Industry thought leader Gartner recently published its July 2022 Market Guide for Data Loss Prevention (DLP)[i].
In the thirteen-page report, Gartner laid out the most pressing needs of business networks, the data security challenges they face, and the most effective solutions.
Problematic Trends
The researchers first turned to the more problematic trends among IT managers. The report pointed to DLP initiatives that are disconnected from the enterprise’s “specific initiatives or goals”. Many companies that take on a DLP platform are betting on it being a one-size-fits-all that will automatically fix whatever data issues they face and seamlessly integrate with business priorities.
Next, the report turned to the persistent shortcomings in DLP products. In short, vendors tend to focus on conventional and data-specific content and outdated inspection methods, which lead to “incident fatigue” and a myopic view of data movement.
Finally, Gartner highlights the consistent migration to cloud-based data platforms for which many legacy DLP products are incompatible and “no longer viable.”
Market Guide Recommendations
In its recommendations, Gartner calls for a significant shift in approach to DLP deployment.
At the outset, Security and Risk (SRM) administrators must define their DLP based on the unique needs of the business and then locate solutions that address those needs.
Gartner also calls for companies to move away from solutions that use traditional detection methods and Invest in a DLP platform that provides “visibility, classification, and context-[based]” responses.
To address the growing dominance of cloud-based programs and infrastructure, Gartner also urges companies to seek out platforms that can operate “across a hybrid environment.”
All of Gartner’s Recommendations = Standard Features of GTB’s Enterprise Data Security / DLP Platform
GTB is an Enterprise Data Security / DLP platform designed with Cloud Access Security Broker (CASB) features, making it fully compatible with hybrid data environments.
The platform takes a multi-pronged approach with Secure Access Service Edge (SASE), Insider Threat and Risk Management, Endpoint Protection Platform (EPP), Data Discovery and Data Classification capabilities, resulting in a platform that accurately and automatically detects attempted data breaches while providing an automatic response.
GTB’s AI-powered algorithms ensure the program addresses signature patterns, allowing it to hone in on the unique security and data protection challenges it faces.
[i] Gartner, Inc. | G00755250 Market Guide for Data Loss Prevention
Published 19 July 2022 By Analyst(s): Ravisha Chugh, Andrew Bales Initiatives: Security of Applications and Data
Gartner is a registered trademark and service mark of Gartner, Inc and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.
Gartner does not endorse any vendor, product, or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designations. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
GTB Data Security Benefits for SRM Admins
Visibility: Accurately, discover sensitive data; detect and address broken business process, or insider threats including sensitive data breach attempts.
Protection: Automate data protection, breach prevention and incident response both on and off the network; for example, find and quarantine sensitive data within files exposed on user workstations, FileShares and cloud storage.
Notification: Alert and educate users on violations to raise awareness and educate the end user about cybersecurity and corporate policies.
Education: Start target cyber-security training; e.g., identify end-users violating policies and train them.
- Employees and organizations have knowledge and control of the information leaving the organization, where it is being sent, and where it is being preserved.
- Ability to allow user classification to give them influence in how the data they produce is controlled, which increases protection and end-user adoption.
- Control your data across your entire domain in one Central Management Dashboard with Universal policies.
- Many levels of control together with the ability to warn end-users of possible non-compliant – risky activities, protecting from malicious insiders and human error.
- Full data discovery collection detects sensitive data anywhere it is stored, and provides strong classification, watermarking, and other controls.
- Delivers full technical controls on who can copy what data, to what devices, what can be printed, and/or watermarked.
- Integrate with GRC workflows.
- Reduce the risk of fines and non-compliance.
- Protect intellectual property and corporate assets.
- Ensure compliance within industry, regulatory, and corporate policy.
- Ability to enforce boundaries and control what types of sensitive information can flow where.
- Control data flow to third parties and between business units.