expensive and complex Preventive Control: Quality, Efficiency and Reliability
Today, the Russian market offers advanc DLP systems that allow monitoring of virtually all common corporate information exchange channels and even support the process of investigating computer crimes (the so-call forensics). However, these systems are expensive and difficult to deploy and operate. systems, their functionality is specializ only for monitoring a certain set of channels for possible leaks.
It should be not that several domestic expensive and complex
DLP products are present in our country; some of them have manag to enter the world market and are list in studies by international analytical companies.
At the same time, there are still c level executive list fundamental technical and legal problems in the practical application of DLP systems. Few people would risk, for example, installing such a system in a data flow break and switching it to automatic transmission interruption mode. This means that in reality, DLPs do not work as leak prevention systems, but only as leak detection systems, and decisions on blocking a leak channel must be made by a specialist analyst.
There is no consensus on the legitimacy of using
DLP systems, since they actively invade afb directory the privacy of company employees. Job descriptions that oblige personnel to agree to have their actions at work monitor by DLP sometimes contradict the constitutional rights of Russian citizens.
Large-scale changes in ICT determine their requirements for DLP systems. Thus, with the development of mobile access, the concept of a workplace is greatly blurr and control over the implementation of corporate information security policies by employees must go beyond the office space.
Cloud technologies do not leave companies
With the opportunity to inspect the content of outgoing messages maintain the previous understanding of the localization of their data, and leak protection tools must also follow the data into the cloud, distributing their functionality between the cloud provider and the data owner.