{"id":93267,"date":"2024-10-29T11:31:34","date_gmt":"2024-10-29T03:31:34","guid":{"rendered":"https:\/\/version-2.com.sg\/?p=92624"},"modified":"2024-11-20T17:05:28","modified_gmt":"2024-11-20T09:05:28","slug":"dlp-or-irm-which-one-should-i-choose-to-protect-my-sensitive-data","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/10\/dlp-or-irm-which-one-should-i-choose-to-protect-my-sensitive-data\/","title":{"rendered":"DLP or IRM. Which one should I choose to protect my sensitive data?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"93267\" class=\"elementor elementor-93267\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2019\/07\/dlp-vs-irm-1080x675.png\" width=\"1080\" height=\"675\" \/><\/p><p>Every organization generates and manages, to a greater or lesser extent, sensitive information stored in different locations: User computers, document managers, cloud storage, file servers, etc.<\/p><p>On the one hand, organizations need to prevent internal threats: Information extracted by employees leaving the organization, loss of information through suppliers or the supply chain, etc. Many organizations believe that this problem only affects large government agencies and other entities that manage very sensitive information, but this type of leakage is a bigger problem than most companies believe and a one of the type of\u00a0<strong>leaks that generates more costs to organizations<\/strong>\u00a0according to the Ponemon Institute.<\/p><p>In addition, organizations are subject to data protection regulations such as the EU-GDPR, PCI in the financial sector, etc. Suffering a data leak or a breach of one of these regulations can be very costly for an organization, as demonstrated by the recent examples of\u00a0<a href=\"https:\/\/www.bbc.com\/news\/business-48905907\">British Airways<\/a>\u00a0(\u00a3183M) and\u00a0<a href=\"https:\/\/www.telegraph.co.uk\/technology\/2019\/07\/09\/uk-watchdog-fine-marriott-99m-hack-exposed-personal-details\/\">Marriott<\/a>\u00a0(\u00a3 99M) involving the loss\/theft of data of millions of users.<\/p><p>Faced with this problem, many CISOs or CIOs have to decide\u00a0<strong>which technologies to use in order to avoid or mitigate a potential sensitive date leak<\/strong>.<\/p><p>Two of the technologies that are usually considered are\u00a0<strong>DLP<\/strong>\u00a0(Context-Aware Data Loss Prevention) and\u00a0<strong>IRM<\/strong>\u00a0(Information Rights Management).<\/p><p>This article explains how both technologies\u00a0<strong>can help prevent data leaks<\/strong>, their differences and how they can complement each other.<\/p><h2><strong>What is DLP? \u2013 Data Loss Prevention \/ Data Leak Prevention<\/strong><\/h2><p>A DLP solution tries\u00a0<strong>to prevent the leakage or loss of sensitive data<\/strong>\u00a0in different ways. On the one hand, when data is in storage, by scanning the file servers, endpoints, etc. and locating or classifying sensitive data. Also in transit, when documentation or sensitive data is moving through the network, to removable devices, etc. And finally while the data is in use, controlling whether or not a user of the corporate network has access to it. Usually, hackers try to find personal, financial, intellectual property, data and the like based on pre-established dictionaries.<\/p><p><strong>DLP is like a \u201cpoliceman\u201d located at the network exit<\/strong>, computer ports and check what is trying to leave and who is trying to extract it from the network perimeter. It also monitors network repositories for sensitive data that is breaching some type of corporate rule.<\/p><p><picture><source srcset=\"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2019\/07\/estado-informacion-dlp.png.webp 606w, https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2019\/07\/estado-informacion-dlp-300x196.png.webp 300w\" type=\"image\/webp\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><img decoding=\"async\" class=\"aligncenter wp-image-6478 size-full webpexpress-processed lazyloaded\" src=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2019\/07\/estado-informacion-dlp.png\" sizes=\"(max-width: 606px) 100vw, 606px\" srcset=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2019\/07\/estado-informacion-dlp.png 606w, https:\/\/www.sealpath.com\/wp-content\/uploads\/2019\/07\/estado-informacion-dlp-300x196.png 300w\" alt=\"estado informaci\u00f3n DLP\" width=\"606\" height=\"396\" data-ll-status=\"loaded\" \/><\/picture>Although this is tremendously powerful technology, it has to overcome significant challenges in protecting sensitive data:<\/p><ul><li>How can it efficiently determine what can leave and what can\u2019t?<\/li><li>Is it possible to efficiently \u201cclose\u201d all of the possible exit points of company data or control them?