Preventing confidential data from being transmitted outside your organisation first requires comprehensive monitoring of multiple exit and endpoints. Email is only part of the problem. Experience shows that 50 percent of incidents occur via internet protocols other than email, such as instant messaging or blogs. Yet some content monitoring solutions only screen email, leaving other internet protocols uncovered. Other solutions are only capable of screening internet protocols when the user is connected to the corporate network, leaving the organisation exposed when users are off the network. Removable media also provides easily accessible endpoints to which confidential data can be copied. In addition, it’s not enough simply to monitor security violations; the key is to prevent sensitive data from being transmitted by blocking it, in effect closing the door before the breach occurs.
A solution that effectively reduces your risk of data loss across all business processes must combine comprehensive monitoring with prevention. It should accurately monitor and prevent security violations for all data types and network protocols, including email (SMTP), instant messaging (AOL, MSN, Yahoo), secure Web (HTTP over SSL), FTP, P2P, and generic TCP sessions over any port. An effective DLP solution should also monitor and prevent confidential data from being copied to external devices, downloaded to local drives, attached to network transmissions, or encrypted or concealed using high-risk applications.
In addition, it should stop transmissions that violate security, acceptable use, and privacy policies before they leave the network. Some organisations elect to begin with monitoring, then take the next step to preventing. Even if your plan is to phase in prevention capabilities over time any systems put in place for monitoring should have the capabilities to deliver the requisite security.
Integratech offer a wide range of network and server-based security products, ranging from externally hosted antivirus & spam filtering, through to dedicated hardware-based unified threat management devices and of course, more traditional, software-based solutions from Symantec and AVG.
Our products offer you both monitoring and prevention today, giving you the confidence that your systems remain secure both now and in the future. So whether you are a small site with a few users or a large, multi-site operation, our experienced team of consultants and fully qualified engineers will work with you to select and implement the optimum solution for your business.