Before embarking on a Data Loss Prevention program, enterprises must first determine what the essential ingredients are. Here are five technological pieces of the puzzle. (Part 1 in a series) About this series: Companies are clamoring for Data Loss Prevention (DLP) tools to keep their data safe from online predators. But there is much confusion over what the true ingredients are. In this series, CSOonline talks to security practitioners, analysts and other experts for a crash-course on what DLP is, what it isn’t and how to get on the right track. We’ll begin with the proper technologies to use, followed by the right people policies.Most security vendors will tell you they have just the thing for your DLP needs. But some industry experts say enterprises often buy products that, once installed, don’t perform all the functions necessary to keep sensitive information safe. [See also: Security Analyst to DLP Vendors: Watch Your Language]We reached out to several IT security professionals in an effort to zero in on the true elements of an effective DLP program — from the technology to people policies — and how best to fit the pieces together. This article will focus specifically on five technological approaches that, when used together, offer a solid data defense.See also: Data Loss Prevention Dos and Don’ts1. Data discovery, classification and fingerprinting Richard Stiennon, chief research analyst at IT-Harvest, said a complete DLP solution must be able to identify your IP and make it possible to detect when it is “leaking.”William Pfeifer, CISSP and IT security consultant at the Enforcement Support Agency in San Diego, agrees, calling data classification the prerequisite for everything that follows. “You cannot protect everything,” he said. “Therefore methodology, technology, policy and training is involved in this stage to isolate the asset (or assets) that one is protecting and then making that asset the focus of the protection.” Nick Selby, former research director for enterprise security at The 451 Group and CEO/co-founder of Cambridge Infosec Associates, said the key is to develop a data classification system that has a fighting chance of working. To that end, lumping data into too few or too many buckets is a recipe for failure.“The magic number tends to be three or four buckets — public, internal use only, classified, and so on,” he said.2. EncryptionThis is a tricky one, as some security pros will tell you encryption does not equal DLP. And that’s true to a point.As former Gartner analyst and Securosis founder Rich Mogull put it, encryption is often sold as a DLP product, but it doesn’t do the entire job by itself.Those polled don’t disagree with that statement. But they do believe encryption is a necessary part of DLP. “The only thing [encryption doesn’t cover] is taking screen shots and printing them out or smuggling them out on a thumb drive. Not sure I have a solution to that one. It also leaves out stereography, but then is anyone really worried about that?” Pfeifer asked. Specifically, he cites encryption as a DLP staple for protecting data at rest, in use and in motion. Stiennon said that while all encryption vendors are not DLP vendors, applying encryption is a critical component to DLP. “It could be as simple as enforcing a policy,” he said. “When you see spreadsheets as attachments, encrypt them.”3. Gateway detection and blocking.This one would seem obvious, since an IT shop can’t prevent data loss without deploying tools that can detect and block malicious activity.Sean Steele, senior security consultant at InfoLock Technologies, said the key is to have something in place that provides real-time (or close to real-time) monitoring and blocking capabilities for data that’s headed outbound at the network perimeter, data at rest (“sensitive or interesting/frightening data sitting on my network file shares, SAN, tier 1/2 storage, etc.,” he said); and data being used by human beings at the network’s endpoints and servers. 4. E-mail integrationSince e-mail is an easy target for data thieves, whether they are sending e-mails with links to computer-hijacking malware, or sending out e-mails from the inside with proprietary company data, Partnerships between security vendors and e-mail gateway providers are an essential piece of the DLP puzzle. Fortunately, Stiennon said, “Most DLP vendors formed partnerships with e-mail gateways early on.5. Device managementGiven the mobility of workers and their computing devices these days [laptops, smart phones, USB sticks], security tools that help the IT shop control what can and can’t be done with mobile devices is a key ingredient of DLP.Stiennon is particularly concerned about the USB devices that could be used to steal data. “Being able to control the use of USB devices is a key requirement of a DLP solution,” he said.Next week: A look at what SHOULD NOT be accepted as DLP. Related content news Okta launches Cybersecurity Workforce Development Initiative New philanthropic and educational grants aim to advance inclusive pathways into cybersecurity and technology careers. By Michael Hill Oct 04, 2023 3 mins IT Skills Careers Security news New critical AI vulnerabilities in TorchServe put thousands of AI models at risk The vulnerabilities can completely compromise the AI infrastructure of the world’s biggest businesses, Oligo Security said. By Shweta Sharma Oct 04, 2023 4 mins Vulnerabilities news ChatGPT “not a reliable” tool for detecting vulnerabilities in developed code NCC Group report claims machine learning models show strong promise in detecting novel zero-day attacks. By Michael Hill Oct 04, 2023 3 mins DevSecOps Generative AI Vulnerabilities news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe