Skip to main content

Don't Just Migrate, Upgrade Your Data Loss Prevention

Get the advice you need to align your DLP with your business strategy

Why Read This Ebook?

 

“The world’s most valuable resource is no longer oil, but data.”

 – The Economist

 

Data is now more important than ever, it’s the most valuable resource.

Image
Components of S&P 500 Market Value

 

Data is evolving. Intangibles, like digital data, represent 90% of the S&P 500 value.

Image
Pace of business

 

The pace of business is accelerating. Security solutions must evolve with your business model.

  1. Outdated DLP is a liability; a successful upgrade requires planning. 
  2. Your new solution must extend your existing coverage. 
  3. You need DLP that can find all your sensitive data, drive growth, and adapt. 
  4. You need coverage for a work-from-anywhere world. 

Read this eBook to learn how to upgrade your DLP to be a strategic element of your data protection program and migrate without complexity.

Source: Ocean Tomo, LLC Intagible Asset Market Value Study, 2020 *Interim Study Update as of 07/01/2020

Table Of Contents

  • Assessing Your Today State and How You Evolved Here
  • Making Your Wish List for Data Protection
  • Getting Started
  • Proven Roadmap to DLP Success
  • Baseline- Develop Baseline, Models, and Policies
  • Educate- Educate and Inform on Smart Data Use
  • Educate- Educate and Inform on Smart Data Use
  • Enforce Acceptable Behavior
  • Ongoing Review and Policy Tuning 
  • Need to Act Now?
  • Why Digital Guardian?

Assesing Your Today State And How You Evolved Here

Business Evolution + Technology Evolution + User Evolution

Your business has evolved, technology solutions have evolved, but the ways your users do their job has evolved too. You need to take into account their new found power to add complexity to any data protection program.

Image
Single OS

Single OS >>> Multi OS, VDI, DaaS

Image
Finite, local apps

 

Finite, local apps >>> Infinite, web-based apps

Image
Work from anywhere

 

Most employees in office >>> Work From Anywhere

Business And Security Need To Evolve Together

Image
Business and Security Goals

 

How has the relative importance of IP protection vs regulated data protection shifted 

  • Greater reliance on IP and increased regulatory oversight means both have evolved 
  • Has the balance flipped? Will it flip?

What were and what are now the most common paths for data to move? 

  • Email, Web upload, USB, Printer, FTP, etc. 
  • What’s now the highest risk vector?

How has the company culture evolved? 

  • Is the risk of false negative or a false positive greater? 
  • What short/medium/long term objectives may change?

 

Image
Business And Security Need To Evolve Together

Making Your Wish List For Data Protection

Business Initiatives + Protecting Data 

  • Can you still achieve the goals you set out for when your organization started its data protection program? 
  • What compromises due to technology limitations must you make? 
  • What is the impact of doing nothing?
Image
Question

Enabling The Business And Protecting Data

When Evaluating You Existing Data Protection Program Understand What Your Goals Are, How They Align With The Business, And How They Are Prioritized.

Image
IP Protection vs Regulated Data  Protection
Image
Email, Web upload
Image
Culture of the company

 

Business initiatives + protecting data Common Goals 

  1. Protect sensitive data, meet compliance requirements 
  2. Support the business, share decision making responsibilities 
  3. How and where does data move? 
  4. Identify risks or gaps 
  5. Enable secure growth
Image
Business initiatives

The Right DLP Delivers The Deepest Visibility

An iceberg is 90% hidden under the surface of the water; like the data in your business, much of it is hidden. You need above and below the water level visibility. An effective, enterprise DLP can find, understand, and protect all your data, not just the visible.

Image
iceberg

Getting Started

Where Do I Start With A DLP Re-Evaluation?

Look inside before looking outside. Gather the insights where you have easier access to the people and other resources needed to ask how and why data moves the way it does.

Visibility First = Metrics  

  • Gather data to share with business units and stakeholders, data owners   
  • Share with them the data they need to make informed policy decisions 
  • Useful to track improvements and show ROI

Provide risk-based policy recommendations 

  • Not all data is the same 
  • Leverage existing experience and best practices

DLP Re-Evaluation – Step 2

Seek professional help with DLP vendors with the following guidance: 

Have use cases in mind to make it real Was there an incident that we don’t want to see happen again? 

  • Have people become too free using webmail or USB with sensitive data 
  • Was there an employee departure flagged too late to stop printing of confidential information? 
  • Was there malicious code or ransomware that is thought to have accessed sensitive data? 

If you’re prepared to discuss a specific issue, you're likely to have a better experience than if you have overly generalized discussions

Image
Data Security Integration

Extra Credit Reading 

Digital Guardian’s CISO, Tim Bandos, authored another eBook with a section dedicated to improving your RFP process. He’ll explain how best to structure your RFP process among other topics.

Proven Roadmap To DLP Success

A Phased Approach For DLP Success Once you’ve gone through your internal review, external evaluation, and selection, the deployment process begins. Here is where you need to have a well documented plan. Digital Guardian has implemented DLP programs for hundreds of organizations, the one thing they have in common is a need to protect sensitive data without a drawn-out deployment. 

Our proven, 5-phase approach delivers the enterprise DLP you need:

  1. Insight 
  2. Baseline 
  3. Educate
  4. Act 
  5. Assess

Stage 1: Insight: Identify Existing Behavior & Define Acceptable Behavior

  • During the initial “Insight” phase focus on the types of data you will need to protect and how they are moving. (Both the intended/approved and the workarounds that will inevitably occur.) Data in use, data in motion, and data at rest. 
  • Beyond data types and how its being manipulated, is the location of the data. You need to see, understand, and protect it across the entire extended enterprise from the endpoint to the cloud.
Image
Known Data

Stage 2: Baseline - Develop Baseline, Models, And Policies

Once you have a DLP deployed you need to set policies to see anything, right? A DLP that can deploy in a policy free mode simply collects data on the events that happen in the course of the normal business processes. From this you can establish a baseline of what normal looks like, then build better polices (or establish a cybersecurity training program). 

You will gain tremendous into the business with the unbiased data collection: 

  • Normal data flows throughout the business 
  • Marketing accessing the legal and finance server at off hours 
  • Sales reps encrypting, compressing, renaming excel files to look like .JPGs 
  • Finance accessing and downloading customer data at 3AM 
  • User attempting to access multiple inactive 
  • Applications spawning other applications and making registry changes 

With a baseline established, look for anomalies or deviation from expected, investigate, and make an informed decision about the risk to the business.

How well can you see “rare processes” in your environment?In a normal day, you would expect Email apps, MS Office apps, or if you in manufacturing CAD apps to launch. But what about things you don’t expect to see, like Powershell or developer tools by a member of the HR team? Sorting these rare processes by user can give greater detail or highlight data loss risks.

Image
Baseline Graph

Stage 3: Educate - Educate And Inform On Smart Data Use

Information about data risks that lives only within the information security department doesn’t deliver the full benefits it could. The end users need guidance on how to act and what behaviors could be deemed too risky by the business. Because these actions can change as the business evolves, and as security solutions evolve, it’s important to provide regular feedback and education to the entire organization

Image
Sensitive Data DLP

 

 

Here is an example of how user prompting can encourage better data use decisions. By prompting users about how their actions could put patient data at risk, the organization saw over 85% reduction in unauthorized PHI data transferred.

Image
Unauthorized Transmission Of PHI Data

Stage 4: Act - Enforce Acceptable Behavior

Even with the insights, baseline, and user education, there are still times that information security solutions like DLP need to take automated actions. Whether the user is ignoring the prompts, or an active and malicious user, security automation can stop data loss before it happens and give the security team the knowledge to further respond to the incident. The question is, what is the right level of action to take? That depends upon the risk profile of the business, but security teams need broad and flexible automation options.

To best determine the actions, security teams should rank the actions using standardized terms, then assign a risk level to the results. From that list the team can then decide the level of automated response that balances information security benefits with business process interruption. An unauthorized access by and insider might be a moderate level event that requires a justification to proceed, while improper usage by an outsider may be critical and be blocked.

Category 

  • Unauthorized Access 
  • Potential Malware 
  • Improper Usage 
  • Unsuccessful Attempt 
  • Explained Anomaly

Type 

  • Insider Threat 
  • Opportunistic 
  • Outsider 
  • Broken Business Practice

Severity 

  • Critical Impact 
  • High Impact 
  • Moderate Impact 
  • Low Impact

Stage 5: Assess - Ongoing Review And Policy Tuning

Just as no business is static, no information security policy should be static. New target markets, new delivery options, and new risks all require a consistent review of the DLP program to ensure it still meets the intended data protection goals without impeding the business growth. Over the previous 6 months how easily can you show any changes to data egress?Are there new channels? Has a traditional data egress channel suddenly dropped? While that could mean people are moving less data (unlikely given the data explosion), it’s more likely they’ve found a new method that the security team needs to understand and evaluate.

Need To Act Now?

Ready To Act Now? 

  • Have you already done your business and security assessment, or is a compelling event driving urgency? 
  • Migration of any enterprise technology can present challenges, here are some tips from our team of Solutions Engineers. They’ve engaged with a diverse range of global businesses and helped them migrate to a new DLP platform. 
  • Read on for how to make the migration process go smoothly.

Steps For A Seamless Transition

  • Getting exports of all the policies you have in place with your existing DLP vendor. 
  • Organizing a governance strategy for handling DLP related questions. 
  • Establishing communications with and soliciting feedback from entire organization about data protection program 
  • Ensuring antivirus exclusions are applied to all users to prevent solution conflicts 
  • Completing in-app tutorials and trainings 
  • Using a Project Tracker to maintain project momentum
Image
Zipper

Project Tracker Template

Map Out Your Process Steps From Start To Finish. Work Closely With The DLP Vendor To Develop And Reality-Check This Document. Whether You Are A Small Or Large Company, Many Steps Will Be The Same, The Scope Of Each Is Different. 

  • Step 1 - A/V Exclusions for All Security Products 
    • (EDR and A/V) 
  • Step 2 - Allow DLP Agent Traffic to the Cloud 
  • Step 3 - Gather Existing DLP Configuration 
  • Step 4 - Map DLP Requirements to DLP Solution 
  • Step 5 - Map DLP Policy Pack Controls
Image
Project Tracker

Steps For Success – End-User Communication

No one likes surprises or being force fed a solution without any chance to comment. Any data security tool can alienate the users if they’re not included throughout the entire process and this lack of communication causes workflow disruptions. While there are some occasions when a stealth mode install is needed, open communication is generally the recommended process with DLP. 

What Is Digital Guardian And What Does It Do? 

Digital Guardian (DG) platform is the leading Enterprise Information Protection solution for Global 2000 companies and is the cornerstone of a strategic information protection and risk management program. 

Integrated, comprehensive, and proven, Digital Guardian uniquely solves the broadest set of information protection use cases faced by global businesses. Digital Guardian differentiators include: 

  • Enterprise-wide visibility into sensitive data location, usage and movement both on and offline 
  • Uniform policy enforcement that leverages identity, activity, context, and content analysis with actionable, multi-variable data classification 
  • Automated risk-appropriate controls manage user activities through warnings and blocks combined with fully integrated encryption, thus enforcing business processes and holding end users accountable 
  • Deterministic, continuous and accurate system that is device, channel and application agnostic 
  • Actionable, fully integrated decision support and reporting console that includes dashboards, drill-down capabilities, trend location-based and organizational views

 

 

Image
End User Communication

Map Existing Requirements To DLP Policy Pack

Upgrading DLP Is A Chance To Reevaluate Policies, But Be Sure You Can Easily Map Existing, Known Requirements To The New Solution. You Should Take Advantage Of The Swap To Update And Improve Data Protection Strategy And Policies.

Image
DLP Policy Pack

Configure Out Of The Box Policies 

  • Based on what you know and what the DLP solution provides out of the box, you can get your initial data protection policies in place. 
  • Set up the compliance policies that look for the easy to recognize data that follows a pattern – PCI, PHI, or PII. 
  • Establish your IP protection policies to recognize and protect the harder to protect unstructured and less predictable format common to IP.
Image
Box Policies

Deployment Scenarios

When adding DLP to an organization without anything in place a soak period where you watch and learn how the data is moving leads to a more effective deployment. You can use data about the data to make policies that match your real world. 

In a displacement scenario policy duplication is where some businesses will begin. They are confident in the existing policies but need a better platform for their data protection. Once the new solution is in place, revisiting the data flows should be done to see where your team can make improvements.

Image
Deployment Scenarios

 

Image
Deployment Scenarios part 2

Why Digital Guardian?

The Only Cloud Delivered Data Protection Platform Data protection is at the core of our company mission. The DG Data Protection Platform detects threats and stops data exfiltration from both well-meaning and malicious insiders as well as external adversaries.

  • Data Loss Prevention 
  • Managed Detection & Response 
  • Data Discovery 
  • Data Classification
  • Analytics 
  • Reporting 
  • System Management

 

 

Image
DG-Architecture

Proven 5-Step Methodology: Speeds Migration And Eliminates Data Protection Gaps

 

Image
5-Step Methodology

 

Your Digital Guardian team is with you throughout the entire process. From the initial planning stages, through build-out & testing, and ultimately production deployment, we’ll combine on our team’s data protection experience with your business knowledge to get you operational quickly.

Image
cloud-delivered-icon

Cloud-Delivered 

Powered by AWS, Digital Guardian delivers simplified deployment, low overhead, and elastic scalability for increased return on your security spend.

Image
cross-platform-icon

Cross Platform 

Coverage for your Windows, macOS, or Linux operating systems and all your applications, both browser based and native.

Image
flexible-controls-icon

Flexible Controls 

Fine-grained controls, ranging from log & monitor to automated blocking, help protect data before it's lost.

Image
deepest-visibility-icon

Deepest Visibility 

We see everything that happens to your organization’s sensitive data. Cross Platform

Image
no-policy-icon

No Policy, No Problem 

Our “unknown risk” approach enables you to see where sensitive data is located, how it flows, and where it is put at risk - all without policies.

Image
comprehensive-classification-icon

Comprehensive Classification 

Only Digital Guardian provides content, user, and context-based data discovery and classification.

Use Data Visibility Insights To Engage Business Leaders

Anyone with DLP experience will tell you that DLP isn’t just a security or IT initiative. Success depends on support and sponsorship from the business leaders. This is pure common sense. But we have a unique view on how to engage them. 

The standard process is to sit down with the business leaders to define all data classification schemes and protection policies in advance. What do we recommend instead? 

Start by sharing real discoveries from your “Quick Win” about where sensitive data resides and how it’s being used. This will get the attention of your enterprise’s business leaders. It will make it much easier for them to understand the risks to the business. And it will make it much easier to collaborate with them. That’s exactly what John Graham, former CISO of Jabil did.

“Digital Guardian [Data Loss Prevention] helped us changed the conversation with business unit leaders.”

–John Graham

Former Chief Information Security Officer, Jabil

 

CASE STUDY

Jabil’s Quick Win

SITUATION: Jabil is a Fortune 100 contract manufacturer. The company was at risk of large financial penalties if customer NDAs were violated due to a security incident. 

SOLUTION: Within 30 days of DLP deployment, Jabil’s security team gained visibility into all data access and usage across 52,000 workstations. They immediately realized that users copying large data files to USB drives was far more common than anyone expected. Digital Guardian’s detailed egress reporting on the data leakage from USBs enabled Jabil’s security team to have more productive conversations with business unit leaders. These exchanges focused not on defining what data was considered sensitive, but rather on how data from specific servers was being used (in this case copied to USBs) by users. 

RESULTS: By providing business leaders real-world information on how data was being used (or misused), Jabil was able to identify and classify their most sensitive data faster and more efficiently. This was a dramatic improvement over a more traditional discovery and classification approach.

 

 

Within 30 days of DLP deployment, Jabil’s security team gained visibility into all data access and usage across 52,000 workstations.

 

CASE STUDY 

The Power Of Real-Time User Education

SITUATION: The company is one of the largest managed healthcare providers in North America. Despite spending more than $1M annually on HIPAA compliance training, an internal audit identified a significant risk of non-compliance. The training had failed because it was a specific event not reinforced through ongoing processes. Users were not diligent about using the company’s VPN, where data protection controls were enforced. Remote users routinely traveled with the sensitive data they needed to do their jobs.

SOLUTION: The company’s auditors recommended stricter controls, both on and off the corporate network. The company needed to change user behavior when interacting with sensitive data, reinforce existing policies as data was used, and create a culture that held users accountable for their actions. Digital Guardian helped by enforcing connections through the company’s VPN, applying policies in real time based on network awareness, and prompting users who violated data use policies. Users are presented with a prompt screen that requires them to acknowledge the appropriate company policy and provide justification to continue.

RESULTS: Within six months, the healthcare provider reported an 85% decrease in prompts to users, indicating a significant increase in both policy awareness and secure employee behavior.

 

 

Image
Unauthorized Transmission Of PHI Data