SlideShare une entreprise Scribd logo
1  sur  34
Télécharger pour lire hors ligne
Copyright 2011 Trend Micro Inc.Classification 8/2/2013 1
Overview of Data Loss Prevention (DLP) Technology
Liwei Ren, Ph.D
Data Security Research, Trend Micro™
Sept, 2012, Tsinghua University, Beijing, China
Copyright 2011 Trend Micro Inc.
Backgrounds
• Liwei Ren, Data Security Research, Trend Micro™
– Education
• MS/BS in mathematics, Tsinghua University, Beijing
• Ph.D in mathematics, MS in information science, University of Pittsburgh
– Research interests
• DLP, differential compression, data de-duplication, file transfer protocols, database
security, and algorithms
– Major works
• N academic papers, M patents and K startup company where N≥10, M ≥12 and K=1
– TEEC member since 2005.
– liwei_ren@trendmicro.com
• Trend Micro™
– Global security software company with headquarter in Tokyo, and R&D centers in
Nanjing, Taipei and Silicon Valley.
– One of top 3 anti-malware vendors (competing with Symantec & McAfee)
– Pioneer in cloud security with product lines Deep Security™, SecureCloud™
– Major DLP vendor after Provilla™ acquisition
2
Copyright 2011 Trend Micro Inc.
Agenda
• What is Data Loss Prevention (数据泄露防护)?
• DLP Models
• DLP Systems and Architecture
• Data Classification and Identification
• Technical Challenges
• Summary
Classification 8/2/2013 3
Copyright 2011 Trend Micro Inc.
What Is Data Loss Prevention?
• What is Data Loss Prevention?
– Data loss prevention (aka, DLP) is a data security technology
that detects potential data breach incidents in timely manner
and prevents them by monitoring data in-use (endpoints), in-
motion (network traffic), and at-rest (data storage) in an
organization’s network.
Classification 8/2/2013 4
Copyright 2011 Trend Micro Inc.
What Is Data Loss Prevention?
• What drives DLP development?
– Regulatory compliances such as PCI,SOX, HIPAA, GLBA, SB1382 and etc
– Confidential information protection
– Intellectual property protection
• What data loss incidents does a DLP system handle?
– Incautious data leak by an internal worker
– Intentional data theft by an unskillful worker
– Determined data theft by a highly technical worker
– Determined data theft by external hackers or advanced malwares or APT
Classification 8/2/2013 5
Copyright 2011 Trend Micro Inc.
What Is Data Loss Prevention?
• The evolution of naming
– Information Leak Prevention (ILP)
– Information Leak Detection and Prevention (ILDP)
– DLP
• Data Leak Prevention
• Data Loss Prevention
Classification 8/2/2013 6
Copyright 2011 Trend Micro Inc.
DLP Models
• A model is used to describe a technology with rigorous terms
• We need models to define/scope what a DLP system should
do
• Three States of Data
– Data in Use (endpoints)
– Data in Motion (network)
– Data at Rest (storage)
Classification 8/2/2013 7
Copyright 2011 Trend Micro Inc.
DLP Models
• The data in use at endpoints can be leaked via
– USB
– Emails
– Web mails
– HTTP/HTTPS
– IM
– FTP
– …
• The data in motion can be leaked via
– SMTP
– FTP
– HTTP/HTTPS
– …
Classification 8/2/2013 8
Copyright 2011 Trend Micro Inc.
DLP Models
• The data at rest could
– reside at wrong place
– Be accessed by wrong person
– Be owned by wrong person
Classification 8/2/2013 9
Copyright 2011 Trend Micro Inc.
DLP Models
• A conceptual view for data-in-use and data-in-
motion:
Classification 8/2/2013 10
Copyright 2011 Trend Micro Inc.
DLP Models
• Technical views for data-in-use and data-in-motion:
Classification 8/2/2013 11
Copyright 2011 Trend Micro Inc.
DLP Models
• DLP Model for data-in-use and data-in-motion:
– DATA flows from SOURCE to DESTINATION via CHANNEL do
ACTIONs
• DATA specifies what confidential data is
• SOURCE can be an user, an endpoint, an email address, or a group of
them
• DESTINATION can be an endpoint, an email address, or a group of
them, or simply the external world
• CHANNEL indicates the data leak channel such as USB, email, network
protocols and etc
• ACTION is the action that needs to be taken by the DLP system when
an incident occurs
Classification 8/2/2013 12
Copyright 2011 Trend Micro Inc.
DLP Models
• DLP Model for data-at-rest
Classification 8/2/2013 13
Copyright 2011 Trend Micro Inc.
DLP Models
• DLP Model for data-at-rest
– DATA resides at SOURCE do ACTIONs
• DATA specifies what the sensitive data (which has potential for
leakage) is
• SOURCE can be an endpoint, a storage server or a group of them
• ACTION is the action that needs to be taken by the DLP system when
confidential data is identified at rest.
Classification 8/2/2013 14
Copyright 2011 Trend Micro Inc.
DLP Models
• These two DLP models are fundamental
• They basically define the formats of DLP security rules (or DLP
security policies)
Classification 8/2/2013 15
Copyright 2011 Trend Micro Inc.
DLP Systems and Architecture
• Typical DLP systems
– DLP Management Console
– DLP Endpoint Agent
– DLP Network Gateway
– Data Discovery Agent (or Appliance)
Classification 8/2/2013 16
Copyright 2011 Trend Micro Inc.
DLP Systems and Architecture
• Typical DLP system architecture
Classification 8/2/2013 17
Copyright 2011 Trend Micro Inc.
Data Classification and Identification
• One expects a DLP system can answer the following questions
– What is sensitive information?
– How to define sensitive information?
– How to categorize sensitive information?
– How to check if a given document contains sensitive information?
– How to measure data sensitivity?
• Data inspection is an important capability for a content-
aware DLP solution. It consists of two parts:
– To define sensitive data, i.e., data classification
– To identify sensitive data in real time
Classification 8/2/2013 18
Copyright 2011 Trend Micro Inc.
Data Classification and Identification
• Sensitive data is contained in textual documents.
• What does a document mean to you?
• We need text models to describe a text:
Classification 8/2/2013 19
Copyright 2011 Trend Micro Inc.
Data Classification and Identification
• I prefer to use UTF-8 text model
– Handling all languages, especially for CJK group.
– A textual document is normalized into a sequence of UTF-8 characters
• Four fundamental approaches for sensitive data definition and
