DataBulls

We write to bring the right information, to make it accessible to everyone.

Follow publication

Member-only story

What is Data Loss Prevention (DLP) ? How does it work?

Ismail Tasdelen
DataBulls
Published in
6 min readJan 12, 2023

--

Photo by Alina Grubnyak on Unsplash

In my article today, I will be talking about DLPs, namely Data Loss Prevention. In this article, I will talk about what DLP is, how it should be secure config, and what products are in the cybersecurity market. Data Loss Prevention (DLP) is a security measure that is designed to prevent sensitive or confidential data from being lost, stolen, or otherwise compromised. It typically involves the use of software or hardware tools to monitor and protect data as it is transmitted or stored on a network or device.

There are several different ways that DLP systems can work, depending on the specific product and the needs of the organization. Some common methods include:

  1. This type of DLP analyzes the content of data to determine whether it is sensitive or not, based on pre-defined rules or policies. For example, a content-based DLP system might be configured to flag any emails containing credit card numbers or social security numbers.
  2. This type of DLP takes into account the context in which data is being used, in addition to its content. For example, a context-aware DLP system might allow an employee to email a client’s credit card number to a vendor, but prevent the same employee from emailing the same credit card number to their personal email account.
  3. This type of DLP controls access to data based on the identity of the user. For example, a user-based DLP system might allow HR employees to access employee social security numbers, but prevent other employees from doing so.
  4. This type of DLP monitors data as it is transmitted over a network, such as the internet. It can be used to prevent sensitive data from being transmitted over unsecured channels or to unauthorized recipients.

Overall, the goal of DLP is to protect sensitive data from being lost, stolen, or otherwise compromised, while still allowing users to access and use the data as needed for legitimate business purposes.

--

--

DataBulls
DataBulls

Published in DataBulls

We write to bring the right information, to make it accessible to everyone.

Ismail Tasdelen
Ismail Tasdelen

Written by Ismail Tasdelen

I'm Ismail Tasdelen. I have been working in the cyber security industry for +7 years. Don't forget to follow and applaud to support my content.

No responses yet

Write a response