The effectiveness of DLP is based on classification of the information it monitors. Unfortunately, this is an extremely tedious task because DLP systems are essentially offshoots of anti-virus solutions. They are designed for use by IT staff and follow the anti-virus approach of centralised rule definition and incident monitoring.
Over-blocking vs ease of use – Changing sensitivity of information.
Information that is classified as sensitive can change in sensitivity level once the information has been made public or if more people are required to have access to this information. Again, this becomes a major challenge for IT staff as they will have to constantly update the restriction imposed on the information. For example, tender specs are considered sensitive as long as they are not published, and are blocked from being sent out. However, once the tender is opened, the procurement department can send it out to interested vendors. Any delay in allowing the procurement department from sending this information becomes an issue for IT security, who will be blamed for stopping people from doing their business.
What is required is a mechanism where end-users can take up the responsibility of defining who can access the information and who cannot, and an override mechanism where they can override a defined restriction by giving a valid reason.
THE SOLUTION : E-SAFE COMPLIANCE MANAGING SECURITY THE SMART WAY
e-Safe Compliance is an enterprise system for ensuring responsible, productive and secure use of IT resources. In addition to its productivity and auditing functionalities, e-Safe Compliance prevents data leaks but does so in a smart way and so avoids the problems listed above. The fundamental difference between e-Safe Compliance and DLP systems is that it treats data leakage as a business problem that needs to be tackled at an operational level, rather than an IT problem.
Secures Information at Its Source as It Gets Created, Ensuring Information Is Protected All the Time
e-Safe Compliance secures the information at its source by encrypting sensitive documents using universal encryption. Documents encrypted using universal encryption can only be opened on devices having e-Safe agent installed, along with the relevant user credentials, and are tracked throughout their lifecycle from creation to deletion using e-Safe. As such, if the users decide to send the documents to a third party, or decide to copy them, they need the e-Safe agent to open them.
Monitoring Real Sensitive Information Using Decentralised DLP Rule Creation
e-Safe Compliance offers both centralised rule creation as well as decentralised rule creation. Information owners using the information tagging utility can categorise a large amount of information themselves without involving the central administrators, and can create DLP rules. Furthermore, the information owners also receive reports for the information they have defined. This ensures that owners who have defined information can monitor the usage of that information and detect any misuse by their staff.