CONTACT US
DLP / loss-control


Loss of large volumes of protected information has become a regular headline event, forcing the company to re-issue cards, notify customers, and mitigate loss of goodwill in negative publicity.

Data Loss Prevention (DLP) is a computer security term referring to systems that identify, monitor, and protect data in use (e.g., endpoint actions), data in motion (e.g., network actions), and data at rest (e.g., data storage) through deep content inspection, contextual security analysis of transaction (attributes of originator, data object, medium, timing, recipient/destination, etc.), and with a centralized management framework. The CloudCover Protocol requires UTM systems that are designed to detect and prevent the unauthorized use and transmission of confidential data in real-time.

CloudCover UTM/DLP Partner Network will be dedicated hardware/software platforms, typically installed on the organization's internet network connection, that analyze network traffic to search for unauthorized information transmissions, including email, IM, FTP, HTTP, and HTTPS (called data in motion). Network DLP has the advantage that it si simple to install, and provides a relatively low cost of ownership. Network DLP systems can also discover data at rest (data stored throughout the enterprise) to identify areas of risk where confidential data is stored in inappropriate and/or unsecured locations.

Loss Control: When management chooses to insure their data risk, they will do so by implementing one or more of three different types of CloudCover loss control requirments.

Administrative controls (also called procedural controls) consist of approved policies, procedures, standards and guidelines and bonded personel. Some industry sectors have policies, procedures, standards and guidelines that must be followed - Payment Card Industry (PCI) Data Security Standard is required by Visa and MasterCard.

Logical controls (also called technical controls) use software and data to monitor and control access to information and computing systems. For example: passwords, network and host based firewalls, UTM network intrusion prevention systems (IPS), access control lists, and data encryption are logical controls.

Physical controls monitor and control the data server environment of the work place and computing facilities. They also monitor and control access to and from such facilities.

Lear more >>