Skip to content

DLP or IRM. Which one should I choose to protect my sensitive data?

Every organization generates and manages, to a greater or lesser extent, sensitive information stored in different locations: User computers, document managers, cloud storage, file servers, etc.

On the one hand, organizations need to prevent internal threats: Information extracted by employees leaving the organization, loss of information through suppliers or the supply chain, etc. Many organizations believe that this problem only affects large government agencies and other entities that manage very sensitive information, but this type of leakage is a bigger problem than most companies believe and a one of the type of leaks that generates more costs to organizations according to the Ponemon Institute.

In addition, organizations are subject to data protection regulations such as the EU-GDPR, PCI in the financial sector, etc. Suffering a data leak or a breach of one of these regulations can be very costly for an organization, as demonstrated by the recent examples of British Airways (£183M) and Marriott (£ 99M) involving the loss/theft of data of millions of users.

Faced with this problem, many CISOs or CIOs have to decide which technologies to use in order to avoid or mitigate a potential sensitive date leak.

Two of the technologies that are usually considered are DLP (Context-Aware Data Loss Prevention) and IRM (Information Rights Management).

This article explains how both technologies can help prevent data leaks, their differences and how they can complement each other.

What is DLP? – Data Loss Prevention / Data Leak Prevention

A DLP solution tries to prevent the leakage or loss of sensitive data in different ways. On the one hand, when data is in storage, by scanning the file servers, endpoints, etc. and locating or classifying sensitive data. Also in transit, when documentation or sensitive data is moving through the network, to removable devices, etc. And finally while the data is in use, controlling whether or not a user of the corporate network has access to it. Usually, hackers try to find personal, financial, intellectual property, data and the like based on pre-established dictionaries.

DLP is like a “policeman” located at the network exit, computer ports and check what is trying to leave and who is trying to extract it from the network perimeter. It also monitors network repositories for sensitive data that is breaching some type of corporate rule.

estado información DLPAlthough this is tremendously powerful technology, it has to overcome significant challenges in protecting sensitive data:

  • How can it efficiently determine what can leave and what can’t?
  • Is it possible to efficiently “close” all of the possible exit points of company data or control them?
  • Can I control all types of company devices including mobile phones, the cloud, etc.?
  • And what if something leaves the network and escapes the control of this “policeman?” Can I restrict access?

Traditional DLP solutions can only examine what is trying to leave and decide whether or not it should leave. It is a binary process. However, day-to-day situations are not “binary”. It is very difficult for an IT professional to define policies that describe requirements for data leaving the organization in an efficient manner without generating a number of “false positives”. If the data or the information is not classified, it is difficult to respond effectively. That is why in many it is first necessary to classify or catalogue the data, indicating to the DLP what repositories to scan and determining what is confidential and what is not.

This requires the IT Department to make considerable effort during the configuration, classification and policy management of the DLP in order to refine them sufficiently and generate the minimum number of false positives. However, keep in mind that it is difficult for an IT department to determine what is confidential and what is not. The users who work daily with this data are the ones who really know what is important and should be protected and what is not.

Another challenge is what happens with the documents once they have been distributed. Once the data is outside of the organization, nothing prevents the recipients from forwarding it to unauthorized users, saving it on USBs, etc. This also applies to mobile devices, where the approach to protection tends to be “all or nothing”. Companies often delegate control of data on mobile devices to MDM applications to prevent certain data from being opened outside of corporate or controlled applications.

By requiring a refined management of policies and classification, companies usually start with a “monitoring” phase to detect what type of data leaves the network, before moving on to a “blocking” phase. If the policy is refined, the control of outgoing data will be efficient and blocking processes won’t generate false positives. If not, the noise generated in the organization due to the blocking of data that should be accessible or that should be sent may be significant.

To summarize, DLP tools are very powerful and can classify, monitor and block the output of sensitive data from the network, but the effort require to implement them, refine them and avoid false positives should not be underestimated. Finally, although they protect the “perimeter” of the network, the data may be transferred anywhere.

