July 31, 2015 By Mark Wah 3 min read

The Data Breach Triangle

Too often, companies will invest in preventing the exploit through detection tools, identity and access management (IAM), vulnerability managers and so forth. But there’s not enough focus on core data security: encryption, data activity monitoring and data loss prevention, among other protection solutions. To have a balanced approach, you have to invest in all areas.

About Data Activity Monitoring and Data Loss Prevention

Let’s take a look at two complementary technologies: data activity monitoring (DAM) and data loss prevention (DLP).

DAM solutions should continuously monitor all data access operations in real time to detect unauthorized actions based on detailed contextual information — the who, what, where, when, and how of each data access. These solutions must be able to react immediately to prevent unauthorized access or suspicious activity by privileged insiders and potential hackers, plus automate data security governance controls in heterogeneous enterprises. With the right architecture, DAM can improve security and support compliance requirements through a set of core capabilities while also minimizing total cost of ownership.

Back in 2009 when DLP was the buzzword in the security industry, DAM and DLP shared the limelight. At the RSA Conference, main-stage talks were focused on DLP. Everyone thought it was the silver bullet for data security. But as time marched on, people realized it was a security pitfall – and that DLP alone was not sufficient enough. DAM and DLP needed to work together.

DAM and DLP certainly share some similarities: For example, both solutions focus on the data and its associated context, behavior and activity, in addition to content awareness. Both are well-suited in meeting compliance requirements like PCI, HIPAA and SOX.And both help with the involvement of line-of-business (LOB) owners.

But the offerings also have their differences. DLP is focused mostly on perimeter activities: the outbound network, endpoints, etc., while DAM focuses on the source of the organization’s crown jewels, usually in databases and data warehouses. DAM solutions have better visibility into the movement of sensitive data from the source to the next hop — applications, privileged users, spreadsheets, etc. DAM also includes the very granular context and behavior surrounding the data. Essentially, DLP concentrates on data at rest on database solutions, while DAM monitors data at rest, access and usage through SQL transactions, privileged users, etc., and even applies DLP concepts by blocking, masking or quarantining risky traffic.

A Porous Security Perimeter and Data Security

The modern-day perimeter has become extremely difficult to secure due to IT mega trends around cloud, mobile and big data, and first generation DLP capabilities simply have not kept up with some of the challenges. Businesses need a solution that includes current techniques and is able to integrate with DAM. It’s important to choose the DAM technology that can keep up with recent mega trends, work in real time and enable you to deploy with the least amount of overhead.

Learning about the most common data protection pitfalls can help organizations recognize their security weaknesses and improve their defenses. Watch the on-demand webinar “It’s 2 a.m.: Do You Know Who’s Accessing Your Sensitive Data?” to learn more about securing your critical assets and preventing data breaches with core data security.

More from Data Protection

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

SpyAgent malware targets crypto wallets by stealing screenshots

4 min read - A new Android malware strain known as SpyAgent is making the rounds — and stealing screenshots as it goes. Using optical character recognition (OCR) technology, the malware is after cryptocurrency recovery phrases often stored in screenshots on user devices.Here's how to dodge the bullet.Attackers shooting their (screen) shotAttacks start — as always — with phishing efforts. Users receive text messages prompting them to download seemingly legitimate apps. If they take the bait and install the app, the SpyAgent malware gets…

Exploring DORA: How to manage ICT incidents and minimize cyber threat risks

3 min read - As cybersecurity breaches continue to rise globally, institutions handling sensitive information are particularly vulnerable. In 2024, the average cost of a data breach in the financial sector reached $6.08 million, making it the second hardest hit after healthcare, according to IBM's 2024 Cost of a Data Breach report. This underscores the need for robust IT security regulations in critical sectors.More than just a defensive measure, compliance with security regulations helps organizations reduce risk, strengthen operational resilience and enhance customer trust.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today