4th Generation Data Leak Prevention

'4th Generation DLP' The robust technology is far more accurate in identifying false positives, false negatives and is immune to evasion that is found in DLP “fingerprinting” approaches. The algorithm enables correlation at the semantic level and is not susceptible to “lexical” variations in documents. The approach resists commonly used evasion techniques including rewording, regeneration and re-positioning of content as well as the copy, cut & paste functions of content. Even unstructured documents that have not been pre-identified as security vulnerability, but still contain information or content with a high security value, can be easily identified and protected in real-time. In addition 4th generation DLP has a powerful policy synthesis engine, where it automatically assigns level of user authority to the user based on the organization. nexTier Networks Inc. is one company that has developed a 4th Generation DLP solution that uses a Security-Semantic Co-Relation and indexing (S2 COREX) algorithms. The technology enables the analysis of data in real-time based on the security value of data, with minimal or no human intervention required. Furthermore, it scales the accuracy and speed deficiencies of conventional DLP. Such technology prevents data loss by discovering data wherever it is located across an enterprise, analyzing that data and determining the data’s security value to the business. Much in the way that DNA is used to identify humans, algorithms interpret the unique DNA of data, correlates that information to security policies and uses that signature as a means of enforcing security policies against that data.
2nd Generation DLP
Focused on structured data or the data having particular format or pattern for instance telephone number, social security number or a credit card number. The technology used for pattern matching is called ‘Signature Matching ‘or Regular Expressions <ref name=autogenerated2 />. DLP’s in this generation mainly focused on the Payment Card Industry (PCI).
3rd Generation DLP
Majority of data has no format or structure. To support the unstructured data like pdf, text files or emails, in this generation the DLP’s used finger printing technology, where the patterns or tagging of the data is created for each documents.
 
< Prev   Next >