Claims have been made that data loss prevention (DLP) is not the correct architecture for data security and that better control mechanisms need to be used.
Following his claims about everyone being a target, Shlomo Kramer, CEO of Imperva, went on to say that a second element of security is DLP but it is not enough to rely on for complete data protection.
Looking at the recent document release by WikiLeaks, Kramer said that this was a classic case of how control of data was lost.
He said: “You cannot control the data, so the whole revolution with endpoint devices is that you take them and try to control all of the channels but it is an impossible task and it is not going to happen. The problem is that you do not want information to leak but how do you control it? We have talked about the internal threat, controlling access to data from the data centre and being able to alert on unusual behaviour is another.
“If data leaves the data centre it needs to leave with a policy, essentially a digital rights management (DRM) that is focussed externally so when it is sent outside of an organisation via email, IM or via Facebook, it can go anywhere but it does not matter because it has a policy that controls who can use it. It contains revoke information and enables auditing of who opens it and has control over who has access. We are starting to see companies drive this sort of solution.”
He said that cloud-based DRM ‘is the right replacement for DLP' as a user can initially control the data at the data centre and once it leaves, it is continued to be controlled with DRM.
He said: “If you look at data taken, it is mostly taken from the data centre. What does it mean to have a firewall if your applications sit outside of your organisation?”
In a year that saw DLP releases from the likes of Check Point and Websense, while SC Magazine questioned if there had been a surge of interest in DLP following the introduction of fines from the Information Commissioner's Office, Kramer commented that there is the possibility to take a small business solution ‘upstream' or enterprise technology ‘downstream' depending on the customer needs.
He further commented that small-to-medium businesses do not have the right tools and that there is a ‘real gap not just with security, but integrated solution of security, performance acceleration and monitoring'.