Many organizations seek to protect their valuable information, and acquistion of a DLP system is a standard response. Data classification products from Janusnet complement DLP systems and for the small additional investment in Janusseal products the "DLP System" is significantly enhanced.
So for the most effective solution is to use classification in your data protection strategy (As you can take advantage of all the human knowledge and 'corporate memory') :
- Classification Component: use Janusseal to tag all created emails and documents with classifications your existing security and DCI systems can recognize
- Deep Content Inspection Component: introduce DLP systems to block or process all email or document transfers based on recognized content.
If the two activities are well coordinated, Janusseal can reduce the complexity and improve the efficiency and cost effectiveness of DCI by enabling easier preparation and implementation. Here is how classification can help a DLP implementation.
|Classification complements DLP||DCI DLP without classification|
|Simplicity engages author and is user-centric||Complexity increases, in the sense that IT system and information-centric approach has to build rules that are as accurate as a human interpretation|
|Classifies documents and email messages based on sensitivity or value and can be designed to compare with DCI DLP result||Prioritizes and identifies information based on keywords, dictionaries, regular expressions, partial document matching and/or fingerprinting|
|Simple rules enables existing security systems and DCI DLP to check and process every document/email||May require new technology at the perimeters to perform content inspection and then block/allow transfer|
|Highly accurate; tagged data will be processed according to policy||Risk of false positives and negatives due to unstructured and semi-structured data without orginator nput|
|Low intrusion: all information generated is classified quickly in real time||High intrusion: difficult to identify data generated in real-time|
|All data, including unstructured is tagged as created - by everyone on every device||Unstructured data scattered over PCs and mobile devices cannot be easily identified|
|Low maintenance: security classifications are independent of organizational change||Higher maintenance: policy settings need frequent revision during organizational change|
|Rapid deployment: easy and simple, with immediate results; no lag as integration is easy. Watching mode can be utilized without impact, but DLP benefits immediately available.||Slower deployment while system is maintained in watching mode as configuration can be complex and time-consuming|
|Distributed workload: Each user classifies their own documents and email messages. Easy to set up, administer and maintain||Centralised workload: Although automated, IT department and management is required to do all the work. Higher and more complex ongoing maintenance by highly skilled staff|
|Shared responsibility: user-centric system promotes proactive security culture (users as assets)||Without classification a DCI system represents imposed security: IT-centric system promotes reactive security culture (users as liabilities)|