Intelligent DLP with End-user Classification

By on Jan 07, 2013

One of the biggest challenges for Data Protection solution is identifying sensitive data.  Today, organizations generate various types of sensitive data, ranging from regulated data such as PCI to unstructured data such as product designs.  Not all sensitive data can be identified and protected via regular expressions and keywords.

By supplementing End-user Classification to the traditional Endpoint DLP solution, it can help IT Security departments make informed decisions to help prevent data loss.  Instead of solely relying on automated content scanning to determine what is sensitive, the combined solution enables end-users to identify information sensitivity.   For example, with outbound emails, the originator knows the content best and can pro-actively indicate if the information is sensitive.  This type of classification helps IT Security departments take the guesswork out of identifying sensitive data and allows for more intelligent and accurate DLP decisions.

McAfee and TITUS worked together to provide this combined solution to help organizations reduce the risk of data loss by capturing end-users’ inherent knowledge about the sensitivity of information.  TITUS End-user Classification is integrated with McAfee DLP Endpoint and enables DLP to take action based on end-user classification labels and metadata.  Once embedded into the content, this classification metadata is a powerful asset tag that remains with the information regardless of where it goes and can be leveraged to automate data security controls.

Furthermore, the combined solution can be easily deployed and managed via McAfee ePO, a centralized management platform, reporting status across the enterprise.

To find out more how the combines solution can help your organization,  please go to http://www.titus.com/mcafee/.

About the Author

Cindy Chen

Cindy has over 10 years of experience in the cyber-security industry. As a data protection specialist, Cindy is passionate about educating the field and sharing best practices on creating a better data security culture. Cindy has conducted primary research projects on data exfiltration, and spearheaded thought leadership programs via webinars, videos, and industry roundtable discussions. ...

Read more posts from Cindy Chen

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe to McAfee Securing Tomorrow Blogs