Comprehensive software reviews to make better IT decisions
Zecurion Offers Flexible Rules and Data Discovery Tool to Boost DLP Outcomes
Zecurion DLP offers a robust set of features, including optical-character and voice analysis (for images and recordings, respectively), but equally attention-grabbing is the level of granularity that can be applied to Zecurion’s rules configuration.
The Zecurion platform comes preloaded with the kinds of things you expect like predefined setups to assist with compliance-related DLP needs – such as HIPAA, PCI DSS, and GDPR – and a flexible rules creation/customization process, which allows you to account for any exceptions or special cases where the standard rule won’t do.
Zecurion also has some features you might not expect, like a data discovery tool to help you find sensitive data that has been improperly stored and block its transmission. The combination of this discovery tool with the rules flexibility is something seems to set Zecurion apart from other DLP solutions.
This is because this combination of sensitive data discovery and transmission block, and flexible rules, helps users with one of the biggest challenges for getting a successful DLP program up and running: data classification.
Zecurion does not eliminate the need for data classification, but it does give users an edge. The ability to find misplaced sensitive data and then have flexible rules for how to deal with it could be used as a stopgap solution while a proper (and manual) data classification initiative is still in the works.
Data classification should be the bedrock of any data loss-prevention program because it provides a simple and effective basis for creating data handling rules. That is, metatag applied to the data indicates what can and cannot be done with it, so the rules-creation process simply captures what was already decided during classification.
However, Zecurion’s rules-creation flexibility and data discovery capabilities could help organizations that do not yet have a full classification process in place. In most cases, this would entail creating rules around individual data types rather than classification levels, meaning that such rules may become rather complicated.
Yet this is certainly better than no rules at all, making Zecurion is a worthwhile option for organizations that need to implement a DLP solution immediately.
Want to Know More?
Qualys and Ivanti Partnership Boasts an Incredibly Robust Vulnerability Management Platform
Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.
Remote Work Landscape Pushes Microsoft to Releases Endpoint DLP and Double Key Encryption Features for Added Data Security
Microsoft recently previewed the specific features to tackle data security and risk management for end users with Microsoft Endpoint Data Loss Prevention (DLP) and Double Key Encryption. The reason for the launch? The increasing shift towards a remote work environment and a need to mitigate the accompanying risks.
IBM Raises Price on Software Support; Shoves Customers Toward the Cloud
IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.
RiskSense Releases a Unified Infrastructure Security Risk Management Program
RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.
DeviceLock Acquired by Cyberprotection Vendor Acronis
To bolster and broaden its data privacy capabilities for end users, cyber and data protection vendor Acronis has acquired DLP player DeviceLock. The acquisition aligns with the increasingly prevalent role that data privacy plays in cybersecurity.
Address the Root of Your Vulnerabilities in a Resource-Tight Period
Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.
Kenna Security Releases Tool for the Custom Benchmarking of Vulnerability Management Programs
On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their vulnerability management programs to industry averages Kenna Security has compiled over the years.
How Will Work From Home Change Vulnerability and Patch Management for Businesses in the Future?
COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.
GTB Technologies Adds Multi-Tenancy to DLP SDK
GTB Technologies, a smaller vendor known for dedicating itself solely to DLP solutions, has introduced a new multi-tenancy feature for its SDK that aims to improve quality and efficiency for DLP-integrated application development.