Discuss IT

The South African Podcast Portal
  • Decrease font size
  • Default font size
  • Increase font size
  • default color
  • green color
  • cyan color
  • red color
IT Security Pubcast discusses topical Information Security and Risk issues for South African practitioners
Home arrow Pubcast arrow Pubcast Episode #6
Pubcast Episode #6 PDF Print E-mail
Monday, 16 February 2009

Episode 6 of the IT Security Pubcast.

The Pubcast team has threatened to discuss Data Leak Prevention (DLP) technologies since its inception and in this episode we interview Guy Golan, the MD of NGS Technologies regarding this class of solution.

The Pubcast team has threatened to discuss Data Leak Prevention (DLP) technologies since its inception and in this episode we interview Guy Golan, the MD of NGS Technologies regarding this class of solution.


DLP has risen from obscurity to becoming a foundational component of any Information Security strategy that is serious about protecting confidential information. It provides out-of-the-box capabilities to identify confidential information through the use of generic heuristics that allow it to pinpoint key data such as names, identity numbers, credit card numbers and addresses. Furthermore, it allows organisations to extend this capability to “fingerprint” sensitive data and monitor its movement through the organisation. The technology maps these classes of data to key legislative and compliance drivers such as PCI, SOX and Basel.


DLP monitors the movement of this data through network gateways and onto endpoints. The technology will identify data regardless of whether it has been masked, pasted into other documents or hidden inside attachments. It allows the organisation to be alerted to data movement (in monitoring mode) or to be quarantined, automatically preventing attempts to move the data around.


However, implementing the solution is not without difficulty; and the discussion considers firstly why this technology is so important, and what organisations need to do in order to shift from monitoring to quarantine modes. In particular, organisations must take cognisance of the administrative overhead that the solution requires, that there must be “bypass” procedures to ensure that the business remains unaffected, and the legislative issues that pertain – particularly the provision of RICA.

Part 1
Download audio files Part 1
Part 2
Download audio files Part 2
Part 3
Download audio files Part 3
Part 4
Download audio files Part 4

 

 
< Prev   Next >