Source |
ProofPoint |
Identifiant |
8491708 |
Date de publication |
2024-05-01 05:12:14 (vue: 2024-05-01 09:07:05) |
Titre |
Quelle est la meilleure façon d'arrêter la perte de données Genai?Adopter une approche centrée sur l'homme What\\'s the Best Way to Stop GenAI Data Loss? Take a Human-Centric Approach |
Texte |
Chief information security officers (CISOs) face a daunting challenge as they work to integrate generative AI (GenAI) tools into business workflows. Robust data protection measures are important to protect sensitive data from being leaked through GenAI tools. But CISOs can\'t just block access to GenAI tools entirely. They must find ways to give users access because these tools increase productivity and drive innovation. Unfortunately, legacy data loss prevention (DLP) tools can\'t help with achieving the delicate balance between security and usability.
Today\'s release of Proofpoint DLP Transform changes all that. It provides a modern alternative to legacy DLP tools in a single, economically attractive package. Its innovative features help CISOs strike the right balance between protecting data and usability. It\'s the latest addition to our award-winning DLP solution, which was recognized as a 2024 Gartner® Peer Insights™ Customers\' Choice for Data Loss Prevention. Proofpoint was the only vendor that placed in the upper right “Customers\' Choice” Quadrant.
In this blog, we\'ll dig into some of our latest research about GenAI and data loss risks. And we\'ll explain how Proofpoint DLP Transform provides you with a human-centric approach to reduce those risks.
GenAI increases data loss risks
Users can make great leaps in productivity with ChatGPT and other GenAI tools. However, GenAI also introduces a new channel for data loss. Employees often enter confidential data into these tools as they use them to expedite their tasks.
Security pros are worried, too. Recent Proofpoint research shows that:
Generative AI is the fastest-growing area of concern for CISOs
59% of board members believe that GenAI is a security risk for their business
“Browsing GenAI sites” is one of the top five alert scenarios configured by companies that use Proofpoint Information Protection
Valuable business data like mergers and acquisitions (M&A) documents, supplier contracts, and price lists are listed as the top data to protect
A big problem faced by CISOs is that legacy DLP tools can\'t capture user behavior and respond to natural language processing-based user interfaces. This leaves security gaps. That\'s why they often use blunt tools like web filtering to block employees from using GenAI apps altogether.
You can\'t enforce acceptable use policies for GenAI if you don\'t understand your content and how employees are interacting with it. If you want your employees to use these tools without putting your data security at risk, you need to take a human-centric approach to data loss.
A human-centric approach stops data loss
With a human-centric approach, you can detect data loss risk across endpoints and cloud apps like Microsoft 365, Google Workspace and Salesforce with speed. Insights into user intent allow you to move fast and take the right steps to respond to data risk.
Proofpoint DLP Transform takes a human-centric approach to solving the security gaps with GenAI. It understands employee behavior as well as the data that they are handling. It surgically allows and disallows employees to use GenAI tools such as OpenAI ChatGPT and Google Gemini based on employee behavior and content inputs, even if the data has been manipulated or has gone through multiple channels (email, web, endpoint or cloud) before reaching it.
Proofpoint DLP Transform accurately identifies sensitive content using classical content and LLM-powered data classifiers and provides deep visibility into user behavior. This added context enables analysts to reach high-fidelity verdicts about data risk across all key channels including email, cloud, and managed and unmanaged endpoints.
With a unified console and powerful analytics, Proofpoint DLP Transform can accelerate incident resolution natively or as part of the security operations (SOC) ecosystem. It is built on a cloud-native architecture and features modern privacy controls. Its lightweight and highly stable user-mode agent is unique in |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
2024 365 ability about accelerate acceptable access accidentally accurately achieving acquisitions across actions action activities adapt added addition adhere adherence administrators advanced agent ahead ai alert alerts alignment all allow allowing allows also alternative altogether analyst analysts analytics app application applies approach apps architecture are area armed asked associated attractive automates automatically award balance based be: because been before behavior behind being believe benefits best between big block blog blunt board brief browser build built business business but can capture categories category centric certain challenge changes channel channels character chatbot chatgpt check chief choice choice” cisos cisos classical classification classification classifiers classifiers classifying cloud code combining companies concern condition confidential configured console content content context contracts control controls control copy corporate create created credit cross custom customer customers data daunting deep define delicate details detect detection detectors detects developed dig disallowing disallows dlp document documents doing don down drill drive dynamic dynamically each economically ecosystem effectively elevate email employee employees enables end endpoint endpoints enforce enforces engaged enhancements enrich enriched ensure enter entirely environments even exact examine example exfiltration expect: expedite explain explorations explores extended extension face faced false fast fastest features fidelity files filtering find five folder form from gaps gartner® gathers gemini genai generative give gone google great growing handling has have healthcare help helps here high highly how however human identifies identify images important incident incidents include includes including income increase increases indicate indicators information innovation innovations innovative inputs insider insight insights insights™ instance integrate intellectual intent interact interacting interactions interactions interfaces introduces investigate investigations involve its just justify key language large latest leaked leaps learn leaves legacy lightweight like list listed lists llm loss loss m&a make manage managed manipulated many matches matching may means measures medical members mergers methods microsoft mode model modern monitor monitoring monitors more more move multiple must native natively natural need negatives new newly nudges number numbers officers often one only openai opens operations optical other out package parses part paste pastes pasting patient pattern peer periods permissions personal placed plus policies policies positives potential powered powerful prevented prevention prevents preview price prior privacy private proactively proactively problem processing productivity program prompt proofpoint property pros protect protecting protection protection protect provide provided provider provides providing putting quadrant quickly reach reaching real recent recognition recognized record reduce reducing reinforce relates release released remediated reminders research resolution resolution respond response retroactive review right risk risks risks risky rule rules safeguard salesforce same save saving say scale scenarios search security see sensitive set several share shows siloed single sites” soc social solution solving some source speed stable step steps stop stopping stops streamline strike submitting such supplier surgically system take takes taking tasks tax team teams telemetry that that: them then these those threats through time timeline today too tool tools top tor transform triage tries triggered triggers try turn typed types unauthorized understand understands unfortunately unified unique unmanaged upcoming upload uploading upper usability usage usb use user users uses using valuable vendor verdicts view violating violations visibility visual want warned way ways web weeks well what when where whether which who why will |
Tags |
Tool
Medical
Cloud
|
Stories |
ChatGPT
|
Move |
|