Source |
ProofPoint |
Identifiant |
8410965 |
Date de publication |
2023-11-13 07:23:13 (vue: 2023-11-13 12:07:40) |
Titre |
ProofPoint reconnu en 2023 Gartner & Reg;Guide du marché pour la prévention de la perte de données Proofpoint Recognized in 2023 Gartner® Market Guide for Data Loss Prevention |
Texte |
The risk of data loss increases as your business embraces digital transformation, remote work and cloud computing. Legacy data loss prevention (DLP) solutions weren\'t developed with these new dynamics in mind.
In today\'s world, your DLP platform must provide visibility across multiple channels for data loss-email, cloud services, endpoint and web. It must scale with your needs while protecting data without interruption. And since data doesn\'t lose itself, it should be people centric. Part of that means providing insight into user behavior.
The Gartner Market Guide for Data Loss Prevention explains that “DLP technology is mature, but today, organizations look for comprehensive solutions that go beyond traditional DLP measures.” It also notes that “Security and risk management leaders should focus on risk-based adaptive data protection techniques to strengthen the data security of their organization.”
Let\'s take a look at some other insights from the report.
Adaptive DLP: Enhanced with classification and converged with insider threat management
The Gartner Market Guide states that “DLP vendors are increasingly converging with insider risk management platforms. This convergence enables better detection of data exfiltration as it enriches DLP events with anomalous user behaviors, improved risk scoring and real-time monitoring capabilities.” This, the report notes, enables an adaptive, risk based DLP approach.
It also shares important insights such as:
Enterprise DLP (EDLP) solutions offer centralized policy management and reporting functionality
Enterprise DLP (EDLP) solutions generally incorporate advanced content inspection techniques to identify complex content and apply remediation
Content inspection within IDLP solutions has improved considerably, and many of these solutions can recognize classification tags from more sophisticated classification tools
DLP solutions use data classification labels and tags, content inspection techniques and contextual analysis to identify sensitive content and analyze actions related to the use of that content
Gartner sees that DLP vendors are increasingly converging with insider risk management platforms. This convergence enables better detection of data exfiltration as it enriches DLP events with anomalous user behaviors, improved risk scoring and real-time monitoring capabilities.
Gartner recommends in its Market Guide that a business use enterprise DLP if it has limited resources and its “users are transacting sensitive information through multiple channels.” The report also mentions that consulting and managed services can help “shorten the time to value and augment lean IT and security departments.”
Proofpoint delivers adaptive DLP
As a key player in the space, we think Proofpoint Enterprise DLP expands on the capabilities that Gartner shares in its report. The following is an overview of how we do that.
People-centric insights and risk-based adaptive DLP
Proofpoint Enterprise DLP protects against data loss across email, cloud, endpoint and web. Our solution combines content, behavior and threat telemetry from all these channels to address the full spectrum of people-centric data loss scenarios such as:
Leavers who feel entitled to take intellectual property with them
Compromised users whose data is stolen by threat actors
Careless users who accidently email sensitive documents to your partners
People-centric information protection is an adaptive, risk-based approach to DLP. Our Enterprise DLP solution uses people and application risk scoring and modeling for dynamic policies.
Figure 1. Web security risk-based access rule.
In Figure 1, “Leavers Policy 2” applies isolation as a data control when “Risky Leavers” access “Critical Business Cloud Apps.”
One console, one agent, one cloud-native platform
Proofpoint provides what administrators and analysts need to accurately detect DLP and insider threats:
Policy management
Workflows
Alert management
|
Notes |
★
|
Envoyé |
Oui |
Condensat |
2023 about abused accelerate acceptable access access accidently accounts accurately across actions activities activity actors adaptive address administrators admins advanced advice advise affiliates after against agent alert alerts all also analysis analysts analyze and/or andrew anomalous any an adaptive api app application applications applies apply approach apps apps are artificial as: ask assets augment authentication automated bales based before behavior behaviors believe better beyond both broad broker browser business but by ravisha can capabilities capabilities capability careless casb centralized centric channels chugh classification classification classify cloud combine combines company complex compliance comprehensive compromised computing considerably consist console construed consulting content context contextual control controls converged convergence converging core corporate critical cross dashboards data deliver delivers departing departments depicted deploy design designation detect detection detectors determine developed dictionaries digital direction disclaims dlp dlp: dlp dlp to documents does doesn download driven dual during dynamic dynamics each edge edlp email embraces employees enable enables encourage encryption endorse endpoint enforce enhanced enrich enriches ensure enterprise entitled epps events evidence exfiltration expand expands experts explains expressed fact feel figure file files findings first fitness focus folder following from full functionality gaming gartner gartner® generally generated get governance granular groups guide handling has have help helps herein highest highly honed how hunting identify idlp implement implied important improved inc incident included includes including including: incorporate increases increasingly information infrastructure input insider insight insights inspection integrate integrates integration intellectual intelligence intelligent intent internationally interruption investigations isolation its itself justify key labeling labels last leaders lean learn leavers leavers” legacy let library lightweight like limited line lineage look lose loss mac malicious manage managed management management many mark market mature means measures mentions merchantability micro might mind modeling monitor monitoring monitors more more movement multichannel multiple must name native need needed needs new not notes oauth offer one only opinions organization organizations other our intelligent output over overview part particular partners partners party people permission personal platform platforms platform player plus policies policy posture powered prevent prevention print prioritize private privileged processes product products program proofpoint property protect protected protecting protection protects provide provides providing proxy public publications published purpose quarantine questionable quick range ratings read real recognize recognized recommendations recommends registered regulated related remediation remote report reporting reporting report research reserved resources respect revocation rich right rights risk risky risk rule rules scalable scale scan scenarios scoring secure security see sees segmented select sensitive sent september service services service shadow share shared shares should show sigma since single sites software solution solutions solutions some sophisticated sophistication space specialized spectrum sse statements states step stolen storage strengthen stricter such suggests synch systems tags take targeted team teams techniques technology telemetry thanks them them these think third those threat threats threats: through time timeline timelines today too tools track trademark traditional transacting transformation unauthorized usb use used user users uses using value variety vector vendor vendors very vips visibility visual vulnerable warranties web website websites weren what when whether which who whose will windows within without with insider words work workfl |
Tags |
Tool
Threat
Cloud
|
Stories |
|
Move |
|