The two distinct approaches to data loss prevention

Although many organizations are expanding security efforts, the number of identity theft incidents is still increasing. Every two seconds, someone becomes a victim of identity theft in America. Last year, identity theft tolls amounted to $100 billion.

The Federal Trade Commission reports identity thieves victimize 10 million Americans annually. Data Loss Prevention (DLP) has become a top priority for federal and state governments as well as industry regulators, whom have enacted laws with monetary fines, forcing organizations to improve protection of sensitive data.

Breached organizations suffer significant loss from a data leakage incident. According to a Ponemon Institute 2010 study, the total average cost of a data breach has reached $214 per record compromised. The average total cost per reporting company reached $7.2 million in 2010. Organizations now often pay for credit monitoring services for the impacted individuals. They will also suffer a damaged reputation because all security breaches must be publicly disclosed.

Two Common Approaches to Data Loss Prevention

Many organizations still don’t know how to tailor a data loss solution to fit their company’s needs. There are two approaches to information security to help alleviate the situation – “Data-at-Rest DLP” and “Data-in-Motion DLP”.

The Data-at-Rest (DAR) approach is growing in acceptance and is being adopted because of its ability to guard data at its source. This approach refers to data stored on computers, storage devices, or being used by the data owner. The Data-in-Motion DLP (DIM) solution refers to protecting data transmitted over a network. It is successful in preventing data from leaving the organization when individuals send information that is unprotected.

There is no instant cure or a single “silver bullet” for all types of threats. However, data loss can be prevented by understanding the most recurring breach type and enacting a solution to best treat the problem, as shown in the table below:

Threat --> common DLP process
Hacker (includes malware) --> Data-at-Rest
Digital Media (lost/stolen computers, backups, etc.) --> Data-at-Rest
Web Content --> Data-at-Rest, Data-in-Motion
Accidental Transmission (e-mail, etc.) --> Data-in-Motion
Physical Media (lost/stolen papers, etc.) --> Policy
Dishonest Insider --> Policy, Access Controls
Other/Unknown --> Access Controls

What’s Right for Your Organization?

Data-at-Rest solutions allow organizations to be proactive because the technology secures data at its source, preventing the majority of data loss problems. Advanced technologies allow core reporting on risk exposure, which can create an informative analysis showing the patterns over time. Knowingly or not, employees may have personal information stored in a variety of locations, including emails, databases, websites and desktop files. Organizations should periodically clean these systems to prevent data loss at the source.

Data-in-Motion solutions may stop the transmission or sending of information, but they don’t help the problem at the source. Additionally, employees may feel that this is intrusive or interferes with productivity, if the emails they try to send continually get blocked, for example.

Many enterprises are moving the responsibility for managing discovery and remediation efforts from the IT staff to the individual data owners. However, Data-in-Motion solutions usually require a centralized governing system that is run by an IT administrator. With Data-at-Rest solutions, administrators may have management, reporting and remediation capabilities from a centralized console, but are empowering employees not only to see the problem but also take action to fix it.

By transferring the processing power and remediation responsibilities to an entity’s data owner, the organization has the power to inform and educate its employees and positively influence their behavior. Some Data-at-Rest solutions provide users with options regarding how to handle private information once it is located, including the ability to digitally shred, encrypt, redact or quarantine it.

Data-at-Rest solutions help minimize exposure risk, and are often less costly than Data-in-Motion solutions. Data-in-Motion systems have higher ongoing maintenance costs, software costs, professional services costs and hardware costs. Minimum infrastructure requirements for these solutions typically cost from $25K-$150K. Professional services required to configure Data-in-Motion systems can be more costly than the software itself, and the higher level of configuration and customization desired by an organization, the higher the cost.

Solutions with only software and maintenance costs and minimal hardware requirements help maximize the investment. Data-at-Rest solutions can typically be installed on simple pre-existing hardware, and do not require IT professionals to configure and setup the technology. Total cost for a Data-at-Rest solution is often less than half the cost of installing a Data-in-Motion solution.

Protect Your Data, Your Reputation and the Bottom Line

According to research published by Privacy Rights Clearinghouse together with its "Chronology of Data Breaches", the most common data breaches occur from the loss of digital media (44 percent) and hackers (22 percent). These intrusions might have been avoided with a properly implemented Data-at-Rest approach to DLP, which would have secured or cleaned the information before the loss occurred. The “socially typical” types of data breaches, such as employees accidentally emailing sensitive data, account for around 6 percent of all data historically lost, showing they are not major sources of data breaching.

While implementing both Data-at-Rest and Data-in-Motion solutions may increase their protection, many IT departments do not have the budget for this. With the majority of data breaches occurring from unsecured Data-at-Rest, it is important to remember that this is the greatest threat, and therefore selecting a security solution that helps protect data at its source will provide the majority of organizations with the best protection for the investment.

About the author: Todd Feinman has over 15 years of experience in the security industry and is an internationally published author and media personality. He wrote Microsoft’s own reference book on securing Windows and McGraw Hill’s university textbook on managing the risks of electronic commerce. He has written dozens of articles and presented at numerous global conferences and television shows on the topics of identity theft, data leakage, security, and privacy. He is currently Identity Finder’s CEO and founded the company to help consumer prevent identity theft and help businesses prevent data leakage. Todd has a Master in Business Administration from Harvard Business School.

Loading