The two distinct approaches to data loss prevention

Comparing data-at-rest to data-in-motion security procedures

Data-at-Rest solutions help minimize exposure risk, and are often less costly than Data-in-Motion solutions. Data-in-Motion systems have higher ongoing maintenance costs, software costs, professional services costs and hardware costs. Minimum infrastructure requirements for these solutions typically cost from $25K-$150K. Professional services required to configure Data-in-Motion systems can be more costly than the software itself, and the higher level of configuration and customization desired by an organization, the higher the cost.

Solutions with only software and maintenance costs and minimal hardware requirements help maximize the investment. Data-at-Rest solutions can typically be installed on simple pre-existing hardware, and do not require IT professionals to configure and setup the technology. Total cost for a Data-at-Rest solution is often less than half the cost of installing a Data-in-Motion solution.

Protect Your Data, Your Reputation and the Bottom Line

According to research published by Privacy Rights Clearinghouse together with its "Chronology of Data Breaches", the most common data breaches occur from the loss of digital media (44 percent) and hackers (22 percent). These intrusions might have been avoided with a properly implemented Data-at-Rest approach to DLP, which would have secured or cleaned the information before the loss occurred. The “socially typical” types of data breaches, such as employees accidentally emailing sensitive data, account for around 6 percent of all data historically lost, showing they are not major sources of data breaching.

While implementing both Data-at-Rest and Data-in-Motion solutions may increase their protection, many IT departments do not have the budget for this. With the majority of data breaches occurring from unsecured Data-at-Rest, it is important to remember that this is the greatest threat, and therefore selecting a security solution that helps protect data at its source will provide the majority of organizations with the best protection for the investment.

About the author: Todd Feinman has over 15 years of experience in the security industry and is an internationally published author and media personality. He wrote Microsoft’s own reference book on securing Windows and McGraw Hill’s university textbook on managing the risks of electronic commerce. He has written dozens of articles and presented at numerous global conferences and television shows on the topics of identity theft, data leakage, security, and privacy. He is currently Identity Finder’s CEO and founded the company to help consumer prevent identity theft and help businesses prevent data leakage. Todd has a Master in Business Administration from Harvard Business School.