Analytics
6/17/2008
10:00 AM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Encryption: DLP's Newest Ingredient

Major vendors increasingly add encryption offerings to their data loss prevention packages

If you're thinking about implementing data loss prevention technology in your enterprise, you'd better be ready to talk about your encryption strategy.

DLP, once seen as a quick-fix solution for reducing data breaches, is rapidly being recast as a core strategy for discovering sensitive information in the enterprise and controlling access to it. As that evolution occurs, DLP is increasingly becoming the spark that restarts previously stagnant data encryption projects.

"Every major DLP vendor has, or is developing, encryption capabilities or partnerships," says Rich Mogull, founder and principal analyst at Securosis, a security consultancy. "File/folder encryption and DLP should be integrated."

That point was brought home earlier today, when encryption pioneer RSA rolled out a new release of its File Security Manager, which has been recast as a key element of the EMC subsidiary's RSA Data Security System, a comprehensive data protection strategy that includes DLP.

"For a lot of years, security has been about physical controls, but I think we're now seeing that that was sort of the tail wagging the dog," says Tom Corn, vice president of product management and marketing for RSA's data security group.

DLP provides a discovery mechanism that helps enterprises identify the sensitive data in the organization, so that they can make intelligent choices on what to encrypt and how to encrypt it, Corn explains. "The dirty little secret of security is that we build all of these careful protections around applications and files, and then the users go in and make copies of the data and put it in email or on shared file servers that no one knows about," he says. "You have to discover the data before you can apply policies and access controls."

RSA File Security Manager 2.2 is designed to work closely with the company's DLP and other tools, offering transparent encryption and role-based access control for sensitive files and folders on Windows and Linux servers, the company says. By providing an extra layer of access control above and beyond what is offered via the operating system, the RSA File Security Manager solution is engineered to enable a “separation of duties” between security and systems administration, as well as restricting full access to files to authorized users only.

Other large security vendors are also linking DLP and encryption. McAfee, for example, has integrated encryption and DLP offerings at the end point, notes Chris Parkerson, the company's group solutions marketing manager for data protection.

"Initially, there was a mad scramble to protect the company from the loss of physical devices, like laptops and portable hard drives," Parkerson says. "What companies are now discovering is that there are a whole range of threats they've got to address, and no one product is going to solve all of them. DLP and encryption are among a whole range of tools that will be needed."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • Verizon Business

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Register for Dark Reading Newsletters
    White Papers
    Flash Poll
    Current Issue
    Video
    Slideshows
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2011-3154
    Published: 2014-04-17
    DistUpgrade/DistUpgradeViewKDE.py in Update Manager before 1:0.87.31.1, 1:0.134.x before 1:0.134.11.1, 1:0.142.x before 1:0.142.23.1, 1:0.150.x before 1:0.150.5.1, and 1:0.152.x before 1:0.152.25.5 does not properly create temporary files, which allows local users to obtain the XAUTHORITY file conte...

    CVE-2013-2143
    Published: 2014-04-17
    The users controller in Katello 1.5.0-14 and earlier, and Red Hat Satellite, does not check authorization for the update_roles action, which allows remote authenticated users to gain privileges by setting a user account to an administrator account.

    CVE-2014-0036
    Published: 2014-04-17
    The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with SSL verification disabled, which allows remote attackers to conduct man-in-the-middle attacks via unspecified vectors.

    CVE-2014-0054
    Published: 2014-04-17
    The Jaxb2RootElementHttpMessageConverter in Spring MVC in Spring Framework before 3.2.8 and 4.0.0 before 4.0.2 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External ...

    CVE-2014-0071
    Published: 2014-04-17
    PackStack in Red Hat OpenStack 4.0 does not enforce the default security groups when deployed to Neutron, which allows remote attackers to bypass intended access restrictions and make unauthorized connections.

    Best of the Web