Analytics
6/17/2008
10:00 AM
Connect Directly
RSS
E-Mail
50%
50%

Encryption: DLP's Newest Ingredient

Major vendors increasingly add encryption offerings to their data loss prevention packages

If you're thinking about implementing data loss prevention technology in your enterprise, you'd better be ready to talk about your encryption strategy.

DLP, once seen as a quick-fix solution for reducing data breaches, is rapidly being recast as a core strategy for discovering sensitive information in the enterprise and controlling access to it. As that evolution occurs, DLP is increasingly becoming the spark that restarts previously stagnant data encryption projects.

"Every major DLP vendor has, or is developing, encryption capabilities or partnerships," says Rich Mogull, founder and principal analyst at Securosis, a security consultancy. "File/folder encryption and DLP should be integrated."

That point was brought home earlier today, when encryption pioneer RSA rolled out a new release of its File Security Manager, which has been recast as a key element of the EMC subsidiary's RSA Data Security System, a comprehensive data protection strategy that includes DLP.

"For a lot of years, security has been about physical controls, but I think we're now seeing that that was sort of the tail wagging the dog," says Tom Corn, vice president of product management and marketing for RSA's data security group.

DLP provides a discovery mechanism that helps enterprises identify the sensitive data in the organization, so that they can make intelligent choices on what to encrypt and how to encrypt it, Corn explains. "The dirty little secret of security is that we build all of these careful protections around applications and files, and then the users go in and make copies of the data and put it in email or on shared file servers that no one knows about," he says. "You have to discover the data before you can apply policies and access controls."

RSA File Security Manager 2.2 is designed to work closely with the company's DLP and other tools, offering transparent encryption and role-based access control for sensitive files and folders on Windows and Linux servers, the company says. By providing an extra layer of access control above and beyond what is offered via the operating system, the RSA File Security Manager solution is engineered to enable a “separation of duties” between security and systems administration, as well as restricting full access to files to authorized users only.

Other large security vendors are also linking DLP and encryption. McAfee, for example, has integrated encryption and DLP offerings at the end point, notes Chris Parkerson, the company's group solutions marketing manager for data protection.

"Initially, there was a mad scramble to protect the company from the loss of physical devices, like laptops and portable hard drives," Parkerson says. "What companies are now discovering is that there are a whole range of threats they've got to address, and no one product is going to solve all of them. DLP and encryption are among a whole range of tools that will be needed."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • Verizon Business

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Register for Dark Reading Newsletters
    White Papers
    Cartoon
    Current Issue
    Dark Reading, September 16, 2014
    Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
    Flash Poll
    Threat Intel Today
    Threat Intel Today
    The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
    Video
    Slideshows
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2014-0993
    Published: 2014-09-15
    Buffer overflow in the Vcl.Graphics.TPicture.Bitmap implementation in the Visual Component Library (VCL) in Embarcadero Delphi XE6 20.0.15596.9843 and C++ Builder XE6 20.0.15596.9843 allows remote attackers to execute arbitrary code via a crafted BMP file.

    CVE-2014-2375
    Published: 2014-09-15
    Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to read or write to arbitrary files, and obtain sensitive information or cause a denial of service (disk consumption), via the CSV export feature.

    CVE-2014-2376
    Published: 2014-09-15
    SQL injection vulnerability in Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

    CVE-2014-2377
    Published: 2014-09-15
    Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to discover full pathnames via an application tag.

    CVE-2014-3077
    Published: 2014-09-15
    IBM SONAS and System Storage Storwize V7000 Unified (aka V7000U) 1.3.x and 1.4.x before 1.4.3.4 store the chkauth password in the audit log, which allows local users to obtain sensitive information by reading this log file.

    Best of the Web
    Dark Reading Radio
    Archived Dark Reading Radio
    CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant