• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Elementor #32036

January 24, 2025

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

April 16, 2024
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    It’s 2023 and Spotify Still Can’t Say When AirPlay 2 Support Will Arrive

    April 4, 2023

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Security»Why data loss prevention (DLP) matters in a zero-trust world
Security

Why data loss prevention (DLP) matters in a zero-trust world

October 10, 2022No Comments7 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Why data loss prevention (DLP) matters in a zero-trust world
Share
Facebook Twitter LinkedIn Pinterest Email

Learn how your company can create applications to automate tasks and generate further efficiencies through low-code/no-code tools on November 9 at the virtual Low-Code/No-Code Summit. Register here.


The security risks and breaches that legacy data loss prevention (DLP) contributes to are growing. Responsible for a rising rate of endpoint attacks and malicious insider attacks that sometimes happen accidentally, legacy DLP is a liability. In addition, enterprise tech stacks rely on endpoints to authenticate code repositories, cloud workloads, software-as-a-service (SaaS) applications and files — and many are left unsecured due to legacy DLP’s limitations. 

Virtual workforces are expanding and are creating new attack vectors that cybercriminals look for new ways to exploit. One weakness of legacy DLP is interestingly the greatest strength the enterprises need today: Treating every machine and human identity as a new security perimeter. 

With hybrid and remote workforces, employees are operating across a broader spectrum of networks from more locations than ever before. While legacy DLP protects data, it is not adequately protecting the fastest-growing threat vectors and increasingly complex endpoints. Enterprises are spending billions on DLP, according to CrowdStrike. The spending is predicted to reach over $6 billion by 2026. Unfortunately, many organizations do not see the ROI they expect from DLP solutions.

Why DLP isn’t keeping up with what enterprises need 

“Data loss prevention has suffered from a lack of innovation, and legacy tools have failed to live up to the promise of preventing breaches. At the same time, the endpoint has become the focal point for how data is accessed, used, shared, and stored,” said George Kurtz, cofounder, and CEO of CrowdStrike. 

Event

Low-Code/No-Code Summit

Join today’s leading executives at the Low-Code/No-Code Summit virtually on November 9. Register for your free pass today.

Register Here

He commented during his recent Fal.Con keynote that customers often complain about DLP and ask, “Can you help us, we got to get off this thing? We’re over a barrel by our current vendor because they keep charging us more money even though they haven’t done anything with it.”

See also  Intel's confidential computing solution for protecting cloud data is tested in healthcare

Forrester and Code42 collaborated on a report that found enterprises are frustrated with DLP and cloud access security broker (CASB) solutions which are not fully supporting their security requirements — including zero trust. DLP and CASB are often originally acquired to control users’ access to data and meet compliance requirements. 

Unfortunately, DLP systems have earned a reputation for being too difficult to implement and maintain and not offering additional security across the tech stack. They have also earned a reputation for triggering false alarms. The chronic labor shortage that is hitting the cybersecurity sector also makes finding experts with legacy DLP expertise a challenge.

Legacy DLP’s weaknesses start at the endpoint 

“Despite the growing risk to data via the endpoint, there has been very little innovation in the data protection market over the years. Practically, every customer conversation I have on data protection revolves around the failures of data loss prevention (DLP) technology and how it’s become a black hole with little return when it comes to security budgets,” wrote Michael Sentonas, CrowdStrike CTO. 

During CrowdStrike’s Fal.Con 2022 conference, the cybersecurity company’s customers detailed to VentureBeat their experiences with DLP and their plans for it in the future. Nearly every customer mentioned that DLP’s weaknesses — beginning with its reliance on a complex set of pre-configured rules and behavioral parameters —  are challenging to work with. 

Some CrowdStrike customers said that legacy DLPs’ most significant weaknesses are how they have been designed to protect data first, not the identity of data’s users. By designing a system focused on only protecting data, it is impossible to identify insider threats including privileged access credential abuse, social engineering attempts, and deliberate and unintentional system sabotage. 

See also  Cirotta stops hacking and data privacy invasions by putting security in a phone case

Malicious administrators and privileged users apply legacy DLPs to bypass and sometimes disable pre-configured rules and logic. Along these lines, innocent administrators who make mistakes configuring complex legacy DLP systems are often the leading cause of breaches. As CISOs and their teams attempt to protect more complex cloud configurations with DLP, the chances for an error multiply. In fact, Gartner predicts that through 2025, the cause of more than 99% of cloud breaches will be preventable misconfigurations or mistakes by end users.

