Endpoint
4/7/2013
01:00 AM
Dark Reading
Dark Reading
Quick Hits
50%
50%

Tools And Strategies For File-Level Data Protection

Securing applications is helpful, but file-level protection can make data even more secure. Here's some advice on how to do it right

[Excerpted from "Tools and Strategies for File-Level Data Protection," a new report posted this week on Dark Reading's Application Security Tech Center.]

As security pros, we tend to overprotect the perimeter and underprotect the most basic and fundamental asset in our organizations: your simple, run-of-the-mill Word docs, spreadsheets and slide decks that are the lifeblood of our users and our organizations.

The real truth is that the biggest threat to your organization isn't an attack from some eastern European crimeware syndicate; your biggest threat is your own users. And it's not that your users are acting maliciously; it's just that they want to access their data from any device and from any location.

In many cases, users are taking advantage of new tools and apps to make that happen faster than security pros can stay on top of it. Many organizations have already lost control of vast amounts of sensitive corporate data, all because they've been concentrating their defenses, time and effort elsewhere.

The standard approach of using file and folder permissions to protect data is woefully inadequate. Standard file permissions do an adequate job of ensuring that only certain users can access certain data, but they don't prevent users who already have access from abusing their rights. And file permissions themselves can be too easily circumvented by admins or by users sharing credentials.

Today, cloud file sharing apps are introducing a completely new threat vector that few IT managers are properly accounting for. Just unleash the application intelligence capabilities of your firewall to see how bad the problem really is in your environment: You're likely to see a shocking number of your users syncing data to Box, Dropbox, Sky-Drive, Google Drive or some other cloud-based file sync tool.

One of the reasons that tools like Dropbox are so popular with users, aside from being free, is that they're really easy to use. Corporate employees get the concept of dropping a file in a certain folder and having it magically appear in their Dropbox online, and cloud encryption tools like BoxCryptor, Viivo and CloudFogger build on that ease of use by wrapping strong encryption around the files synchronized to Dropbox.

Cloud encryption tools are a simplistic but possibly compelling solution to many of the file protection problems currently plaguing IT. To find out more about these emerging technologies -- and other tools and techniques for file-level data protection -- download the free report.

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7241
Published: 2014-12-19
The TSUTAYA application 5.3 and earlier for Android allows remote attackers to execute arbitrary Java methods via a crafted HTML document.

CVE-2014-7249
Published: 2014-12-19
Buffer overflow on the Allied Telesis AR440S, AR441S, AR442S, AR745, AR750S, AR750S-DP, AT-8624POE, AT-8624T/2M, AT-8648T/2SP, AT-8748XL, AT-8848, AT-9816GB, AT-9924T, AT-9924Ts, CentreCOM AR415S, CentreCOM AR450S, CentreCOM AR550S, CentreCOM AR570S, CentreCOM 8700SL, CentreCOM 8948XL, CentreCOM 992...

CVE-2014-7267
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the output-page generator in the Ricksoft WBS Gantt-Chart add-on 7.8.1 and earlier for JIRA allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-7268.

CVE-2014-7268
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the data-export feature in the Ricksoft WBS Gantt-Chart add-on 7.8.1 and earlier for JIRA allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-7267.

CVE-2014-8272
Published: 2014-12-19
The IPMI 1.5 functionality in Dell iDRAC6 modular before 3.65, iDRAC6 monolithic before 1.98, and iDRAC7 before 1.57.57 does not properly select session ID values, which makes it easier for remote attackers to execute arbitrary commands via a brute-force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.