DLP technology lets you control your information and documents, characterising it by particular content (e.g. a personal identification number) and then enforcing particular policies.
Information is an essential production tool in every organisation. Safeguarding the continuity of an organisation requires particular care with respect to all the information present within an organisation. There is a current tendency for information to be lost through a number of routes because of a lack of awareness of the consequences of actions, and through deliberate attempts by third parties.
The characteristics assigned to documents provide a basis to make it impossible to save the data on unauthorised media or forward it to external recipients. This greatly decreases the chance of data loss. Suppose that a confidential document containing private or corporate financial data is characterised as “Only for internal use”, then this document cannot be stored on a USB stick etc. You set the rules, for instance on the basis of the applicable statutory and regulatory requirements or the existing information classification policy in your organisation.
You can also use DLP technology to analyse your information based on the content in your data store. This gives you insight into the location of your confidential information. DLP technology also gives you insight into which policies are being violated or have been violated. If desired, you can then introduce preventative actions to minimize and limit the risks of data loss.
The preventative and detection characteristics of DLP technology can improve employee awareness of data issues. Making employees aware of such matters as policy and incident reports also works in a preventative manner, in particular for information loss through carelessness.
DLP eventually becomes an organisation-wide technology embedded in the existing resources and security measures, from network switch all the way through to the firewall. It is an extremely powerful resource which when integrated with federated IRM for instance,
may lead to a high security level in complex chain organisations. DLP is not a simple package that can be dropped into place. But if it is deployed correctly in the entirety of the security technology, then it becomes indispensable.