DLP and DSPM: Navigate policy challenges and quiet alert noise

<p>At a data security seminar in July, I had the opportunity to sit down with practitioners and talk about data loss prevention challenges and how <a href=”https://www.techtarget.com/searchsecurity/definition/data-security-posture-management-DSPM”>data security posture management</a> connected to their <a href=”https://www.techtarget.com/whatis/definition/data-loss-prevention-DLP”>DLP</a> strategies. The challenges these defenders said they struggled with underscored research that Enterprise Strategy Group, now part of Omdia, published earlier this year — but had some interesting tactical nuances.</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<p>Every organization needs to take steps to avoid data loss, albeit with differences in what comprises sensitive data. Compliance drove practitioners from one large California enterprise, with revenue north of $10 billion, to protect against data leakage. The two major challenges they faced revolved around policy consistency across their DLP stack and reducing alert noise.</p>
<p>Their sentiments echoed those in the Enterprise Strategy Group report “<a href=”https://research.esg-global.com/reportaction/515202031/Toc”>Reinventing Data Loss Prevention</a>.” One-third of respondents said they were frustrated with establishing, managing and tuning DLP policies, and 31% expressed frustration around investigations and gathering context around potential true-positive DLP alerts.</p>
<p>I mentioned in an <a href=”https://www.techtarget.com/searchsecurity/opinion/DLP-in-the-GenAI-Era-Shadow-data-and-DLP-product-churn”>earlier article</a> that most enterprises take a portfolio approach to DLP and have an average of six different DLP tools. Their DLP policy experience reflected what we found in our research, with 61% of respondents saying they have a common set of policies across the entire DLP environment, whether with a single or multiple tools.</p>
<section class=”section main-article-chapter” data-menu-title=”Technology flux and swapping out DLP tools”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Technology flux and swapping out DLP tools</h2>

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: