The virtual desktop or application

desktop or application With this approach, the task of controlling the transfer of corporate data to remote computers and mobile devices from terminal and virtual environments should be solv. The DLP system here should ensure control of the data flow between and peripheral devices rirect from remote work computers, including removable drives, printers, USB ports and data clipboard, as well as network communication channels available to the user on the terminal server side. In addition, centraliz logging of user actions, shadow copying of the data transferr by them, and alarm notifications in the event of security incidents should be provid.

If a DLP system can guarantee that desktop or application

The transfer of restrict access special lead data by the user is strictly within the boundaries of the virtual environment (terminal session) and data whose leakage is unacceptable does not reach the personal part of a personal device (from a thin client or home computer to a mobile device of any type), while remaining accessible for the effective execution of business tasks, then control of mobile access to corporate data can be consider successfully implement, believes Mr. Vakhonin.

DLP and Big Data

Modern DLP systems, according to our experts, have been successfully using big data technologies for a long time. This primarily applies to the segment of large structures that ne DLP systems to work with large volumes of data, and these requirements have been identifi almost from the very inception of DLP.

As for big data analysis technologies bas on

BI (Business Intelligence), they, as Mr. Klevtsov notes, are now being actively implement in DLP systems, which allows for analytics, correlations and visualization of large volumes of data in a split second. By processing such alinear las expectativas antes de cualquier negociaciĆ³n data, the DLP system identifies incidents that have occurr, helps analyze suspicious activities and identify potential threats. “In the future, analytical modules of DLP systems bas on the analysis of a large number of generat events afb directory will create certain patterns – ready-made solutions (for policies, protection perimeter, potential threats, incident verdicts, etc.) for various business verticals,” Mr. Klevtsov believes.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top