HOW DATA LOSS PREVENTION WORKS

Our DLP technologies use rules to look for sensitive information that may be included in electronic communications or to detect abnormal data transfers. The goal is to stop information such as confidential forms, intellectual property, financial data, and employee or customer details.

WHY DOES YOUR BUSINESS NEED DLP SOLUTIONS?

The proliferation of business communications has given many more people access to local government data. Some of these users can be negligent or malicious. The result: a multitude of insider threats that can expose confidential data with a single click. Many government and industry regulations have made DLP a requirement.

CIT DLP SOLUTIONS

CIT DATA LOSS PREVENTION FOR DATA IN USE

One class of DLP technologies secures data in use, defined as data that is being actively processed by an application or an endpoint device. These safeguards usually involve authenticating users and controlling their access to resources.

CIT DATA LOSS PREVENTION FOR DATA IN MOTION

When confidential data is in transit across a network, the CIT DLP technologies are designed to make sure it is not routed outside the organization or to insecure storage areas. Encryption plays a large role in this step. Email security is also critical since so much business communication goes through this channel.

CIT DATA LOSS PREVENTION FOR DATA AT REST

Even data that is not moving or in use needs safeguards. The CIT DLP technologies protect data residing in a variety of storage mediums, including the cloud. CIT DLP can place controls to make sure that only authorized users are accessing the data and to track their access in case it is leaked or stolen.