Insider Threats and Data Loss Prevention
A common means of attempting to control insider threats is through Data Loss Prevention software.
Unfortunately, there is no one clearly superior method for implementing Data Loss Prevention.
I'm happy to offer to my readers a free research report on different Data Loss Prevention techniques from the Aberdeen Group.
The ideal approach to security and compliance is like the ideal referee: one that makes good calls and enforces the rules regarding safety and fair play, but generally doesn't get in the way of the people playing the game. In its fifth annual study on best practices in data loss prevention (DLP), Aberdeen analyzed and compared the results from more than 600 organizations which have adopted one of four distinct approaches to the operational use of DLP technologies. The best approach, in terms of balancing enterprise risk and reward, is like the children's fairy tale of Goldilocks and the Three Bears: the bed we choose to lie in should be neither too soft (Do Nothing, Monitor / Notify), nor too hard (Stop / Go), but just right (Adapt / Protect).
Access Your Complimentary Copy Today. This $399 Value Offer Expires 01/09/2012