Analytics
6/17/2008
10:00 AM
50%
50%

Encryption: DLP's Newest Ingredient

Major vendors increasingly add encryption offerings to their data loss prevention packages

If you're thinking about implementing data loss prevention technology in your enterprise, you'd better be ready to talk about your encryption strategy.

DLP, once seen as a quick-fix solution for reducing data breaches, is rapidly being recast as a core strategy for discovering sensitive information in the enterprise and controlling access to it. As that evolution occurs, DLP is increasingly becoming the spark that restarts previously stagnant data encryption projects.

"Every major DLP vendor has, or is developing, encryption capabilities or partnerships," says Rich Mogull, founder and principal analyst at Securosis, a security consultancy. "File/folder encryption and DLP should be integrated."

That point was brought home earlier today, when encryption pioneer RSA rolled out a new release of its File Security Manager, which has been recast as a key element of the EMC subsidiary's RSA Data Security System, a comprehensive data protection strategy that includes DLP.

"For a lot of years, security has been about physical controls, but I think we're now seeing that that was sort of the tail wagging the dog," says Tom Corn, vice president of product management and marketing for RSA's data security group.

DLP provides a discovery mechanism that helps enterprises identify the sensitive data in the organization, so that they can make intelligent choices on what to encrypt and how to encrypt it, Corn explains. "The dirty little secret of security is that we build all of these careful protections around applications and files, and then the users go in and make copies of the data and put it in email or on shared file servers that no one knows about," he says. "You have to discover the data before you can apply policies and access controls."

RSA File Security Manager 2.2 is designed to work closely with the company's DLP and other tools, offering transparent encryption and role-based access control for sensitive files and folders on Windows and Linux servers, the company says. By providing an extra layer of access control above and beyond what is offered via the operating system, the RSA File Security Manager solution is engineered to enable a “separation of duties” between security and systems administration, as well as restricting full access to files to authorized users only.

Other large security vendors are also linking DLP and encryption. McAfee, for example, has integrated encryption and DLP offerings at the end point, notes Chris Parkerson, the company's group solutions marketing manager for data protection.

"Initially, there was a mad scramble to protect the company from the loss of physical devices, like laptops and portable hard drives," Parkerson says. "What companies are now discovering is that there are a whole range of threats they've got to address, and no one product is going to solve all of them. DLP and encryption are among a whole range of tools that will be needed."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • Verizon Business

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Register for Dark Reading Newsletters
    White Papers
    Cartoon
    Current Issue
    Dark Reading Tech Digest, Dec. 19, 2014
    Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
    Flash Poll
    Threat Intel Today
    Threat Intel Today
    The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
    Video
    Slideshows
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2014-8142
    Published: 2014-12-20
    Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

    CVE-2013-4440
    Published: 2014-12-19
    Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

    CVE-2013-4442
    Published: 2014-12-19
    Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

    CVE-2013-7401
    Published: 2014-12-19
    The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

    CVE-2014-2026
    Published: 2014-12-19
    Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

    Best of the Web
    Dark Reading Radio
    Archived Dark Reading Radio
    Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.