offers a full DLP (Data Leak Prevention) solution which covers a wide range of security threats that originate from a common source – the human factor. Safetica defends against planned or accidental data leaks, malicious insider actions, productivity issues, BYOD dangers and more. Safetica’s security philosophy is based on three pillars: completeness, flexibility and ease of use. Safetica’s corporate level DLP gives management complete activity reports and enforces company security policies. Safetica offers a full set of security tools in a single software package which would otherwise require several security solutions from different vendors. Learn More.

SecurEnvoy DLP is a data protection portfolio of solutions (on-premises, off-premises and everywhere in between including the cloud), which can prevent the loss of data from malware, insider threat and human error. This can be achieved across multi-channels, regardless of file types by blocking sensitive data across both structured and unstructured data repositories.

They are unique from competitors as it addresses threats from both trusted and un-trusted users, through the use of unique intellectual algorithms and fingerprinting features. These solutions are capable of real-time inspection of all protocols (even those that may be unknown) with the ability to stop data loss immediately. Learn More.

Teramind’s ‘user-centric’, endpoint Data Loss Prevention solution goes beyond traditional DLP approaches. Teramind’s DLP services adds intelligent behavioral analysis to identify human factors. Human factors may include malicious intent, errors or accidents. With Teramind’s data loss prevention software you can implement effective protection against data breaches and other exfiltration attempts.

Teramind DLP software provides the best return of investment for organizations of any size. The DLP software is designed to assist SMBs, enterprises and the public sector address data loss, cybersecurity and insider threats.

Additionally, Teramind’s compliance management features help you conform with compliance regulations including GDPR, HIPAA, PCI DSS, and ISO 27001. Learn More.

Mitigate data breach and compliance risks with the industry-leading data loss prevention solution from Symantec.

  • Monitors for policy violations and risky user behavior across control points at all times.
  • Prevents and deters end users from leaking data with real-time blocking, quarantining and alerts.
  • Allows you to respond quickly and efficiently when critical data loss happens with automated incident remediation workflows and one-click SmartResponses.
  • Gives you flexibility to fine-tune policies to balance security and end-user productivity.

Learn More.

Are you losing data without even knowing it? Your customer information, intellectual property, financial data, and personnel files may be leaving your corporate borders right now. And the perpetrators are not only hackers—they can also be your own employees. Accidental and malicious data loss can occur through common channels such as email, web posting, USB drives, and uploading to the cloud—potentially costing you millions. Every day, companies fall victim to massive data loss through malicious and unintentional leakage of information. What if you could easily and effectively stop data loss? What if you could meet industry and government compliance and protect intellectual property at the same time?  Now you can—with the comprehensive McAfee® Data Loss Prevention Endpoint (McAfee DLP Endpoint).

Key Advantages:

  • Device-to-cloud DLP: Easily extend on-premises DLP policies to the cloud for consistent data loss detection.
  • Advanced protection capabilities: Leverage fingerprinting, classification, and file tagging to secure sensitive, unstructured data, such as intellectual property and trade secrets.
  • Centralized management: Native integration with McAfee® MVISION
    ePolicy Orchestrator® (MVISION ePO™) helps streamline policy and incident management.
  • Compliance enforcement: Ensure compliance by addressing day-to-day user actions, such as emailing, cloud posting, downloading to removable media devices, and more.
  • User education: Real-time feedback via an educational popup helps shape corporate security awareness and culture.

Database Security Solutions

Trend Micro Endpoint Encryption
Kaspersky Disk and File Encryption
Thales Database Security

Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices—PC and Macintosh laptops, desktops, CDs, DVDs, USB drives, and any other removable media. This solution combines enterprise-wide full disk, file/folder, and removable media encryption with granular port and device control to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same interface for endpoint protection and other Trend Micro security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change. Learn More.

Kaspersky Endpoint Security for Windows has integrated tools for data encryption. They work according to policies  distributed from Kaspersky Security Center, the administrator’s application for management of the corporate infrastructure protected by Kaspersky Lab security products. 

Full disk encryption (FDE) prevents data leakage via loss of a laptop or a portable hard drive. When a disk is encrypted, unauthorized users cannot boot from it or read its data.

File-level encryption (FLE) protects files on the move when they are transferred in untrusted channels. The users that are allowed to access protected files according to encryption policies see them unencrypted.

Learn More.

While there are many ways to protect sensitive data in databases, IT requirements for performance, availability and security can sometimes clash: will this security feature compromise database read and write performance? Can I be certain that the encryption key will always be available for fast read performance? For your database security needs, consider CipherTrust Data Security Platform, a solution that can provide high-performance, database encryption with an architecture that can provide high-availability to ensure that every database write and read happens at almost the speed of an unprotected database.

The Thales CipherTrust Data Security Platform provides the capabilities you need to encrypt and secure sensitive data in databases while avoiding the challenges traditionally associated with database encryption. The solutions available on the CipherTrust Platform will protect your growing database environment from both internal and external threats — on-premises or in the cloud, no matter which databases you run.

Customers rely on CipherTrust Data Security Platform solutions to secure patient records, credit card information, social security numbers, and more. With CipherTrust Platform, you can discover and protect structured data stored in databases and applications as well as unstructured data kept in file servers.

 

Learn More.

Data Classification Solutions

Titus Data Classification Suite
Boldon James Cassifier

Titus Classification for Desktop provides the first step in protecting sensitive files from data leakage. By enabling users to assign classifications to any file, Titus Classification for Desktop identifies the value and sensitivity of information so organizations can manage, secure, and share that information. The user’s classification selection is stored with the file as persistent metadata, which organizations can use to increase the accuracy and effectiveness of DLP, archiving, and perimeter security solutions. Learn More.

Boldon James Classifier provides a complete suite of products; wrapping a protective governance shield around your data throughout its lifecycle. Classifier gets to work from the moment a file or document is created. It manages your data at rest in storage and archiving systems, and protects it in motion when your people are sharing inside and outside the organization. Learn More.

Backup Solutions

Veeam Backup & Replication
Veritas BackupExec
Rubrik Data Protection

Veeam® Backup & Replication™ is prepared to address the next generation of operational challenges head-on with a comprehensive set of enterprise grade data protection  capabilities. Powerful, capable and easy to use, Veeam reduces operational overhead with the flexibility that fits your business and market-leading reliability that you can count on. Veeam Backup & Replication delivers powerful Availability across all cloud, virtual  and physical workloads with a simple, flexible and reliable solution. Protect your data no matter the location or workload type. Learn More.

Veritas Backup Exec™ is the backup solution without barriers, delivered your way. You choose what to back up, where to store it and how to pay for it. Your data remains secure and available at every stage—whether backing up onpremises to the cloud, protecting workloads within the cloud, recovering from the cloud or connecting to on-prem storage. With Instant Cloud Recovery, Backup Exec integrates directly with Azure Site Recovery to ensure data and application availability with cloud-based disaster recovery (DR). Learn More.

A single software platform that securely delivers backup, recovery, analytics, and compliance across data centers and clouds.
  • SLA Automation: Replace hundreds or thousands of backup jobs with just a few policies that can be applied across all your workloads.
  • Rapid Recovery: Search across your global environment and find exactly what you’re looking for. Click recover and mount directly for near zero-RTO.
  • API First: Any behavior we can trigger from the UI can be scripted, automated, and integrated into tools you may already own.
  • Secure By Design: Once backup data is written it can never be changed.​ Meaning your backups are safeguarded against ransomware and other threats.