What is IRM? – Information Rights Management

This technology, within the scope of Data-Centric Security, enables a form of protection to be applied to files that travels with the files wherever they go. It is also known as E-DRM (Enterprise Digital Rights Management) or EIP&C (Enterprise Information Protection & Control).It makes it possible to monitor who accesses the files, when they do so, and whether anybody tries to access without permission, whether the files are inside or outside the organization. Permissions can also be restricted on documents (only Read, Edit, Print, Copy and Paste, etc.). You can revoke access to files in real time if you don’t want certain people to access them again.

When you send a document to someone, within 3 minutes it might have been printed, sent to 5 other people who in turn have sent it to 10 more and made changes to it. We only own the document at the time we create it, but once it is shared, the document ceases to have an owner and the recipient can do whatever they want with it. This is one of the problems that this technology tries to resolve: To ensure that a user continues to be the owner of the data regardless of who it has been shared with.

Bearing in mind how difficult it is to determine the perimeter of the corporate network, the IRM’s approach is to apply a layer of protection to the data that can be controlled even if it is no longer in the network, whether it is in a cloud, on a mobile device, etc.

If the data reaches someone it shouldn’t of whom you consider shouldn’t have access to it, you can revoke the access remotely. You can set expiry dates for documents. Give users more or fewer permissions in real time (Edit when before they could only Read, or restrict the permission to read-only if we don’t want them to edit or print).

envío información sensible

envío información sensible

An advantage of this type of solution is the ease with which it can be implemented allowing you to start using it efficiently from day one and enabling you to encrypt and control the sensitive data that the company manages internally or with third parties.

One of the main challenges of this technology making it easy for users to use so that they can manage protected data almost as if it were unprotected data. Also, making it compatible with the applications that users use on a regular basis, such as Office, Adobe, AutoCAD or making it compatible with the repositories of information that organizations usually use: File Servers, SharePoint, Office 365 Cloud applications, G-Suite, Box, etc.

Another challenge of IRM solutions is automatic protection. That is, the protection of data regardless of the user’s decision to do so. In this case, the automatic protection of folders on file servers, or document managers is especially useful.

Also in this regard, integration with a DLP tool can be very useful and provide the perfect combination.

How can DLP and IRM complement each other?

As mentioned, the administrator can establish rules to identify sensitive information using the DLP tool. Once detected, in storage, transit or in use, the administrator can apply a remedial action such as creating a log, blocking access, deleting the file, etc.

Through integration with the IRM, the DLP can establish the automatic protection of the file as a remedial action using an IRM protection policy. For example, if an endpoint, or a network folder is scanned and any credit card data, personal information, etc. is detected in the documents, the DLP can ensure they are automatically protected with an “Internal Use” policy so that only people in the domain or certain departments can access it.

What advantages does this integration provide?

Below are some of the advantages:

  • Sensitive documents can protect themselves without relying on user action.
  • These will be protected whether they are transferred inside or outside the corporate network.
  • You can monitor their access regardless of where they are.
  • You can revoke access to sensitive data even if it is outside the organization.

integración dlp e irm

integración dlp e irm

SealPath can protect information easily and efficiently by integrating with the main DLP solutions on the market such as ForcePoint, McAfee or Symantec, facilitating the protection of sensitive data in the organization and its control regardless of where it is.

SealPath is focused on creating the best user experience, integrating with users’ normal work tools, offering a product specially designed for large companies and integrated with a multitude of corporate systems such as DLPs, SIEMs, Office 365, SharePoint, G-Suite, Alfresco, OneDrive, etc.