identification:
– Document fingerprinting
– Database record fingerprinting
– Multiple Keyword matching
– Regular expression matching
Classification 8/2/2013 20
Copyright 2011 Trend Micro Inc.
Data Classification and Identification
• What is document fingerprinting about?
– It is a solution to a problem of information retrieval:
• Identify modified versions of known documents
• Near duplicate document detection (NDDD)
– A technique of variant detection for documents
• Extract invariants from variants of digital objects
• Variant detection is a principle with 1-to-many capability
Classification 8/2/2013 21
Copyright 2011 Trend Micro Inc.
Data Classification and Identification
• Problem Definition (a model):
– Let S= { T1, T2, …,Tn} be a set of known texts
– Given a query text T, one needs to determine if there exist at least a
document t ϵ S such that T and t share common textual content
significantly.
• Multiple documents are ranked by how much common content are shared.
Classification 8/2/2013 22
Copyright 2011 Trend Micro Inc.
Data Classification and Identification
• Alternative model:
– Let S= { T1, T2, …,Tn} be a set of known texts
– Given a query text T and X%, one needs to determine if there exist at
least a document t ϵ S such that |T ∩t| /Min(|T|,|t|) ≥ X%
• Multiple documents are ranked by the percentils.
Classification 8/2/2013 23
Copyright 2011 Trend Micro Inc.
Data Classification and Identification
• Solutions
– Liwei Ren & el., US patent 7516130, Matching engine with signature generation
– Liwei Ren & el., US patent 7747642, Matching engine for querying relevant
documents
– Liwei Ren & el., US patent 7860853, Document matching engine using
asymmetric signature generation
• Solution Highlights:
– A document fingerprint is a textual feature that we extract from a given text which is a
sequence of UTF-8 characters
– A single document has multiple fingerprints
– Uniqueness: Any two irrelevant documents should not have common fingerprints
– Robustness: If two documents share significantly common texts, they should have common
fingerprints. In other words, when a document has moderate changes , its fingerprints
should have good probability to survive.
– The key is to identify anchor points within text that can survive text changes. fingerprint
can be generated from its textual neighborhood
– The major part of the solution is a fingerprint generation algorithm.
– Finally, we arrive at a fingerprint based search engine
Classification 8/2/2013 24
Copyright 2011 Trend Micro Inc.
Data Classification and Identification
• How to evaluate a fingerprint generation algorithm?
– Accuracy in terms of false positive and false negative
– Performance
– Small fingerprint size that is required for an endpoint DLP solution
– Language independence
Classification 8/2/2013 25
Copyright 2011 Trend Micro Inc.
Data Classification and Identification
• What is database record fingerprinting about?
– Also known as Exact Match in DLP field
– It is a technique to detect if there exist sensitive data
records within a text.
• Use Case:
– We have several personal data records of <SSN, Phone#, address> that
are included in a text, we want to extract all records from the file to
determine the sensitivity of the file.
• Example: Two data records < 178-76-6754, 412-876-6789, 43 Atword Street,
Pittsburgh, PA 15260> & <159-87-8965, (408)780-8876 , 76 Parkview Ave,
Sunnyvale, CA 94086 > are embedded in text in an unstructured manner.
– Hhghghg 178-76-6754 ggkjkkkkk879-45-6785kjkjjk 43 Atword Street, Pittsburgh,
PA 15260 kllkll 412-876-6789 kjkjjkj 76 Parkview Ave, Sunnyvale, CA 94086
hhjhjhj (408)780-8876 hjhjkjkjjj 159-87-8965hjhjhjhj
Classification 8/2/2013 26
Copyright 2011 Trend Micro Inc.
Data Classification and Identification
• Problem Definition :
– Let S= { R1, R2, …,Rn} be a set of known data records of the same table.
– Given any text T, one needs to extract all records or sub-records from T
while the record cells may appear randomly within the text.
• A solution:
– Liwei Ren & el., US patent 7950062, Fingerprinting based entity
extraction.
Classification 8/2/2013 27
Copyright 2011 Trend Micro Inc.
Data Classification and Identification
• Multiple keyword match and RegEx match
– They are well-known & well-defined problems
– Very useful in DLP data inspection
• Problem Definition for Keyword Match:
– Let S= {K1,K2,…,Kn} be a dictionary of keywords.
– Given any text T, one needs to identify all keyword occurrences from T.
• Problem Definition for RegEx Match:
– Let S= {P1,P2,…,Pm} be a set of RegEx patterns.
– Given any text T, one needs to identify all pattern instances from T.
• Easy problems?
– Not at all. For large n and m, one will have performance issue.
– That’s the problem of scalability.
– Scalable algorithms must be provided.
Classification 8/2/2013 28
Copyright 2011 Trend Micro Inc.
Data Classification and Identification
• Data inspection template and framework
• The 4 different data inspection techniques need to work
together
– To meet various DLP use cases
– Especially, the regulatory compliances.
• For example, PCI needs the following Boolean logic supported
by both keyword match and RegEx match:
– SSN-Entity (2) OR [CCN(1) AND NAME(1) ] OR [CCN(1) AND Partial-Date(1) AND Expiration-
Keyword ]
– That is the PCI data template
Classification 8/2/2013 29
Copyright 2011 Trend Micro Inc.
Data Classification and Identification
• Data template framework:
Classification 8/2/2013 30
Copyright 2011 Trend Micro Inc.
Data Classification and Identification
• DLP rule engine works on top of both DLP models and data
template framework:
Classification 8/2/2013 31
Copyright 2011 Trend Micro Inc.
Technical Challenges
• Some areas with challenges
– Concept Match
– Data Discovery
– Document Classification Automation
– Determined Data Theft Detection
Classification 8/2/2013 32
Copyright 2011 Trend Micro Inc.
Summary
• What DLP is about
• DLP models
• DLP systems
• Text Models
• Data template framework with
– 4 data inspection techniques on top of a text model
Classification 8/2/2013 33
Copyright 2011 Trend Micro Inc.
Q&A
• Thanks for your time
• Any questions?
Classification 8/2/2013 34

