Data leak and data theft protection
The most popular technology in this security area is Data Loss Prevention or Data Leak Prevention (DLP). Whichever concept we choose, the goal is to protect the organization from data leaks. This is accompanied by data encryption technologies that can be applied to different scenarios and security requirements. Most commonly, cryptography is used on entire drives, folders, files, and email communication.
The next level is Data Access Rights Management (ARM, DRM,...) and Application Access Rights Management (PIM, PAM, EPM,...) technologies that create and use the data. User Behaviour Analysis (UEBA) is nowadays also an effective method of protecting data primarily from wanted and unwanted misuse by internal users. However, these tools' basics are a thorough analysis of the work with data throughout their life cycle and their subsequent classification. Only then can the policies under which these technologies work be defined.
Data lost prevention
Data lost prevention (DLP) protects the data and identifies employees with potential risk behavior. DLP can classify data using content control - dictionaries or RegEx terms, context, fingerprint, or Machine Learning.
Data encryption works well with DLP and helps secure the data by giving access only to those who have a key.
Whereas data access rights management (ARM, DRM) helps identify and secure data using detailed logging and determining the data owner by simple audits, Managing Application Access Rights (PIM, PAM) ensures activities security.
User Behaviour Analysis (UEBA) identifies the model of typical and atypical behavior. Suspicious behavior is then evaluated by safety score, and according to its value, the reaction could be immediately defined.