<\/li><li>Can I control all types of company devices including mobile phones, the cloud, etc.?<\/li><li>And what if something leaves the network and escapes the control of this \u201cpoliceman?\u201d Can I restrict access?<\/li><\/ul><p>Traditional DLP solutions can only examine\u00a0<strong>what is trying to leave and decide whether or not it should leave<\/strong>. It is a binary process. However, day-to-day situations are not \u201cbinary\u201d. It is very difficult for an IT professional to define policies that describe requirements for data leaving the organization in an efficient manner without generating a number of \u201cfalse positives\u201d. If the data or the information is not classified, it is difficult to respond effectively. That is why in many it is first necessary to classify or catalogue the data, indicating to the DLP what repositories to scan and determining what is confidential and what is not.<\/p><p>This requires the IT Department to make considerable effort during the configuration, classification and policy management of the DLP in order to refine them sufficiently and generate the minimum number of false positives. However, keep in mind that it is difficult for an IT department to determine what is confidential and what is not. The users who work daily with this data are the ones who really know what is important and should be protected and what is not.<\/p><p>Another challenge is\u00a0<strong>what happens with the documents once they have been distributed<\/strong>. Once the data is outside of the organization, nothing prevents the recipients from forwarding it to unauthorized users, saving it on USBs, etc. This also applies to mobile devices, where the approach to protection tends to be \u201call or nothing\u201d. Companies often delegate control of data on mobile devices to MDM applications to prevent certain data from being opened outside of corporate or controlled applications.<\/p><p>By requiring a refined management of policies and classification, companies usually start with a \u201cmonitoring\u201d phase to detect what type of data leaves the network, before moving on to a \u201cblocking\u201d phase. If the policy is refined, the control of outgoing data will be efficient and blocking processes won\u2019t generate false positives. If not, the noise generated in the organization due to the blocking of data that should be accessible or that should be sent may be significant.<\/p><p>To summarize, DLP tools are very powerful and can classify, monitor and block the output of sensitive data from the network, but the effort require to implement them, refine them and avoid false positives should not be underestimated. Finally, although\u00a0<strong>they protect the \u201cperimeter\u201d of the network, the data may be transferred anywhere<\/strong>.<\/p><h2><strong>What is IRM? \u2013 Information Rights Management<\/strong><\/h2><p>This technology, within the scope of Data-Centric Security, enables\u00a0<strong>a form of protection to be applied to files that travels with the files wherever they go<\/strong>. It is also known as E-DRM (Enterprise Digital Rights Management) or EIP&amp;C (Enterprise Information Protection &amp; Control).It makes it possible to monitor who accesses the files, when they do so, and whether anybody tries to access without permission, whether the files are inside or outside the organization. Permissions can also be restricted on documents (only Read, Edit, Print, Copy and Paste, etc.). You can revoke access to files in real time if you don\u2019t want certain people to access them again.<\/p><p>When you send a document to someone, within 3 minutes it might have been printed, sent to 5 other people who in turn have sent it to 10 more and made changes to it. We only own the document at the time we create it, but\u00a0<strong>once it is shared, the document ceases to have an owner and the recipient can do whatever they want<\/strong>\u00a0with it. This is one of the problems that this technology tries to resolve: To ensure that a user continues to be the owner of the data regardless of who it has been shared with.<\/p><p>Bearing in mind how difficult it is to determine the perimeter of the corporate network,\u00a0<strong>the IRM\u2019s approach is to apply a layer of protection to the data<\/strong>\u00a0that can be controlled even if it is no longer in the network, whether it is in a cloud, on a mobile device, etc.<\/p><p>If the data reaches someone it shouldn\u2019t of whom you consider shouldn\u2019t have access to it, you can revoke the access remotely. You can set expiry dates for documents. Give users more or fewer permissions in real time (Edit when before they could only Read, or restrict the permission to read-only if we don\u2019t want them to edit or print).