Contenu connexe

Tendances

Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive OverviewKim Jensen
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Iftikhar Ali Iqbal
 
DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWSylvain Martinez
 
DLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsDLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsLiwei Ren任力偉
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)Radhakrishnan Govindan
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and MitigationsApril Mardock CISSP
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection Syed Sabhi Haider
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...☁️ Gustavo Magella
 

Tendances (20)

Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEW
 
DLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsDLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and Algorithms
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)
 
DLP
DLPDLP
DLP
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and Mitigations
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 

En vedette

The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpValery Boronin
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
 
Intro to Data Loss Prevention in SharePoint 2016
Intro to Data Loss Prevention in SharePoint 2016Intro to Data Loss Prevention in SharePoint 2016
Intro to Data Loss Prevention in SharePoint 2016Craig Jahnke
 
How to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAMHow to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAMImperva
 
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)Global Business Events
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Priyanka Aash
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for TabletSymantec
 
Catalogo Portachiavi Per Auto
Catalogo Portachiavi Per AutoCatalogo Portachiavi Per Auto
Catalogo Portachiavi Per AutoAlessio Astolfi
 
DLP 9.4 - новые возможности защиты от утечек
DLP 9.4 - новые возможности защиты от утечекDLP 9.4 - новые возможности защиты от утечек
DLP 9.4 - новые возможности защиты от утечекVladyslav Radetsky
 
Charity: A Secret for Cyberspace by Jon Creekmore
Charity: A Secret for Cyberspace by Jon CreekmoreCharity: A Secret for Cyberspace by Jon Creekmore
Charity: A Secret for Cyberspace by Jon CreekmoreEC-Council
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeEC-Council
 
Evolution of Malware and Attempts to Prevent by Michael Angelo Vien
Evolution of Malware and Attempts to Prevent by Michael Angelo VienEvolution of Malware and Attempts to Prevent by Michael Angelo Vien
Evolution of Malware and Attempts to Prevent by Michael Angelo VienEC-Council
 
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge Pereira
 

En vedette (16)

The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can Help
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
Intro to Data Loss Prevention in SharePoint 2016
Intro to Data Loss Prevention in SharePoint 2016Intro to Data Loss Prevention in SharePoint 2016
Intro to Data Loss Prevention in SharePoint 2016
 
How to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAMHow to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAM
 
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for Tablet
 
Catalogo Portachiavi Per Auto
Catalogo Portachiavi Per AutoCatalogo Portachiavi Per Auto
Catalogo Portachiavi Per Auto
 
DLP customer presentation
DLP customer presentationDLP customer presentation
DLP customer presentation
 
DLP 9.4 - новые возможности защиты от утечек
DLP 9.4 - новые возможности защиты от утечекDLP 9.4 - новые возможности защиты от утечек
DLP 9.4 - новые возможности защиты от утечек
 
Charity: A Secret for Cyberspace by Jon Creekmore
Charity: A Secret for Cyberspace by Jon CreekmoreCharity: A Secret for Cyberspace by Jon Creekmore
Charity: A Secret for Cyberspace by Jon Creekmore
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
 
Evolution of Malware and Attempts to Prevent by Michael Angelo Vien
Evolution of Malware and Attempts to Prevent by Michael Angelo VienEvolution of Malware and Attempts to Prevent by Michael Angelo Vien
Evolution of Malware and Attempts to Prevent by Michael Angelo Vien
 
The value of our data
The value of our dataThe value of our data
The value of our data
 
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
 

Similaire à Overview of Data Loss Prevention (DLP) Technology

DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsAndris Soroka
 
John Eberhardt NSTAC Testimony
John Eberhardt NSTAC TestimonyJohn Eberhardt NSTAC Testimony
John Eberhardt NSTAC TestimonyJohn Eberhardt
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
New enterprise application and data security challenges and solutions apr 2...
New enterprise application and data security challenges and solutions   apr 2...New enterprise application and data security challenges and solutions   apr 2...
New enterprise application and data security challenges and solutions apr 2...Ulf Mattsson
 
Securing Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudSecuring Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudLiwei Ren任力偉
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...IRJET Journal
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptxTranVu383073
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
data-leakage-prevention
 data-leakage-prevention data-leakage-prevention
data-leakage-preventionanuepcet
 
Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareExplore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareKonverge Technologies Pvt. Ltd.
 
Hortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your dataHortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your dataScott Clinton
 
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...IRJET Journal
 
Data Science ppt for the asjdbhsadbmsnc.pptx
Data Science ppt for the asjdbhsadbmsnc.pptxData Science ppt for the asjdbhsadbmsnc.pptx
Data Science ppt for the asjdbhsadbmsnc.pptxsa3302
 
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...Denodo
 
Gse uk-cedrinemadera-2018-shared
Gse uk-cedrinemadera-2018-sharedGse uk-cedrinemadera-2018-shared
Gse uk-cedrinemadera-2018-sharedcedrinemadera
 

Similaire à Overview of Data Loss Prevention (DLP) Technology (20)

DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
John Eberhardt NSTAC Testimony
John Eberhardt NSTAC TestimonyJohn Eberhardt NSTAC Testimony
John Eberhardt NSTAC Testimony
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
New enterprise application and data security challenges and solutions apr 2...
New enterprise application and data security challenges and solutions   apr 2...New enterprise application and data security challenges and solutions   apr 2...
New enterprise application and data security challenges and solutions apr 2...
 
Securing Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudSecuring Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the Cloud
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
data-leakage-prevention
 data-leakage-prevention data-leakage-prevention
data-leakage-prevention
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Chapter 2.pdf
Chapter 2.pdfChapter 2.pdf
Chapter 2.pdf
 
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareExplore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
 
finl.docx
finl.docxfinl.docx
finl.docx
 
Hortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your dataHortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your data
 
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
Data Science ppt for the asjdbhsadbmsnc.pptx
Data Science ppt for the asjdbhsadbmsnc.pptxData Science ppt for the asjdbhsadbmsnc.pptx
Data Science ppt for the asjdbhsadbmsnc.pptx
 
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...
 
Gse uk-cedrinemadera-2018-shared
Gse uk-cedrinemadera-2018-sharedGse uk-cedrinemadera-2018-shared
Gse uk-cedrinemadera-2018-shared
 

Plus de Liwei Ren任力偉

信息安全领域里的创新和机遇
信息安全领域里的创新和机遇信息安全领域里的创新和机遇
信息安全领域里的创新和机遇Liwei Ren任力偉
 
Introduction to Deep Neural Network
Introduction to Deep Neural NetworkIntroduction to Deep Neural Network
Introduction to Deep Neural NetworkLiwei Ren任力偉
 
移动互联网时代下创新的思维
移动互联网时代下创新的思维移动互联网时代下创新的思维
移动互联网时代下创新的思维Liwei Ren任力偉
 
非齐次特征值问题解存在性研究
非齐次特征值问题解存在性研究非齐次特征值问题解存在性研究
非齐次特征值问题解存在性研究Liwei Ren任力偉
 
Arm the World with SPN based Security
Arm the World with SPN based SecurityArm the World with SPN based Security
Arm the World with SPN based SecurityLiwei Ren任力偉
 
Extending Boyer-Moore Algorithm to an Abstract String Matching Problem
Extending Boyer-Moore Algorithm to an Abstract String Matching ProblemExtending Boyer-Moore Algorithm to an Abstract String Matching Problem
Extending Boyer-Moore Algorithm to an Abstract String Matching ProblemLiwei Ren任力偉
 
Near Duplicate Document Detection: Mathematical Modeling and Algorithms
Near Duplicate Document Detection: Mathematical Modeling and AlgorithmsNear Duplicate Document Detection: Mathematical Modeling and Algorithms
Near Duplicate Document Detection: Mathematical Modeling and AlgorithmsLiwei Ren任力偉
 
Monotonicity of Phaselocked Solutions in Chains and Arrays of Nearest-Neighbo...
Monotonicity of Phaselocked Solutions in Chains and Arrays of Nearest-Neighbo...Monotonicity of Phaselocked Solutions in Chains and Arrays of Nearest-Neighbo...
Monotonicity of Phaselocked Solutions in Chains and Arrays of Nearest-Neighbo...Liwei Ren任力偉
 
Phase locking in chains of multiple-coupled oscillators
Phase locking in chains of multiple-coupled oscillatorsPhase locking in chains of multiple-coupled oscillators
Phase locking in chains of multiple-coupled oscillatorsLiwei Ren任力偉
 
On existence of the solution of inhomogeneous eigenvalue problem
On existence of the solution of inhomogeneous eigenvalue problemOn existence of the solution of inhomogeneous eigenvalue problem
On existence of the solution of inhomogeneous eigenvalue problemLiwei Ren任力偉
 
Binary Similarity : Theory, Algorithms and Tool Evaluation
Binary Similarity :  Theory, Algorithms and  Tool EvaluationBinary Similarity :  Theory, Algorithms and  Tool Evaluation
Binary Similarity : Theory, Algorithms and Tool EvaluationLiwei Ren任力偉
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
Taxonomy of Differential Compression
Taxonomy of Differential CompressionTaxonomy of Differential Compression
Taxonomy of Differential CompressionLiwei Ren任力偉
 
Bytewise Approximate Match: Theory, Algorithms and Applications
Bytewise Approximate Match:  Theory, Algorithms and ApplicationsBytewise Approximate Match:  Theory, Algorithms and Applications
Bytewise Approximate Match: Theory, Algorithms and ApplicationsLiwei Ren任力偉
 

Plus de Liwei Ren任力偉 (20)

信息安全领域里的创新和机遇
信息安全领域里的创新和机遇信息安全领域里的创新和机遇
信息安全领域里的创新和机遇
 
企业安全市场综述
企业安全市场综述 企业安全市场综述
企业安全市场综述
 
Introduction to Deep Neural Network
Introduction to Deep Neural NetworkIntroduction to Deep Neural Network
Introduction to Deep Neural Network
 
聊一聊大明朝的火器
聊一聊大明朝的火器聊一聊大明朝的火器
聊一聊大明朝的火器
 
防火牆們的故事
防火牆們的故事防火牆們的故事
防火牆們的故事
 
移动互联网时代下创新的思维
移动互联网时代下创新的思维移动互联网时代下创新的思维
移动互联网时代下创新的思维
 
硅谷的那点事儿
硅谷的那点事儿硅谷的那点事儿
硅谷的那点事儿
 
非齐次特征值问题解存在性研究
非齐次特征值问题解存在性研究非齐次特征值问题解存在性研究
非齐次特征值问题解存在性研究
 
世纪猜想
世纪猜想世纪猜想
世纪猜想
 
Arm the World with SPN based Security
Arm the World with SPN based SecurityArm the World with SPN based Security
Arm the World with SPN based Security
 
Extending Boyer-Moore Algorithm to an Abstract String Matching Problem
Extending Boyer-Moore Algorithm to an Abstract String Matching ProblemExtending Boyer-Moore Algorithm to an Abstract String Matching Problem
Extending Boyer-Moore Algorithm to an Abstract String Matching Problem
 
