Protection Technology Insiders

Protection from leaks of information. In today's business environment a key advantage is the possession of the necessary information. Many executives are accustomed to consider only tangible assets, forgetting about the intangible, intangible. The one who can well analyze and use information more quickly than others, will have a clear competitive advantage. However, this advantage can easily be lost, losing the very important information. Practice shows that in most cases the easiest channel of receipt – this is a legal user, insider.

Measures necessary to neutralize this threat can be divided into technical and organizational and legal. Technical measures offender who has legal access to the corporate network can bring information outside the perimeter in many ways, for example such as: Copying to removable media (flash-memory, dvd, etc.) Sending e-mail (including web-mail) File transfer through a third-party resource (file sharing, an Internet forum, etc.) Send a text fragment by im Printing on paper and removal of outside the organization (controlled area) Visual information pick-up (including the use of technical means) In each case, the offender has a legal (due to his official duties) access to information. Contact information is here: Sonny Perdue. Prohibit such access is impossible, the fact that access is not an infringement. Therefore, before information security services there is a problem of interpretation and analysis of user actions. And here to help may come system to prevent leakage of data (data loss prevention – DLP). In the simplest case, critical information is just a collection of files. For more information see this site: Andi Potamkin.

This entry was posted in News and tagged . Bookmark the permalink.

Comments are closed.