<\/p><div id=\"attachment_6480\" class=\"wp-caption aligncenter\"><p><picture><source srcset=\"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2019\/07\/envio-informacion-sensible.png.webp 604w, https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2019\/07\/envio-informacion-sensible-300x211.png.webp 300w\" type=\"image\/webp\" sizes=\"(max-width: 604px) 100vw, 604px\" \/><img decoding=\"async\" class=\"size-full wp-image-6480 webpexpress-processed lazyloaded\" src=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2019\/07\/envio-informacion-sensible.png\" sizes=\"(max-width: 604px) 100vw, 604px\" srcset=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2019\/07\/envio-informacion-sensible.png 604w, https:\/\/www.sealpath.com\/wp-content\/uploads\/2019\/07\/envio-informacion-sensible-300x211.png 300w\" alt=\"env\u00edo informaci\u00f3n sensible\" width=\"604\" height=\"425\" aria-describedby=\"caption-attachment-6480\" data-ll-status=\"loaded\" \/><\/picture><\/p><p id=\"caption-attachment-6480\" class=\"wp-caption-text\">env\u00edo informaci\u00f3n sensible<\/p><\/div><p>An advantage of this type of solution is the ease with which it can be implemented allowing you to start using it efficiently from day one and enabling you to encrypt and control the sensitive data that the company manages internally or with third parties.<\/p><p>One of the main challenges of this technology making it easy for users to use so that they can manage protected data almost as if it were unprotected data. Also, making it compatible with the applications that users use on a regular basis, such as Office, Adobe, AutoCAD or making it compatible with the repositories of information that organizations usually use: File Servers, SharePoint, Office 365 Cloud applications, G-Suite, Box, etc.<\/p><p>Another challenge of IRM solutions is automatic protection. That is, the protection of data regardless of the user\u2019s decision to do so. In this case, the automatic protection of folders on file servers, or document managers is especially useful.<\/p><p>Also in this regard,<strong>\u00a0integration with a DLP tool can be very useful and provide the perfect combination<\/strong>.<\/p><h2><strong>How can DLP and IRM complement each other?<\/strong><\/h2><p>As mentioned, the administrator can\u00a0<strong>establish rules to identify sensitive information using the DLP tool<\/strong>. Once detected, in storage, transit or in use, the administrator can apply a remedial action such as creating a log, blocking access, deleting the file, etc.<\/p><p>Through integration with the IRM, the\u00a0<strong>DLP can establish the automatic protection of the file<\/strong>\u00a0as a remedial action using an IRM protection policy. For example, if an endpoint, or a network folder is scanned and any credit card data, personal information, etc. is detected in the documents, the DLP can ensure they are automatically protected with an \u201cInternal Use\u201d policy so that only people in the domain or certain departments can access it.<\/p><h2><strong>What advantages does this integration provide?<\/strong><\/h2><p>Below are some of the advantages:<\/p><ul><li>Sensitive documents can protect themselves without relying on user action.<\/li><li>These will be protected whether they are transferred inside or outside the corporate network.<\/li><li>You can monitor their access regardless of where they are.<\/li><li>You can revoke access to sensitive data even if it is outside the organization.<\/li><\/ul><div id=\"attachment_6482\" class=\"wp-caption aligncenter\"><p><picture><source srcset=\"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2019\/07\/integracion-dlp-e-irm.png.webp 623w, https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2019\/07\/integracion-dlp-e-irm-300x165.png.webp 300w\" type=\"image\/webp\" sizes=\"(max-width: 623px) 100vw, 623px\" \/><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-6482 webpexpress-processed lazyloaded\" src=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2019\/07\/integracion-dlp-e-irm.png\" sizes=\"(max-width: 623px) 100vw, 623px\" srcset=\"https:\/\/www.sealpath.com\/wp-content\/uploads\/2019\/07\/integracion-dlp-e-irm.png 623w, https:\/\/www.sealpath.com\/wp-content\/uploads\/2019\/07\/integracion-dlp-e-irm-300x165.png 300w\" alt=\"integraci\u00f3n dlp e irm\" width=\"623\" height=\"343\" aria-describedby=\"caption-attachment-6482\" data-ll-status=\"loaded\" \/><\/picture><\/p><p id=\"caption-attachment-6482\" class=\"wp-caption-text\">integraci\u00f3n dlp e irm<\/p><\/div><p>SealPath can protect information easily and efficiently by integrating with the main DLP solutions on the market such as ForcePoint, McAfee or Symantec, facilitating the protection of sensitive data in the organization and its control regardless of where it is.<\/p><p>SealPath is focused on creating the best user experience, integrating with users\u2019 normal work tools, offering a product specially designed for large companies and integrated with a multitude of corporate systems such as DLPs, SIEMs, Office 365, SharePoint, G-Suite, Alfresco, OneDrive, etc.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"85835\" class=\"elementor elementor-85835\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-28cd29c7 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"28cd29c7\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-63c11775\" data-id=\"63c11775\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c79c5c3 elementor-widget elementor-widget-text-editor\" data-id=\"1c79c5c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About SealPath<\/strong><br>SealPath is the European leader in Data-Centric Security and Enterprise Digital Rights Management, working with significant companies in more than 25 countries. SealPath has been helping organizations from different business verticals such as Manufacturing, Oil and Gas, Retail, Finance, Health, and Public Administration, to protect their data for over a decade. SealPath\u2019s client portfolio includes organizations within the Fortune 500 and Eurostoxx 50 indices. SealPath facilitates the prevention of costly mistakes, reducing the risk of data leakage, ensuring the security of confidential information, and protecting data assets.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Every organization generates and manages, to a greater  [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,1281,61],"tags":[1272,1282],"class_list":["post-93267","post","type-post","status-publish","format-standard","hentry","category-1273","category-sealpath","category-press-release","tag-1272","tag-sealpath"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DLP or IRM. Which one should I choose to protect my sensitive data? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.portnox.com\/blog\/contributed-content\/cloud-control-why-your-nac-needs-a-serious-upgrade\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DLP or IRM. Which one should I choose to protect my sensitive data? - Version 2\" \/>\n<meta property=\"og:description\" content=\"Every organization generates and manages, to a greater [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.portnox.com\/blog\/contributed-content\/cloud-control-why-your-nac-needs-a-serious-upgrade\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-29T03:31:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-20T09:05:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2019\/07\/dlp-vs-irm-1080x675.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/contributed-content\\\/cloud-control-why-your-nac-needs-a-serious-upgrade\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2024\\\/10\\\/dlp-or-irm-which-one-should-i-choose-to-protect-my-sensitive-data\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"DLP or IRM. Which one should I choose to protect my sensitive data?\",\"datePublished\":\"2024-10-29T03:31:34+00:00\",\"dateModified\":\"2024-11-20T09:05:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2024\\\/10\\\/dlp-or-irm-which-one-should-i-choose-to-protect-my-sensitive-data\\\/\"},\"wordCount\":1647,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/contributed-content\\\/cloud-control-why-your-nac-needs-a-serious-upgrade\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.sealpath.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2019\\\/07\\\/dlp-vs-irm-1080x675.png\",\"keywords\":[\"2024\",\"Sealpath\"],\"articleSection\":[\"2024\",\"Sealpath\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2024\\\/10\\\/dlp-or-irm-which-one-should-i-choose-to-protect-my-sensitive-data\\\/\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/contributed-content\\\/cloud-control-why-your-nac-needs-a-serious-upgrade\\\/\",\"name\":\"DLP or IRM. Which one should I choose to protect my sensitive data? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/contributed-content\\\/cloud-control-why-your-nac-needs-a-serious-upgrade\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/contributed-content\\\/cloud-control-why-your-nac-needs-a-serious-upgrade\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.sealpath.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2019\\\/07\\\/dlp-vs-irm-1080x675.png\",\"datePublished\":\"2024-10-29T03:31:34+00:00\",\"dateModified\":\"2024-11-20T09:05:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/contributed-content\\\/cloud-control-why-your-nac-needs-a-serious-upgrade\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/contributed-content\\\/cloud-control-why-your-nac-needs-a-serious-upgrade\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/contributed-content\\\/cloud-control-why-your-nac-needs-a-serious-upgrade\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.sealpath.