Near Duplicate Document Detection: Mathematical Modeling and Algorithms
Near Duplicate Document Detection: Mathematical Modeling and AlgorithmsNear Duplicate Document Detection: Mathematical Modeling and Algorithms
Near Duplicate Document Detection: Mathematical Modeling and Algorithms
 
Monotonicity of Phaselocked Solutions in Chains and Arrays of Nearest-Neighbo...
Monotonicity of Phaselocked Solutions in Chains and Arrays of Nearest-Neighbo...Monotonicity of Phaselocked Solutions in Chains and Arrays of Nearest-Neighbo...
Monotonicity of Phaselocked Solutions in Chains and Arrays of Nearest-Neighbo...
 
Phase locking in chains of multiple-coupled oscillators
Phase locking in chains of multiple-coupled oscillatorsPhase locking in chains of multiple-coupled oscillators
Phase locking in chains of multiple-coupled oscillators
 
On existence of the solution of inhomogeneous eigenvalue problem
On existence of the solution of inhomogeneous eigenvalue problemOn existence of the solution of inhomogeneous eigenvalue problem
On existence of the solution of inhomogeneous eigenvalue problem
 
Math stories
Math storiesMath stories
Math stories
 
Binary Similarity : Theory, Algorithms and Tool Evaluation
Binary Similarity :  Theory, Algorithms and  Tool EvaluationBinary Similarity :  Theory, Algorithms and  Tool Evaluation
Binary Similarity : Theory, Algorithms and Tool Evaluation
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Taxonomy of Differential Compression
Taxonomy of Differential CompressionTaxonomy of Differential Compression
Taxonomy of Differential Compression
 
Bytewise Approximate Match: Theory, Algorithms and Applications
Bytewise Approximate Match:  Theory, Algorithms and ApplicationsBytewise Approximate Match:  Theory, Algorithms and Applications
Bytewise Approximate Match: Theory, Algorithms and Applications
 

Dernier

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Dernier (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Overview of Data Loss Prevention (DLP) Technology

  • 1. Copyright 2011 Trend Micro Inc.Classification 8/2/2013 1 Overview of Data Loss Prevention (DLP) Technology Liwei Ren, Ph.D Data Security Research, Trend Micro™ Sept, 2012, Tsinghua University, Beijing, China
  • 2. Copyright 2011 Trend Micro Inc. Backgrounds • Liwei Ren, Data Security Research, Trend Micro™ – Education • MS/BS in mathematics, Tsinghua University, Beijing • Ph.D in mathematics, MS in information science, University of Pittsburgh – Research interests • DLP, differential compression, data de-duplication, file transfer protocols, database security, and algorithms – Major works • N academic papers, M patents and K startup company where N≥10, M ≥12 and K=1 – TEEC member since 2005. – liwei_ren@trendmicro.com • Trend Micro™ – Global security software company with headquarter in Tokyo, and R&D centers in Nanjing, Taipei and Silicon Valley. – One of top 3 anti-malware vendors (competing with Symantec & McAfee) – Pioneer in cloud security with product lines Deep Security™, SecureCloud™ – Major DLP vendor after Provilla™ acquisition 2
  • 3. Copyright 2011 Trend Micro Inc. Agenda • What is Data Loss Prevention (数据泄露防护)? • DLP Models • DLP Systems and Architecture • Data Classification and Identification • Technical Challenges • Summary Classification 8/2/2013 3
  • 4. Copyright 2011 Trend Micro Inc. What Is Data Loss Prevention? • What is Data Loss Prevention? – Data loss prevention (aka, DLP) is a data security technology that detects potential data breach incidents in timely manner and prevents them by monitoring data in-use (endpoints), in- motion (network traffic), and at-rest (data storage) in an organization’s network. Classification 8/2/2013 4
  • 5. Copyright 2011 Trend Micro Inc. What Is Data Loss Prevention? • What drives DLP development? – Regulatory compliances such as PCI,SOX, HIPAA, GLBA, SB1382 and etc – Confidential information protection – Intellectual property protection • What data loss incidents does a DLP system handle? – Incautious data leak by an internal worker – Intentional data theft by an unskillful worker – Determined data theft by a highly technical worker – Determined data theft by external hackers or advanced malwares or APT Classification 8/2/2013 5
  • 6. Copyright 2011 Trend Micro Inc. What Is Data Loss Prevention? • The evolution of naming – Information Leak Prevention (ILP) – Information Leak Detection and Prevention (ILDP) – DLP • Data Leak Prevention • Data Loss Prevention Classification 8/2/2013 6
  • 7. Copyright 2011 Trend Micro Inc. DLP Models • A model is used to describe a technology with rigorous terms • We need models to define/scope what a DLP system should do • Three States of Data – Data in Use (endpoints) – Data in Motion (network) – Data at Rest (storage) Classification 8/2/2013 7
  • 8. Copyright 2011 Trend Micro Inc. DLP Models • The data in use at endpoints can be leaked via – USB – Emails – Web mails – HTTP/HTTPS – IM – FTP – … • The data in motion can be leaked via – SMTP – FTP – HTTP/HTTPS – … Classification 8/2/2013 8
  • 9. Copyright 2011 Trend Micro Inc. DLP Models • The data at rest could – reside at wrong place – Be accessed by wrong person – Be owned by wrong person Classification 8/2/2013 9
  • 10. Copyright 2011 Trend Micro Inc. DLP Models • A conceptual view for data-in-use and data-in- motion: Classification 8/2/2013 10
  • 11. Copyright 2011 Trend Micro Inc. DLP Models • Technical views for data-in-use and data-in-motion: Classification 8/2/2013 11
  • 12. Copyright 2011 Trend Micro Inc. DLP Models • DLP Model for data-in-use and data-in-motion: – DATA flows from SOURCE to DESTINATION via CHANNEL do ACTIONs • DATA specifies what confidential data is • SOURCE can be an user, an endpoint, an email address, or a group of them • DESTINATION can be an endpoint, an email address, or a group of them, or simply the external world • CHANNEL indicates the data leak channel such as USB, email, network protocols and etc • ACTION is the action that needs to be taken by the DLP system when an incident occurs Classification 8/2/2013 12
  • 13. Copyright 2011 Trend Micro Inc. DLP Models • DLP Model for data-at-rest Classification 8/2/2013 13
  • 14. Copyright 2011 Trend Micro Inc. DLP Models • DLP Model for data-at-rest – DATA resides at SOURCE do ACTIONs • DATA specifies what the sensitive data (which has potential for leakage) is • SOURCE can be an endpoint, a storage server or a group of them • ACTION is the action that needs to be taken by the DLP system when confidential data is identified at rest. Classification 8/2/2013 14
  • 15. Copyright 2011 Trend Micro Inc. DLP Models • These two DLP models are fundamental • They basically define the formats of DLP security rules (or DLP security policies) Classification 8/2/2013 15
  • 16. Copyright 2011 Trend Micro Inc. DLP Systems and Architecture • Typical DLP systems – DLP Management Console – DLP Endpoint Agent – DLP Network Gateway – Data Discovery Agent (or Appliance) Classification 8/2/2013 16
  • 17. Copyright 2011 Trend Micro Inc. DLP Systems and Architecture • Typical DLP system architecture Classification 8/2/2013 17
  • 18. Copyright 2011 Trend Micro Inc. Data Classification and Identification • One expects a DLP system can answer the following questions – What is sensitive information? – How to define sensitive information? – How to categorize sensitive information? – How to check if a given document contains sensitive information? – How to measure data sensitivity? • Data inspection is an important capability for a content- aware DLP solution. It consists of two parts: – To define sensitive data, i.e., data classification – To identify sensitive data in real time Classification 8/2/2013 18
  • 19. Copyright 2011 Trend Micro Inc. Data Classification and Identification • Sensitive data is contained in textual documents. • What does a document mean to you? • We need text models to describe a text: Classification 8/2/2013 19
  • 20. Copyright 2011 Trend Micro Inc. Data Classification and Identification • I prefer to use UTF-8 text model – Handling all languages, especially for CJK group. – A textual document is normalized into a sequence of UTF-8 characters • Four fundamental approaches for sensitive data definition and identification: – Document fingerprinting – Database record fingerprinting – Multiple Keyword matching – Regular expression matching Classification 8/2/2013 20
