RSA Integrates Data Leak Prevention With Security Information ManagementRSA Integrates Data Leak Prevention With Security Information Management
DLP 7.0 will interact with enVision SIEM tool, allowing IT to identify insider events
April 14, 2009
RSA today launched a new version of its data leak prevention software that can work with its security information and event management tool.
The new RSA DLP 7.0 Suite also offers some 67 other enhancements, including native database scanning for Oracle and SQL Server environments as well as new automation features that make the DLP software easier to administer.
DLP tools, which help enterprises identify sensitive data and then apply policies for accessing it, have been around for more than two years now. But most DLP tools are not well integrated with SIEM, which means security administrators have to monitor potential insider threats separately from external threats.
The integration between DLP 7.0 and enVision means that RSA security managers can now put internal threats on the screen with potential outsider attacks and prioritize them at the same time.
"If we find a [Microsoft] SharePoint site that shows some suspicious activity, that will become an event on the administrator's screen," says Katie Curtin-Mestre, director of product marketing for the Data Security Group at RSA.
The new database scanning feature will also help organizations identify sensitive data within database fields and allow them to apply specific policies for accessing and handling that information, RSA said.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message
About the Author(s)
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
What Ransomware Groups Look for in Enterprise Victims
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Everything You Need to Know About DNS Attacks
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks