Air Gap Data Protection

Among all the methods for securing digital data, the policy of air-gaping is certainly the most extreme.

Drastic Measures

As it’s name would imply, air-gaping is a security protocol that physically isolates a machine from a network.   Air-gaping most commonly involves cutting off a computer from the World Wide Web, but it can also be used to separate a machine from local area networks (LANs) as well.  This form of air-gaping means that a computer is completely disconnected from any other device and is usually reserved for machines containing extremely sensitive data.

 

Understandably, air-gaping is mostly implemented in industries that deal with high value information.  Systems that use air-gap security protocols include nuclear power plant controls, military networks, and computerized medical equipment.   However, many private firms have also been known to utilize air-gaping to secure their more sensitive data assets.

 

In addition to minimizing threats of malware and other attacks that can damage a network, air-gaping goes a long way in preventing data loss.  The digital avenues by which data normally leaves a machine are all closed off for an isolated computer.

But air-gaping is far from full proof.

 

The Impenetrable Wall?

 

Over the recent period–the past two years specifically–researchers have been uncovering more and more ways by which air-gaped computers can be breached.  Some of these techniques are rather creative. Unconventional channels such as noise, LED light signals, and even changes in temperature emanating from a machine, have all been used to extract data from computers completely detached from any network.

 

While many of the methods involve sophisticated hacking methods and equipment, there are also much more simple ways of attacking an air-gaped machine.  Even a computer in isolation can have information physically extracted by someone with direct access to it. And it is this risk that administrators need to worry about the most.   The modern work space is an environment with dozens or even hundreds of employees with constant access to work stations. The possibility of a user pulling data with a CD, flash drive, or other USB device, presents a clear and actual risk.

 

Preventing Data Loss the Smart Way

 

Instead of resorting to the extreme measure of physically isolating machines, administrators can secure their data from exfiltration the smart way.

 

GTB’s Data Protection That Works offers the highest assurance in data loss prevention. GTB’s solutions provides a fully scalable, user friendly platform to make sure companies keep a handle on their most important information assets–where the data is and where it’s going.

With GTB technology, businesses can bring security to their data environment without resorting to methods that will, overall, impede their operations.

Visibility: Accurately, discover sensitive data; detect and address broken business process, or insider threats including sensitive data breach attempts.

Protection: Automate data protection, breach prevention and incident response both on and off the network; for example, find and quarantine sensitive data within files exposed on user workstations, FileShares and cloud storage.

Notification: Alert and educate users on violations to raise awareness and educate the end user about cybersecurity and corporate policies.

Education: Start target cyber-security training; e.g., identify end-users violating policies and train them.

  • Employees and organizations have knowledge and control of the information leaving the organization, where it is being sent, and where it is being preserved.
  • Ability to allow user classification to give them influence in how the data they produce is controlled, which increases protection and end-user adoption.
  • Control your data across your entire domain in one Central Management Dashboard with Universal policies.
  • Many levels of control together with the ability to warn end-users of possible non-compliant – risky activities, protecting from malicious insiders and human error.
  • Full data discovery collection detects sensitive data anywhere it is stored, and provides strong classification, watermarking, and other controls.
  • Delivers full technical controls on who can copy what data, to what devices, what can be printed, and/or watermarked.
  • Integrate with GRC workflows.
  • Reduce the risk of fines and non-compliance.
  • Protect intellectual property and corporate assets.
  • Ensure compliance within industry, regulatory, and corporate policy.
  • Ability to enforce boundaries and control what types of sensitive information can flow where.
  • Control data flow to third parties and between business units.