  • 21. Copyright 2011 Trend Micro Inc. Data Classification and Identification • What is document fingerprinting about? – It is a solution to a problem of information retrieval: • Identify modified versions of known documents • Near duplicate document detection (NDDD) – A technique of variant detection for documents • Extract invariants from variants of digital objects • Variant detection is a principle with 1-to-many capability Classification 8/2/2013 21
  • 22. Copyright 2011 Trend Micro Inc. Data Classification and Identification • Problem Definition (a model): – Let S= { T1, T2, …,Tn} be a set of known texts – Given a query text T, one needs to determine if there exist at least a document t ϵ S such that T and t share common textual content significantly. • Multiple documents are ranked by how much common content are shared. Classification 8/2/2013 22
  • 23. Copyright 2011 Trend Micro Inc. Data Classification and Identification • Alternative model: – Let S= { T1, T2, …,Tn} be a set of known texts – Given a query text T and X%, one needs to determine if there exist at least a document t ϵ S such that |T ∩t| /Min(|T|,|t|) ≥ X% • Multiple documents are ranked by the percentils. Classification 8/2/2013 23
  • 24. Copyright 2011 Trend Micro Inc. Data Classification and Identification • Solutions – Liwei Ren & el., US patent 7516130, Matching engine with signature generation – Liwei Ren & el., US patent 7747642, Matching engine for querying relevant documents – Liwei Ren & el., US patent 7860853, Document matching engine using asymmetric signature generation • Solution Highlights: – A document fingerprint is a textual feature that we extract from a given text which is a sequence of UTF-8 characters – A single document has multiple fingerprints – Uniqueness: Any two irrelevant documents should not have common fingerprints – Robustness: If two documents share significantly common texts, they should have common fingerprints. In other words, when a document has moderate changes , its fingerprints should have good probability to survive. – The key is to identify anchor points within text that can survive text changes. fingerprint can be generated from its textual neighborhood – The major part of the solution is a fingerprint generation algorithm. – Finally, we arrive at a fingerprint based search engine Classification 8/2/2013 24
  • 25. Copyright 2011 Trend Micro Inc. Data Classification and Identification • How to evaluate a fingerprint generation algorithm? – Accuracy in terms of false positive and false negative – Performance – Small fingerprint size that is required for an endpoint DLP solution – Language independence Classification 8/2/2013 25
  • 26. Copyright 2011 Trend Micro Inc. Data Classification and Identification • What is database record fingerprinting about? – Also known as Exact Match in DLP field – It is a technique to detect if there exist sensitive data records within a text. • Use Case: – We have several personal data records of <SSN, Phone#, address> that are included in a text, we want to extract all records from the file to determine the sensitivity of the file. • Example: Two data records < 178-76-6754, 412-876-6789, 43 Atword Street, Pittsburgh, PA 15260> & <159-87-8965, (408)780-8876 , 76 Parkview Ave, Sunnyvale, CA 94086 > are embedded in text in an unstructured manner. – Hhghghg 178-76-6754 ggkjkkkkk879-45-6785kjkjjk 43 Atword Street, Pittsburgh, PA 15260 kllkll 412-876-6789 kjkjjkj 76 Parkview Ave, Sunnyvale, CA 94086 hhjhjhj (408)780-8876 hjhjkjkjjj 159-87-8965hjhjhjhj Classification 8/2/2013 26
  • 27. Copyright 2011 Trend Micro Inc. Data Classification and Identification • Problem Definition : – Let S= { R1, R2, …,Rn} be a set of known data records of the same table. – Given any text T, one needs to extract all records or sub-records from T while the record cells may appear randomly within the text. • A solution: – Liwei Ren & el., US patent 7950062, Fingerprinting based entity extraction. Classification 8/2/2013 27
  • 28. Copyright 2011 Trend Micro Inc. Data Classification and Identification • Multiple keyword match and RegEx match – They are well-known & well-defined problems – Very useful in DLP data inspection • Problem Definition for Keyword Match: – Let S= {K1,K2,…,Kn} be a dictionary of keywords. – Given any text T, one needs to identify all keyword occurrences from T. • Problem Definition for RegEx Match: – Let S= {P1,P2,…,Pm} be a set of RegEx patterns. – Given any text T, one needs to identify all pattern instances from T. • Easy problems? – Not at all. For large n and m, one will have performance issue. – That’s the problem of scalability. – Scalable algorithms must be provided. Classification 8/2/2013 28
  • 29. Copyright 2011 Trend Micro Inc. Data Classification and Identification • Data inspection template and framework • The 4 different data inspection techniques need to work together – To meet various DLP use cases – Especially, the regulatory compliances. • For example, PCI needs the following Boolean logic supported by both keyword match and RegEx match: – SSN-Entity (2) OR [CCN(1) AND NAME(1) ] OR [CCN(1) AND Partial-Date(1) AND Expiration- Keyword ] – That is the PCI data template Classification 8/2/2013 29
  • 30. Copyright 2011 Trend Micro Inc. Data Classification and Identification • Data template framework: Classification 8/2/2013 30
  • 31. Copyright 2011 Trend Micro Inc. Data Classification and Identification • DLP rule engine works on top of both DLP models and data template framework: Classification 8/2/2013 31
  • 32. Copyright 2011 Trend Micro Inc. Technical Challenges • Some areas with challenges – Concept Match – Data Discovery – Document Classification Automation – Determined Data Theft Detection Classification 8/2/2013 32
  • 33. Copyright 2011 Trend Micro Inc. Summary • What DLP is about • DLP models • DLP systems • Text Models • Data template framework with – 4 data inspection techniques on top of a text model Classification 8/2/2013 33
  • 34. Copyright 2011 Trend Micro Inc. Q&A • Thanks for your time • Any questions? Classification 8/2/2013 34