Data Filtering Support for Data Loss Prevention (DLP) Solutions

admin | January 17th, 2018 | Data Loss Prevention

More and more organizations have already moved to the cloud services with much more seriously thinking of moving to cloud. The cloud services help organizations increase their productivity, manageability, and scalability. But with the advantages come the perils of it. Data breaches are the disadvantages associated with it and if apt data security measures are not in place then there is every possibility that your sensitive data in the cloud is subject to cyber attack. Learn about different data filtering support for DLP solutions.

What is Data Filtering?

The Data Loss Prevention (DLP) policies include the CASB (Cloud Access Security Brokers) which effectively helps the organizations to secure their data on the cloud network. Data filtering is one such security protocol that helps organizations to refine their data sets for data security solutions. Data filtering is essentially refining the data to present to the user only what is needed and filter out the data that is sensitive, irrelevant or maybe repetitive.

Where is Data Filtering Used?

Different kinds of data filters can be implemented based on the needs of your organization to amend reports, queries, and other information results. Data Filtering Profiles helps in preventing the confidential and proprietary data from leaving the network. For example, a data filtering program could hide or erase social security numbers or credit card numbers from the complex client data reports coming into the employee’s desk or to their mobile device. With the ongoing movement of Bring Your Own Device (BYOD) in organizations across the globe, it becomes all the more important that strict data filtering policies are enforced to solve the security issues related to information that lands up in the employee’s device.

How Do You Set Up Data Filtering?

To set up data filtering, you need to first create a data pattern to define the sections of data for which the firewall and security protocols are required. There are pre-defined patterns and inbuilt settings which are helpful to you in designing your custom-based patterns for filtering. Pre-built patterns include filtering on document title and author in file properties or in social security and credit card numbers. You can add more such data patterns to your Data Filter profile and then attach this created profile to a security policy rule and enable the data filtering.

When using third-party DLP services, file properties are used to indicate sensitive content and then the data filter enables the firewall so that your DLP policy is enforced. So first you need to create a custom pattern to identify the file properties and values. These are then tagged to the DLP solution so that the files are blocked through the Data Filter profile based on that pattern.

Also, data filtering can be applied to various departments or a specific group or individual depending on the scenario. Different patterns can be created as per the need of each department so that the other sensitive data is masked or filtered thus preventing sensitive data from being passed on to unauthorized users in an organization.

Thus there are three methods to set up data filtering-

  1. Built-in settings allow you to enable the firewall that scans specific values and defined file properties.
  2. You can customize and add new features to the built-in pattern to create data filtering protocol that suits your business needs.
  3. The third-party DLP solutions for data filtering helps your organization to create customized patterns based on the requirements.

What Are The Types of Data Filtering?

A data filter first uses different techniques like the document fingerprinting, file filtering etc to examine the network traffic. After configuring the filter, it is added to a sensor. Sensors do the work of combining different filters to meet the organizational requirements. The configured sensor is now added to the network security policy where it examines the network traffic as defined in the data filter.

  • Document fingerprinting– Also known as the checksum fingerprint, this can be used to catalog and track different documents.
  • DLP Watermarking– A single digital reading pattern is used to identify and monitor multiple documents may be related to a project or so. The data filter detects watermarked documents and prevents them from being stolen.
  • Pattern Matching– Files and messages are examined for specific pre-defined patterns and if the matching is found, this document is prohibited from leaving the network.
  • File filtering– Here files are filtered on the basis of certain parameters like size, name, type etc.

Data filtering is an important DLP solution and cannot be ignored by organizations if they need to safeguard their data from a data breach.