Analytics
6/17/2008
10:00 AM
50%
50%

Encryption: DLP's Newest Ingredient

Major vendors increasingly add encryption offerings to their data loss prevention packages

If you're thinking about implementing data loss prevention technology in your enterprise, you'd better be ready to talk about your encryption strategy.

DLP, once seen as a quick-fix solution for reducing data breaches, is rapidly being recast as a core strategy for discovering sensitive information in the enterprise and controlling access to it. As that evolution occurs, DLP is increasingly becoming the spark that restarts previously stagnant data encryption projects.

"Every major DLP vendor has, or is developing, encryption capabilities or partnerships," says Rich Mogull, founder and principal analyst at Securosis, a security consultancy. "File/folder encryption and DLP should be integrated."

That point was brought home earlier today, when encryption pioneer RSA rolled out a new release of its File Security Manager, which has been recast as a key element of the EMC subsidiary's RSA Data Security System, a comprehensive data protection strategy that includes DLP.

"For a lot of years, security has been about physical controls, but I think we're now seeing that that was sort of the tail wagging the dog," says Tom Corn, vice president of product management and marketing for RSA's data security group.

DLP provides a discovery mechanism that helps enterprises identify the sensitive data in the organization, so that they can make intelligent choices on what to encrypt and how to encrypt it, Corn explains. "The dirty little secret of security is that we build all of these careful protections around applications and files, and then the users go in and make copies of the data and put it in email or on shared file servers that no one knows about," he says. "You have to discover the data before you can apply policies and access controls."

RSA File Security Manager 2.2 is designed to work closely with the company's DLP and other tools, offering transparent encryption and role-based access control for sensitive files and folders on Windows and Linux servers, the company says. By providing an extra layer of access control above and beyond what is offered via the operating system, the RSA File Security Manager solution is engineered to enable a “separation of duties” between security and systems administration, as well as restricting full access to files to authorized users only.

Other large security vendors are also linking DLP and encryption. McAfee, for example, has integrated encryption and DLP offerings at the end point, notes Chris Parkerson, the company's group solutions marketing manager for data protection.

"Initially, there was a mad scramble to protect the company from the loss of physical devices, like laptops and portable hard drives," Parkerson says. "What companies are now discovering is that there are a whole range of threats they've got to address, and no one product is going to solve all of them. DLP and encryption are among a whole range of tools that will be needed."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • Verizon Business

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Register for Dark Reading Newsletters
    White Papers
    Cartoon
    Current Issue
    Dark Reading December Tech Digest
    Experts weigh in on the pros and cons of end-user security training.
    Flash Poll
    Threat Intel Today
    Threat Intel Today
    The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
    Video
    Slideshows
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2010-5312
    Published: 2014-11-24
    Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.

    CVE-2012-6662
    Published: 2014-11-24
    Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.

    CVE-2014-1424
    Published: 2014-11-24
    apparmor_parser in the apparmor package before 2.8.95~2430-0ubuntu5.1 in Ubuntu 14.04 allows attackers to bypass AppArmor policies via unspecified vectors, related to a "miscompilation flaw."

    CVE-2014-7817
    Published: 2014-11-24
    The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

    CVE-2014-7821
    Published: 2014-11-24
    OpenStack Neutron before 2014.1.4 and 2014.2.x before 2014.2.1 allows remote authenticated users to cause a denial of service (crash) via a crafted dns_nameservers value in the DNS configuration.

    Best of the Web
    Dark Reading Radio
    Archived Dark Reading Radio
    Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?