<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
Skip to content

Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

What Is Data Loss Prevention And Why Is It Important To Your Business?

It has many names, from “data loss prevention” and “data leakage prevention” to the brief “DLP,” but regardless of which term you use, this objective and its network tools are designed for one major task: detect and prevent unauthorized transmission of your data to outside parties.

DLP tools process highly classified or sensitive information, such as PCI, PII and PHI and ensures that end users don’t send that information outside of your network. These tools are built for a perimeter-based prevention approach, client-based approach and a combination of the two. In today's world, this includes wherever the data lives, cloud, on premise or at the endpoints.

As you might guess, these tools are prevalent with government agencies and in the banking and insurance industries.

Data loss prevention is not the simplest mechanism. As Network World writes, “Finding the right perimeter-based data loss prevention tool means striking a balance between speed, accuracy at detecting and blocking sensitive data from exiting the network, and adequate coverage across a broad range of rule-sets and protocols.”


How To Leverage Data Loss Prevention Tools

DLP tools must have access to all outbound connections from your transaction processing network in order to completely secure your data. Do not restrict this program. In fact, you may even need additional resources to maintain strong data and network security. And as one information security expert explains, most data leakage prevention tools block unwanted traffic only when it’s combined with a network, so managing your egress filtering helps to block as much of such traffic as possible.

What Your Network Is Missing 7 Tools To TAP

DLP Installation 

In most cases, companies that provide data loss prevention services come on site to configure their tools for you. Even if you installed them yourself, the process is relatively simple and straightforward for most products, though there are some tools that require a bit of communication between you and your DLP partner.

Upon installation, your DLP tool should pass data between the simulated LAN and WAN, at which point you’re able to customize your own specifications for filtering data. This could be anything from source code to credit card numbers and other sensitive information to types or sizes of files. Typically, you also have the power to customize protocols for how your DLP tool blocks data.

Connection Issues

Gaining access to complete network traffic is essential for successful data loss prevention. SPAN ports will not provide 100% of network traffic when oversubscribed or unavailable. If your DLP tools need to simultaneously monitor multiple network segments and aggregate or replicate data to multiple network tools, a network TAP is more reliable device. 

In addition, because a DLP tool needs to be installed in-line, it might create network downtime in the event of failure or need for maintenance, depending on how it’s connected to your network. With bypass TAPs, however, the network link is able to run while any work is being performed. To properly mitigate the risk of data loss, ensure that you’re able to intelligently connect your DLP tool. Otherwise, there’s always a greater possibility that your precious information is in danger.

 

Read more about Data Loss Prevention Tools in our free white paper, What's Your Network Missing: 7 Tools to TAP
 

Written by Chris Bihary

Chris Bihary, CEO and Co-founder of Garland Technology, has been in the network performance industry for over 20 years. Bihary has established collaborative partnerships with technology companies to complement product performance and security through the integration of network TAP visibility.

Authors

Topics

Sign Up for Blog Updates