Leading InfoWatch Group Maria Voronova points out that a DLP system must correspond to the threat model of a specific organization, for the formation of which it is necessary to determine the categories of violators and possible data leakage channels. Thus, for a company that supports the BYOD concept (bring your own device to work) and allows employees to use corporate ICT resources from personal mobile devices, it is important to ensure monitoring and control of this particular communication channel.
If a company aims to prevent leaks of ukraine whatsapp data information (for example, containing commercial secrets) and has reached the level at which this type of data can be reliably identified, it is important that the DLP system ensures that the illegitimate processing of such information is blocked.
To select the optimal product, Vladimir Ulyanov, head of the analytical center of Zecurion, recommends that before making a decision on purchasing and implementing a DLP system, you should not only study its characteristics on paper, but also test it as part of a pilot project, and it is better to test not one, but several competing products. This will help you make a balanced choice, simplify operation, and reduce the risk of disappointment from the discrepancy between the declared characteristics and the real ones.
Information security expert at
-
- Posts: 407
- Joined: Sun Dec 22, 2024 7:14 am