About SealPath
SealPath is the European leader in Data-Centric Security and Enterprise Digital Rights Management, working with significant companies in more than 25 countries. SealPath has been helping organizations from different business verticals such as Manufacturing, Oil and Gas, Retail, Finance, Health, and Public Administration, to protect their data for over a decade. SealPath’s client portfolio includes organizations within the Fortune 500 and Eurostoxx 50 indices. SealPath facilitates the prevention of costly mistakes, reducing the risk of data leakage, ensuring the security of confidential information, and protecting data assets.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

走在科技前端: Scalefusion 助您平穩遷移至 Apple 最新作業系統

Apple 最新的發布會展示了 iOS 18 和 macOS 15 的重大更新,為企業和個人用戶開創了全新的可能性。這些系統升級引入了革新性的 Apple Intelligence、裝置無縫整合和更佳的用戶體驗,讓企業和個人都能享受到更豐富的功能和潛力。 

新作業系統提供了嶄新的工作流程、加強安全性並提升員工效能的獨特契機。想像一下,利用智能自動化改善任務管理,透過裝置鏡像提升協作效率,並用先進的隱私保護功能來確保資料安全。

iOS 18:探索無限可能的新世代

Apple Intelligence 驚艷登場:Apple 的強大 AI 系統無縫整合於各應用程式中,為您提供重寫、校對和文本摘要等功能,同時提升圖片創建能力,方便創建動畫或插圖,並讓您的照片更具個人化意義。

進階訊息功能:iMessage 現支持 RCS 協議,讓您可以與非 Apple 用戶共享豐富媒體,並為偏遠地區用戶提供衛星訊息服務。此外,您還可以享受到訊息排程、動畫文字效果以及更多表情符號,使交流更具個性。

個性化設定與私隱保護:iOS 18 提供更深入的主畫面自訂選項、動態應用程式圖標和更強大的私隱控制。您可以鎖定或隱藏敏感應用,並管理特定聯絡人對應用的存取權限。

流暢的瀏覽體驗與密碼管理:新版 Safari Reader 和全新密碼應用(替代 Keychain)讓內容瀏覽更智能,同時簡化密碼管理,並提供弱密碼或風險憑證的警告。

無障礙技術再突破:iOS 18 引入了眼動追蹤技術,使用戶可以通過眼睛控制 iPhone,極大地提升了行動不便者的使用體驗。

macOS 15:提升企業生產力的利器

iPhone 鏡像:無縫的裝置整合!現在可以將 iPhone 鏡像至 Mac,方便地拖放文件,並在不切換螢幕的情況下處理通知。

視窗佈局:多工處理更輕鬆。通過視窗並排或角落佈局改善工作空間,充分利用屏幕資源並提高效率。

視像會議預覽:每場會議皆呈現自信。無論在 FaceTime 還是 Zoom 共享螢幕前,您都能預覽外觀和背景,確保專業形象。

密碼應用:保護您的數位生活。新的密碼應用是密碼、密鑰和 Wi-Fi 憑證的安全管理工具,並通過端點到端點加密保障您的數據。

遊戲體驗提升:透過個性化的空間音效和最新的遊戲支援,享受沉浸式的遊戲體驗。

Safari 的智能改進:透過 “Highlights” 功能發現精彩內容,並通過重新設計的無干擾閱讀模式提升您的瀏覽體驗。

Siri 與 Apple Intelligence:虛擬助手變得更加智能。Siri 支援免提操作,並通過 Apple Intelligence 提升生產力,提供文本摘要和媒體組織等功能。

Scalefusion 助您企業無縫適應 Apple 新系統

隨著 iOS 18 和 macOS 15 的功能日益強大,IT 團隊將面臨更多挑戰。從配置和管理新的私隱設定,到確保 iPhone 鏡像與現有流程的無縫整合,再到提升裝置性能,這些都需要周密的計劃和嚴謹的裝置管理政策。
Scalefusion 專注於幫助企業簡化過渡過程。我們為此開發了一套解決方案,協助企業在過渡到iOS 18 和 macOS 15 時,輕鬆應對新功能帶來的挑戰,從而充分發揮其潛力、提升生產力並加強安全性。

這些功能將不僅簡化 iOS 和 macOS 裝置的日常管理,還讓您的企業能夠積極應對新系統的挑戰,確保一開始就能全面發揮系統的優勢。

設定 iOS 18 的 Apple Intelligence 設定
在企業的 iOS 裝置上啟用 Apple Intelligence 可能會帶來資料外洩、智慧財產風險及安全和合規挑戰。謹慎管理這些設定是確保企業資訊安全的關鍵。企業可以怎麼做?