Improving DLP with zero trust 

DLP must continue to evolve by designing zero-trust network access (ZTNA) into the platform’s core, enabling least privileged access to the data, device and identity level. Leading vendors in this area include Cloudflare DLP, SecureCircle, Microsoft, NetSkope, Spirion, Palo Alto Networks, Polar Security, Symantec by Broadcom, and others. 

“Almost all of the traditional data loss prevention products on the market ultimately force traffic to go through a central location, which impacts network performance,” said Matthew Prince, Cloudflare cofounder and CEO. 

Forcing traffic through a central location is table stakes for getting data loss prevention right. However, it still doesn’t guard against malicious and accidental breaches. Endpoint management must overcome DLP’s shortcomings by adopting ZTNA combined with least-privileged access for data, devices and identities. 

Additionally, the design goal is to protect data to and from the endpoint. CrowdStrike’s acquisition of SecureCircle brings together Falcon endpoint agents with the SecureCircle platform, ensuring device, identity and data security. Combining the two will enable organizations to enforce SaaS-based ZTNA and protect data on, from and to any endpoint. 

CrowdStrike Falcon zero-trust assessment (ZTA) performs continuous, real-time security and compliance checks of all endpoints, ensuring authentication and authorization are only granted to devices with strong security postures. ZTA scoring provides real-time security posture assessments regardless of location, network or user.
CrowdStrike Falcon zero-trust assessment (ZTA) performs continuous, real-time security and compliance checks of all endpoints, ensuring authentication and authorization are only granted to devices with strong security postures.
ZTA scoring provides real-time security posture assessments regardless of location, network or user.

CrowdStrike claims it acquired SecureCircle to provide its customers with an alternative to legacy DLP and to deliver zero-trust security across every endpoint, capitalizing on the global Falcon endpoint installed base. SecureCircle contributes to endpoints by authenticating every application, device, network and user before accessing secured data. By ensuring that device health and security posture meets requirements before data access, CrowdStrike Falcon ZTA eliminates the risks DLP solutions are known for — such as insider attacks and administrator errors inadvertently exposing infrastructure. 

See also  What is the key to protecting IoT devices at the network’s edge?  

CrowdStrike’s integration with SecureCircle makes it possible to revoke access to secure data when an endpoint has been compromised or is not secure. The company has also designed ZTA to revoke access to any requesting entity — device, file, system or identity — without requiring administrator intervention. 

Data classification is key to getting zero trust right

“Another core tenant of zero trust is the ability to automate & orchestrate, but with appropriate context (i.e., signals) for a more accurate response,” said Kapil Raina, vice president of zero-trust marketing at CrowdStrike. “This means the key elements of data security (such as data classification and policy enforcement at all locations) must be developed and enforced dynamically.  The legacy approach of manually tagging data and constantly updating policy rules does not work fast enough or accurately enough for modern attacks.”

 Legacy DLP is manually intensive, and policy rules need to be updated often to secure endpoints.  

Zero-trust frameworks being implemented by enterprises will continue to force the replacement of legacy DLP systems. Their limitations are a liability for any organization. 

When evaluating current DLP solutions, it is a good idea to look for those that provide content inspection, data lineage for greater classification and visibility, and incident response on a zero-trust enabled platform. 

At the center of a zero-trust-based approach to DLP is a well-defined data classification technology, which helps prioritize the most confidential data, making it more efficient in implementing a comprehensive ZTNA framework. A solid classification approach will also help with microsegmentation later in a zero-trust framework’s timeline.

Source link

data DLP loss Matters prevention World Zerotrust
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Google Mourns Veteran Engineer Luiz André Barroso Who Invented the Modern Data Center

September 22, 2023

Donald Trump’s Mug Shot Matters in a World of Fakes

August 25, 2023

The Most Popular Digital Abortion Clinics, Ranked by Data Privacy

August 21, 2023

The World Isn’t Ready for the Next Decade of AI

August 16, 2023
Add A Comment

Comments are closed.

Editors Picks

FTX’s money isn’t insured, FDIC says

August 21, 2022

Trans Researchers Want Google Scholar to Stop Deadnaming Them

September 2, 2022

Intel misplaced half a billion {dollars} final quarter, confirms value will increase, Optane shut down

August 1, 2022

Algorithms Allegedly Penalized Black Renters. The US Government Is Watching

January 17, 2023

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Elementor #32036

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.