DLP is Still Going Strong

 

DLP, THE ANALYSTS AND VENDORS

A blog:

For nearly two decades, deploying Data Loss Prevention (DLP) has been a staple for enterprises seeking to secure their data assets.

Despite being such an important part of an information security strategy, some observers have recently begun to cast doubt on the future of DLP within the industry.   Insider Threat Management and  UEBA (User and Entity Behavior Analytics) providers market their solutions as ‘redefining the post DLP world’ even though these solutions are fraught with a high degree of false positives & negatives and will never be able to prevent automatic and accurate sensitive data extrusion. Gartner analysts write

“the UEBA market is quickly disappearing as UEBA becomes a feature of many other security domain solutions”[1]

 

The most common criticisms boil down to the claim that DLP as an approach is obsolete, and the approach to protecting company data needs to be more “specified”, honing in on dangers like the insider threat. Other elements of DLP, such as sensitive data detection and classification, as well as endpoint monitoring, are unnecessary and more importantly don’t demonstrate a quantifiable return on investment.

Still Going Strong

This is not the first time we’ve heard declarations of DLP’s demise.

Scares like this have popped up several times in past years, only to dissipate shortly after.

Indeed DLP is still one of the fastest-growing fields in the IT security industry. The escalating demand for these programs has driven forecasts that show the DLP market continuing its annual double-digit percentage growth for the coming years.   As companies face ever-expanding challenges in securing their data, from regulation compliance to diversified tactics by cybercriminals, the need for effective Data Loss Prevention is only increasing.

DLP for the Modern Enterprise

This is not to suggest that conventional DLP solutions are without their drawbacks.

The weaknesses in common DLP programs lie in the way their operational models, using pre-set algorithms and regular expression patterns to determine what “sensitive data” is.  This leads to serious issues in identification accuracy, the key to effective DLP coverage.

Analysts from The 451 Group have written “DLP has suffered from two primary shortcomings: it’s generally a challenge to implement, and it does next to nothing to help protect data from outsiders”  hence these DLP solutions need to add additional inaccurate solutions such as UEBA and user analytics.[2]

In fact, a Gartner “leader” of the now-defunct Magic quadrant report recently posted on their corporate Facebook page: “Antiquated DLP solutions provide little value… That’s why we’ve incorporated both UEBA and EDR capabilities into our platform.” *,   a basic admission that their DLP system has failed.

Funny that this “Leader” was permitted to be in the top quadrant when the only technology they had developed was Endpoint device control.  Gartner allowed 2 vendors to be “leaders” when they only had 1 or 2 facets of Enterprise DLP, licensing the missing, required facets from the other!  Why?

Weaknesses in traditional DLP

It is these weaknesses in traditional models (including many Gartner “Market Leaders”) more than anything else that deter companies from investing in complex, intrusive DLP systems, that are also not able to produce efficient results.

Today’s critics of traditional DLP, declaring it an outmoded method, were on to something when they pointed to accuracy as the central challenge to implementing an effective solution. Lack of accuracy means systems are often fumbling in the dark to locate and identify sensitive data, while at the same time producing mounds of false positives that soak up man-hours and company resources.

Giving Users the Edge

The DLP solutions of GTB give organizations the assurance of effective DLP without impeding operations or monopolizing resources.  GTB’s smart programs, powered by intelligent mathematics, accurately identify compromising data throughout the entire system. This includes information both on the network and off, including cloud applications and the endpoint including protection against malicious insider or malware-based data exfiltration.

 

The Market Leader of Nex Gen DLP & Data Security

Far from being a relic of the past, as are other DLP and Insider Threat solutions;  GTB’s cutting edge technology gives organizations measurable protection of their intellectual property and total control over their data assets.   GTB’s data protection that works platform is the market leader all without paying or hiring the analysts or agreeing to their misguided opinions in hopes of a ‘referral’.

 

Image from Gartner Peer Insights

 

*https://www.facebook.com/DigitalGuardian/  2018, April 18.

[1] Emerging Insider Threat Detection Solutions by Avivah Litan  |  April 5, 2018, Gartner Blog Network

[2] The 451 Group, Impact Report:  DLP vendor Digital Guardian adds external threat protection and drops the ‘L’ word Analyst: Garrett Bekker  Adrian Sanabria 11 May, 2015

 

adroll_adv_id = “UIOFH72HVBDSPBBLAJUZE6”;
adroll_pix_id = “HNO2CUNA4BAINCHLEPH2JH”;
/* OPTIONAL: provide email to improve user identification */
/* adroll_email = “username@example.com”; */
(function () {
var _onload = function(){
if (document.readyState && !/loaded|complete/.test(document.readyState)){setTimeout(_onload, 10);return}
if (!window.__adroll_loaded){__adroll_loaded=true;setTimeout(_onload, 50);return}
var scr = document.createElement(“script”);
var host = ((“https:” == document.location.protocol) ? “https://s.adroll.com” : “http://a.adroll.com”);
scr.setAttribute(‘async’, ‘true’);
scr.type = “text/javascript”;
scr.src = host + “/j/roundtrip.js”;
((document.getElementsByTagName(‘head’) || [null])[0] ||
document.getElementsByTagName(‘script’)[0].parentNode).appendChild(scr);
};
if (window.addEventListener) {window.addEventListener(‘load’, _onload, false);}
else {window.attachEvent(‘onload’, _onload)}
}());

Comments are closed.
Want to see something cool?

Want Easy Access to
Data Security that Works?

Secure your Sensitive Data, including from  Remote Users



Try it for Free