透過限制 Apple Intelligence 的使用,您可以更好地控管敏感資訊,創造安全的工作環境。現在,您可以在運行 iOS 18 的管理型裝置上開啟或關閉 Apple Intelligence 設定,並透過阻止寫作工具、Image Wand 和 Playground 等功能來限制使用權限。

iPhone 鏡像

將 iPhone 畫面鏡像顯示可能會不小心透露手機上的公司機密資料,如電子郵件、文件或簡報,增加資料外洩的風險。若透過鏡像功能將 iPhone 連接到 Mac,可能會成為惡意軟件或其他安全威脅入侵企業網絡的途徑。

企業可以怎麼做?

Scalefusion 讓您可以在管理型 iOS 裝置上禁用裝置鏡像功能,確保企業保持資料安全和控制權。
iOS 18 的 SharePlay 遙距控制

SharePlay 的遙距控制功能可能會違反某些行業的合規要求,例如對資料存取和控制的要求。此外,它也可能帶來安全風險,例如未授權存取的可能性增高,導致資料外洩或惡意軟件入侵。SharePlay 的遙距控制還可能意外暴露公司敏感資訊,進一步引發私隱問題。

企業可以怎麼做?

Scalefusion 允許您阻止 SharePlay 的遙距控制功能,確保合規的同時保護企業的敏感資料並提升運營效率。

macOS 15 的磁碟管理

對於有嚴格法規要求的企業來說,管理企業 Mac 系統的外部數據源至關重要。為幫助維持合規,Apple 推出了新的磁碟管理配置,協助 IT 團隊控制外部和網絡儲存裝置的存取。

企業可以怎麼做?

現在,透過 Scalefusion 儀表板,您可以選擇允許或阻止網絡儲存,或將其設為唯讀模式。此新功能取代了之前的媒體管理配置,為企業提供更靈活的數據存取控制。

策略性作業系統更新

如果企業的 IT 基礎架構尚未準備好支援 iOS 18 和 macOS 15 的新功能,Scalefusion 提供了延遲更新的選項。您可以在作業系統更新管理設定中,將軟件更新延遲最多 90 天。這使您有充裕時間測試更新,並可分階段進行部署,確保企業內的順利過渡與控制。

未來展望

我們正持續開發新功能,以進一步提升您管理 Apple 裝置的體驗。即將推出的更新將會:
● 利用 Apple Intelligence 簡化裝置設定過程,實現自動化的裝置註冊。
● 通過強制最低作業系統版本,強化您的安全架構。
● 為 MDM 客戶端和生產力應用提供可自訂的亮 / 暗模式和色調圖示,以增強用戶體驗和品牌形象。

與 Scalefusion 共迎 Apple 的未來
隨著 Apple 的不斷創新,我們致力於為您提供高效的 Apple 裝置管理工具。我們的最新功能讓您
在確保最高的安全性和控制的前提下,充分享受 iOS 18 和 macOS 15 的潛力。請持續關注我們的更新!欲體驗 Scalefusion,您可安排演示或開始我們的 14 天免費試用!

關於 Scalefusion
Scalefusion 是領先的統一端點管理解決方案,可幫助企業安全管理各類裝置,包括智能手機、平 板電腦、手提電腦、堅固型設備、POS 機、數位標牌,以及應用和內容。Scalefusion 支援 Android、iOS、macOS、Windows 和 Linux 裝置的管理,並透過遙距故障排除功能,實現高效 的設備管理流程。全球超過 8000 家企業依賴 Scalefusion 釋放業務潛力,廣泛應用於運輸與物流 、零售、教育、醫療保健、製造、建築與房地產、酒店業、軟件與電信、金融服務等行業。

關於 Version 2 Digital
Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×