Modern DLP systems store large

systems store large Over the past two years, notes Ms. Krasova, there has been a clear shift in focus from leak detection to investigation of relat incidents. volumes of traffic data, and in the event of an investigation, information about the entire pool of communications becomes available, including those in which security policies were not violat. It has become possible to obtain data slices by persons, information objects, build information flow routes, connection graphs, identify anomalies in employee behavior (a scoring indicator of the “trust level”), etc., and all this happens in real time thanks to quick search mechanisms.

To work effectively with big data systems store large

Mr. Kabataev emphasizes, a DLP telegram data system must be scalable to support the working rhythm of business processes. He claims that any industrial DLP system scales horizontally to solve such problems. Big Data class systems also have capabilities for horizontal scaling and clustering, special file systems for virtually unlimit growth in the volume of process data, a distribut data processing model, etc.

However, it is necessary to take into

account the current growth rates of data volumes, in direct proportion to which the time of processing, searching and blocking them through leakage channels increases. As a result, large delays may be observ in the operation of DLP systems, which negatively affect business processes. Perhaps in the future, with the development of machine learning technology, it will be possible to optimize the functionality of these systems, their spe and efficiency, Mr. Kabataev believes.

Prospects and difficulties of technological development and practical use

As our experts note, DLP system afb directory developers continue to expand the coverage of possible leak channels (starting with the most dangerous ones), work to ruce the number of false positives, intelligence and ease of maintenance as mobility penetrates deeper into to minimize the time requir to make decisions, continue to combat encrypt traffic of modern messengers, release agents that allow monitoring of widely us operating systems.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top