62 percent of organizations not confident they can prevent data loss

In shocking findings, the majority of cybersecurity professionals admit they are not confident in their ability to prevent data loss.

Preventing Data Exfiltration with Anti Data-Exfiltration (ADX that Workstm)

In shocking findings, the majority of cybersecurity professionals admit they are not confident in their ability to prevent data loss.

In a recent paid survey, conducted by Ostermann Research, over 250 data security experts were asked if they could confidently defend the networks they are responsible for from attacks designed to exfiltrate data.

An astounding sixty percent lack confidence in the ability of their security tools to prevent data loss.

This is not due to a lack of awareness.

The data loss problem has been an increasingly growing concern in the world of IT. Of the participants, nearly three-quarters of them recognized the importance of preventing data loss–up from a mere thirty-nine percent in a similar survey a year ago.

As the risk of data loss continues to rise due to a full range of dangers–from insider threats to ransomware attacks–security professionals today are deeply concerned about addressing this issue.

The Failure of Traditional DLP

It seems, however that most of the current tools out there, are just not cutting it.

Often clients will complain about configuration complexity, despite the users being seasoned IT experts. Similarly, demanding maintenance, complex deployment even after the platform is set up, are all commonly heard in the DLP space.

Then there’s simply the issue of efficacy.

If a DLP system can’t detect malicious activity, are produces so many false positives that real threats from false alarms become indistinguishable, then the platform can’t perform its job.

This has led many companies into a struggling-in-the-dark scenario where huge amounts of enterprise resources, in both money and manpower, are spent on burdensome systems that do not deliver in the real world.

Some in the cyber industry have begun calling for a new approach to DLP, one that can account for the emerging threats to enterprise data. The term ADX (Anti-Data Exfiltration) or SDX (Stop Data Exfiltration) has become a bit of a buzzword in the IT world as of late.  In the ADX / SDX model, systems would deploy active measures to detect and block the ‘kill-chain’ of deceptive malware and prevent the attacking program from executing its commands on the system. This method, the advocates say, is the only one that can defend against ever-advancing cyber threats that have already proved too elusive for most contemporary tools–the dreaded polymorphic attack being one such example.

While the efforts to improve the state of DLP are commendable, this innovative method being put forward is not “new” at all.

At the heart of ADX is the rejection of automated, passive frameworks for protecting data. Since these systems essentially wait for the activity to match predetermined indicators, they cannot keep pace with the offensive tools being deployed by modern cybercriminals.

GTB’s DLP that Workstm is ADX / SDX that Workstm

But it is this very proactive approach that has been the basis for all of GTB’s platforms for years.

GTB’s DLP That Works is already delivering everything the ADX advocates are calling for. Using AI-powered technology, the program learns the network it’s protecting over time, allowing it to constantly increase its defensive accuracy. With Smart DLP, false positives are virtually eliminated, promoting that managing DLP will not disrupt business operations or siphon off critical IT resources.

Visibility: Accurately, discover sensitive data; detect and address broken business process, or insider threats including sensitive data breach attempts.

Protection: Automate data protection, breach prevention and incident response both on and off the network; for example, find and quarantine sensitive data within files exposed on user workstations, FileShares and cloud storage.

Notification: Alert and educate users on violations to raise awareness and educate the end user about cybersecurity and corporate policies.

Education: Start target cyber-security training; e.g., identify end-users violating policies and train them.

  • Employees and organizations have knowledge and control of the information leaving the organization, where it is being sent, and where it is being preserved.
  • Ability to allow user classification to give them influence in how the data they produce is controlled, which increases protection and end-user adoption.
  • Control your data across your entire domain in one Central Management Dashboard with Universal policies.
  • Many levels of control together with the ability to warn end-users of possible non-compliant – risky activities, protecting from malicious insiders and human error.
  • Full data discovery collection detects sensitive data anywhere it is stored, and provides strong classification, watermarking, and other controls.
  • Delivers full technical controls on who can copy what data, to what devices, what can be printed, and/or watermarked.
  • Integrate with GRC workflows.
  • Reduce the risk of fines and non-compliance.
  • Protect intellectual property and corporate assets.
  • Ensure compliance within industry, regulatory, and corporate policy.
  • Ability to enforce boundaries and control what types of sensitive information can flow where.
  • Control data flow to third parties and between business units.