Customer profile
We recognise that cyber threats are a daily reality in every society. Every day, we work with the data of 300,000 customers and hundreds of employees whose security we care about. AUTOCONT has helped us eliminate the threat of data leakage with our data loss prevention (DLP) system, so our employees and customers can feel safe.
Baseline and project objectives
Benefits
- Monitoring and protection of sensitive company data with the ability to track and control where and from where the data flows
- Search for sensitive data according to different rules
- Educational and preventive impact on user/employee behaviour
Solution
The basis of DLP is the classification of sensitive data. Classification can be performed using different methods. In content-based data classification, the DLP agent searches for sensitive data in a document as the user works. Next is contextual data classification, which, regardless of content, indicates data types, size or location to fingerprint methods or machine learning. The correct choice of classification method, the piecing together of different classifiers in classification rules, the definition of thresholds or exceptions then creates a complex classification scheme that allows for very accurate detection of corporate data that needs to be protected.
Applications in the company
At CENTROPOL ENERGY, we have a data classification set up along the following lines. The classification covers all sensitive data of the company, both in terms of data content classification and data context classification. Both sensitive company data and certain types of files, including encrypted data, are monitored. Rules are set to detect sensitive company data as accurately as possible. This is done both by building different classifiers within the rule and by using thresholds to trigger the classification.
The DLP policy then determines how data leaving the user's computer will be treated. Sensitive data is monitored, sanitized and possibly blocked through the various communication channels. We handle this based on the user's affiliation in the workgroup, the method of communication, or the sensitivity of the data. We monitor and protect all available communication channels, starting with email, uploads to web portals, storage on USB drives, printing, IM systems, cloud services or FTP data transfer and print screen. You can always choose how the DLP agent treats certain types of data and communication channels. Internal communication is usually monitored. Sensitive data that leaves the company is already subject to more control. For some, a warning is set and a justification is requested as to why sensitive data is sent by authorized users. This method very significantly reduces data leakage from the company without the need for blocking - the user knows that his activity is being monitored and bears full responsibility.
DLP as a silent agent
It is necessary to add here that the DLP system does not restrict the user in his work, whether it is creating documents, editing or deleting them, or exchanging data between co-workers or partners, but protects the data in case of their unwanted sending outside the company, whether wanted or unwanted, caused for example by user error.
Deploying DLP is not a simple process and requires both knowledge of the environment of the data to be protected and knowledge of the DLP technology to be deployed. That is why we chose a technology partner for the deployment and subsequent maintenance of the DLP system, which, based on the company's requirements, was able to deploy the DLP system with the greatest possible accuracy and maintain it during the changes that occur from time to time in any company - new types of data, new technologies or new ways of communication. If you are interested in DLP technology, find out more in this product fact sheet.
Used technologies
- Forcepoint DLP Endpoint
- Forcepoint DLP Discover
DO NOT HESITATE TO
CONTACT US
Are you interested in more information or an offer for your specific situation?