Preventing confidential data from being transmitted outside your organisation first requires comprehensive monitoring of multiple exit and endpoints. Email is only part of the problem. Experience shows that 50 percent of incidents occur via internet protocols other than email, such as instant messaging or blogs.

Yet some content monitoring solutions only screen email, leaving other internet protocols uncovered. Other solutions are only capable of screening internet protocols when the user is connected to the corporate network, leaving the organisation exposed when users are off the network. Removable media also provides easy accessible endpoints to which confidential data can be copied. In addition, it’s not enough simply to monitor security violations; the key is to prevent sensitive data from being transmitted by blocking it, in effect closing the door before the breach occurs. A solution that effectively reduces your risk of data loss across all business processes must combine comprehensive monitoring with prevention. It should accurately monitor and prevent security violations for all data types and network protocols, including email (SMTP), instant messaging (AOL, MSN, Yahoo), secure Web (HTTP over SSL), FTP, P2P, and generic TCP sessions over any port. An effective DLP solution should also monitor and prevent confidential data from being copied to external devices, download to local drives, attach to network transmissions, encrypt or conceal using high-risk applications. In addition, it should stop transmission that violate security, acceptable use, and privacy policies before they leave the network.

A solution that effectively reduces your risk of data loss across all business processes must combine comprehensive monitoring with prevention. It should accurately monitor and prevent security violations for all data types and network protocols, including email (SMTP), instant messaging (AOL, MSN, Yahoo), secure Web (HTTP over SSL), FTP, P2P, and generic TCP sessions over any port. An effective DLP solution should also monitor and prevent confidential data from being copied to external devices, download to local drives, attach to network transmissions, encrypt or conceal using high-risk applications. In addition, it should stop transmission that violate security, acceptable use, and privacy policies before they leave the network.