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2019\\\/07\\\/dlp-vs-irm-1080x675.png\",\"contentUrl\":\"https:\\\/\\\/www.sealpath.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2019\\\/07\\\/dlp-vs-irm-1080x675.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/contributed-content\\\/cloud-control-why-your-nac-needs-a-serious-upgrade\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DLP or IRM. Which one should I choose to protect my sensitive data?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DLP or IRM. Which one should I choose to protect my sensitive data? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.portnox.com\/blog\/contributed-content\/cloud-control-why-your-nac-needs-a-serious-upgrade\/","og_locale":"zh_HK","og_type":"article","og_title":"DLP or IRM. Which one should I choose to protect my sensitive data? - Version 2","og_description":"Every organization generates and manages, to a greater [&hellip;]","og_url":"https:\/\/www.portnox.com\/blog\/contributed-content\/cloud-control-why-your-nac-needs-a-serious-upgrade\/","og_site_name":"Version 2","article_published_time":"2024-10-29T03:31:34+00:00","article_modified_time":"2024-11-20T09:05:28+00:00","og_image":[{"url":"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2019\/07\/dlp-vs-irm-1080x675.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"9 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.portnox.com\/blog\/contributed-content\/cloud-control-why-your-nac-needs-a-serious-upgrade\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2024\/10\/dlp-or-irm-which-one-should-i-choose-to-protect-my-sensitive-data\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"DLP or IRM. Which one should I choose to protect my sensitive data?","datePublished":"2024-10-29T03:31:34+00:00","dateModified":"2024-11-20T09:05:28+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2024\/10\/dlp-or-irm-which-one-should-i-choose-to-protect-my-sensitive-data\/"},"wordCount":1647,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/contributed-content\/cloud-control-why-your-nac-needs-a-serious-upgrade\/#primaryimage"},"thumbnailUrl":"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2019\/07\/dlp-vs-irm-1080x675.png","keywords":["2024","Sealpath"],"articleSection":["2024","Sealpath","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2024\/10\/dlp-or-irm-which-one-should-i-choose-to-protect-my-sensitive-data\/","url":"https:\/\/www.portnox.com\/blog\/contributed-content\/cloud-control-why-your-nac-needs-a-serious-upgrade\/","name":"DLP or IRM. Which one should I choose to protect my sensitive data? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.portnox.com\/blog\/contributed-content\/cloud-control-why-your-nac-needs-a-serious-upgrade\/#primaryimage"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/contributed-content\/cloud-control-why-your-nac-needs-a-serious-upgrade\/#primaryimage"},"thumbnailUrl":"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2019\/07\/dlp-vs-irm-1080x675.png","datePublished":"2024-10-29T03:31:34+00:00","dateModified":"2024-11-20T09:05:28+00:00","breadcrumb":{"@id":"https:\/\/www.portnox.com\/blog\/contributed-content\/cloud-control-why-your-nac-needs-a-serious-upgrade\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.portnox.com\/blog\/contributed-content\/cloud-control-why-your-nac-needs-a-serious-upgrade\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.portnox.com\/blog\/contributed-content\/cloud-control-why-your-nac-needs-a-serious-upgrade\/#primaryimage","url":"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2019\/07\/dlp-vs-irm-1080x675.png","contentUrl":"https:\/\/www.sealpath.com\/wp-content\/webp-express\/webp-images\/uploads\/2019\/07\/dlp-vs-irm-1080x675.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.portnox.com\/blog\/contributed-content\/cloud-control-why-your-nac-needs-a-serious-upgrade\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"DLP or IRM. Which one should I choose to protect my sensitive data?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-ogj","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/93267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=93267"}],"version-history":[{"count":6,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/93267\/revisions"}],"predecessor-version":[{"id":97858,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/93267\/revisions\/97858"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=93267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=93267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=93267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}