Data Leak Test
DLP Validation and Testing

 

Your public IP address is: 35.173.57.84; more info

Updated Feb 14, 2020

 

SSL is: off ; more info

Mega Test

POST Test

GET Test

Upload Test

Email Test

Industry Info

Session Info

About DLT

 

Planning ROI

where to start with your Data Security Project and how to keep it going

DLP ROI Matrix; helping Data Security survive in the Enterprise(preventing shelf-ware): -the matrix is designed to provide a high level overview of which technologies should be the focus of a new Data Security solution. We have seen millions if not billions of dollars go to waste from the sheer number of data security projects that have lost focus or failed to prove it's value. We recommend starting at Data in Motion, then incorporate Data in Use, followed by Data at Rest. The business will look at the ROI as an indicator of whether or not to focus resources on the Data Security project.

 

Where to start

Keys to Success [the golden rules of Data Security]

Methods/Channels

Policy Mapping to Business Processes

Data Security Tool Accuracy

Risk Reduction/ROI

Data-In-Motion (DIM)

Can the product fit to your business without interrupting good business transactions while protecting the data and preventing misuse? Required before phases II and III of the Data Security Deployment/ maturity Model.

Essential for mapping to the business and catching real events. Policies are ratcheted down for accuracy in phase I before moving into phase II of the Data Security Deployment/ Maturity Model

Phases II and III of the Data Security Deployment/ Maturity Model

Data-At-Rest (DAR) [*hint DON'T START HERE]'

Easy to find the data but you must engage the business to figure out why the data is there. The business processes are nearly impossible to uncover without extensive business involvement.

Easy to find data types with predefined policies and easy to make your own. Some companies think that the results from a DAR scan will help then define data but often have trouble sorting through the results they get from a DAR scan… requiring business involvement for clarity. Most find this process very time consuming.

Shelf-ware alert! ROI is very low and rarely moves out of Data Security phase I. Companies that lead with DAR often find Data Security results ineffective at demonstrating ROI. This makes it difficult to justify applying resources to DIM or DIU. Phase III is rarely accomplished with DAR.

Data-In-Use (DIU)

Insight into how data is used by applications and when not in the office. Required before phases II and III of the Data Security Deployment/ Maturity model.

Essential for mapping to the business and catching real events. Policies are ratcheted down for accuracy in phase I before moving into phase II of the Data Security Deployment/ Maturity Model

Phases II and III of the Data Security Deployment/ Maturity Model