You are here


Data Loss Prevention across the Enterprise

Posted by Tejaswini Vadrevu
ensuring data loss prevention across the enterprise

Data Loss or Data Leak Prevention, more commonly known as DLP, has been around a long time and it doesn’t take a computer scientist to understand why. As data breaches continue to occur in increasing frequency and sophistication, interest in DLP technology has exploded. According to Forrester Research, 63% of North American and European enterprises in 2016 had implemented or were implementing DLP solutions and suites, compared to only 44% in 2015. As data breaches increase in frequency and sophistication, DLP may represent the last line of defense in protecting an organization’s sensitive data. Could DLP technology have prevented the access and leak of sensitive information on the CIA’s network? We’ll never know for sure but it’s likely current and widespread use of the technology would have made the leak more difficult.

Employing data analysis to monitor, detect and block sensitive content when it is in-use, in-transit, and at-rest prevents the inadvertent disclosure or mishandling of confidential data, either intentionally (by a hacker) or unintentionally (by a careless employee). DLP technology not only helps prevent data leakages, but it can also provide organizations visibility into who has access to sensitive data and when that sensitive data is accessed and shared. A proper DLP solution includes centralized management, policy creation, and enforcement workflow, all focused on monitoring and protecting content and data. As a result, the DLP function significantly enhances an organization’s ability to classify, manage, understand and, of course, protect their most sensitive content.

Given the current threat landscape and the critical role DLP plays in preserving enterprise content, it should be clear that if your organization doesn’t have a DLP solution, it should. And if your organization does have a DLP solution, you shouldn’t purchase any enterprise software that doesn’t support your DLP solution and processes – particularly if that software accesses, shares or stores sensitive enterprise content.

This is easier said than done. Safeguarding content from data loss is complicated by the fact that modern enterprises have content stored in lots of different on-premises and cloud-based systems, such as Office 365, SharePoint, Windows File Shares, Box, and many more. While storing content on one platform isn’t realistic, neither is expecting consistent DLP functionality across all of these systems.

Accellion recognizes this complexity as well as the need for standardized DLP capabilities across all content systems. Accellion’s content collaboration platform, kiteworks, is singularly capable of integrating with any enterprise’s DLP solution to scan every file uploaded to and downloaded from an on-premises or cloud-based enterprise content management (ECM) system. With kiteworks, enterprises can connect to any DLP server that supports the ICAP protocol, including Symantec (Vontu), Websense Triton AP-DATA, and Code Green, to enhance their data security. In addition, by using kiteworks’ central policy management system, enterprises can be assured that policies and rules are uniformly enforced across all content systems. The files are consistently and efficiently screened with the same criteria, enhancing an enterprise’s efforts to protect all of its content from the risk of data loss.

Beyond DLP integration, organizations have an extensive list of security capabilities to tap into with kiteworks. Anti-virus scanning on file uploads and downloads, secure file sharing and collaboration, remote wipe, file/folder expiration, content encryption and encryption key ownership are just some of the content security capabilities available. In addition, the ability to access, edit, share and collaborate on content using any device, from any location, dramatically increases workflow efficiency.

To learn more about kiteworks and DLP scanning of enterprise content, regardless of where it is stored or how it is accessed, please contact us.