Editor's note
Data loss prevention systems aren’t just for large enterprises anymore, now that companies of all sizes are subject to hacker attacks. But installing and managing a DLP system is a major security undertaking that can at times overwhelm smaller IT security teams.
This guide to DLP aims to inform and advise infosec pros about what’s new in data loss prevention systems, including cloud access security brokers. It also covers a variety of DLP-management issues, including compliance requirements and how mainstream corporate applications, like Office 365, are developing features to aid in the protection against data loss.
1How cloud affects company data loss prevention systems
The latest advance in data loss prevention systems involves cloud. If you haven't already, it's time to look at how cloud could become part of your DLP strategy. There are both security advantages but also new concerns that come from moving data out of the corporate data center and into the cloud. Learn what they are, in this section, and gain insights into how to handle them.
2How to manage and maintain data loss prevention systems
Implementing an effective data loss prevention system is a major accomplishment, but how to keep it humming? Widely used applications like Office 365 can help. Learn more about managing DLP, including weaknesses to watch for and how mobile affects the security of corporate data.
-
Article
Locating, and fixing, weaknesses in your DLP system
DLP systems are becoming a necessity, but their weaknesses need to be tightened to ensure enterprise asset security. Expert Kevin Beaver explains what areas to focus on. Read Now
-
Article
How to set Office 365 DLP policies with PowerShell
Exchange administrators can use PowerShell to manage Office 365 compliance, e-discovery and data loss prevention. Read Now
-
Article
Wanna laugh? Data protection techniques give ransomware the boot
Done right, data protection such as cloud-based disaster recovery is the best countermeasure organizations have against insidious ransomware attacks. Read Now