FortiGate-200E 1 Year FortiGuard Data Loss Prevention Service - FC-10-00207-589-02-12

  • Identify sensitive information across multiple on-premises and cloud-based systems
  • Prevent the accidental sharing of data
  • Monitor and protect data
  • Educate users on how to stay compliant
  • Service Length: 1 Year License
  • Manufacturer Part #: FC-10-00207-589-02-12

NOTICE: Fortinet License & Renewal products may only be activated in the United States of America.

Emailed Tomorrow Morning

$716.47
7% OFF! $770.40

Important Notice

All orders placed before 3pm EST will be emailed today. Return Policy

DLP, or Data Loss Prevention, is a cybersecurity solution that detects and prevents data breaches. Since it blocks extraction of sensitive data, organizations use it for internal security and regulatory compliance.

DLP enables businesses to detect data loss, as well as prevent the illicit transfer of data outside the organization and the unwanted destruction of sensitive or personally identifiable data (PII). It is also used to help organizations with data security and ensure they comply with regulations like the California Consumer Privacy Act (CCPA), EU General Data Protection Regulation (GDPR), and Health Insurance Portability and Accountability Act (HIPAA).The terms "data loss" and "data leakage prevention" are often used interchangeably, but DLP security enables organizations to defend themselves against both. DLP allows businesses to:

  1. Identify sensitive information across multiple on-premises and cloud-based systems
  2. Prevent the accidental sharing of data
  3. Monitor and protect data
  4. Educate users on how to stay compliant

Why You Need DLP

The threat of data breaches—incidents where protected is stolen, used, or viewed by an unauthorized individual—has rapidly increased as the world became more digital. There were more than 3,800 breaches in the first half of 2019 alone. DLP is a crucial tool in helping businesses protect their data.

Personally Identifiable Information (PII)

PII is data that could potentially identify an individual or distinguish them from another person. This includes end-users’ email addresses, mailing addresses, and Social Security numbers, as well as IP addresses, login IDs, social media posts, and biometric and geolocation information. There are stringent regulations in place to protect this, such as GDPR, that grant people more rights around how companies handle their data and impose heavy fines for noncompliance and breaches.

DLP security enables businesses to classify, identify, and tag data and monitor activities and events surrounding it. It also provides the reporting capabilities that let organizations complete compliance audits.

Intellectual Property (IP)

Intellectual property includes software, proprietary data, and original works. IP owners need to ensure their digital assets are secure behind proper security protocols and defenses, including firewalls, restricted access privileges, and intrusion detection and prevention systems.

Malicious actors who gain access to intellectual property may cause severe losses by destroying irreplaceable information or code, copying protected assets and selling or distributing them on the Internet, and otherwise exploiting unauthorized access for their own gain.

HIPAA Compliance

HIPAA places extensive data security requirements on all businesses that have access to, process, and store any protected health information. The organization defines guidelines, policies, and procedures for maintaining the privacy and security of individually identifiable health information. It also outlines offenses and civil and criminal penalties for failing to protect this data.

Like GDPR, DLP is vital for organizations that need to comply with HIPAA. It allows them to identify, classify, and tag data that is covered by regulations and ensure end-users are protected.

How DLP Works

DLP systems protect businesses’ data by identifying sensitive information, then using deep content analysis to detect and prevent potential data leaks. This content analysis uses methods like keyword matches, regular expressions, and internal functions to recognize content that matches a company’s DLP policy. As a result, businesses can identify, monitor, and automatically prevent the theft or exposure of protected data.

Define Sensitive Data

The first step in deploying DLP is for businesses to define the sensitive data they want to protect and build a DLP policy around. This could be credit card details, email addresses, and Social Security numbers, or simply a list of names in a spreadsheet. 

A DLP policy contains: 

  1. Locations and systems where data needs to be protected
  2. When and how to protect data
  3. Rules that define sensitive data and actions when a security risk is discovered
  4. Conditions that assign different actions to different risk levels

Take a Proactive Approach

Simply having a DLP solution in place is not enough to keep attackers at bay. Businesses need to monitor user activity and protect confidential data when it is at rest, in use, and in motion.

  1. Data in motion: Also referred to as data in transit, this is data that is actively moving from one location to another, either over the internet, between networks, from a local storage device to the cloud, or through a private network. Data can often be less secure while in motion, so it is vital to have effective data protection measures in place.
  2. Data in use: Data that is currently being accessed, erased, processed, updated, or read by a system is considered in use. This includes information that is stored or processed in databases, CPUs, or RAM, such as a user requesting access to transaction history in their online banking account. 
  3. Data at rest: This is data that is not actively moving between devices or networks and is archived or stored on a device or hard drive. Data at rest is considered less vulnerable than data in motion, but it can be considered a more valuable target by hackers. It is therefore important to have security measures in place to prevent cybercriminals from gaining access to it.

Detect and Respond in Real-Time

DLP uses several methods to detect sensitive data, but the most common is regular expression pattern. This analyzes content for common patterns, such as 16-digit card numbers or nine-digit Social Security numbers, alongside indicators like the proximity of certain keywords.

For example, a Visa card has 16 digits, but not every 16-digit number will be a credit card number. So DLP performs a checksum calculation to confirm whether the numbers match the patterns of various brands. It also looks for the existence of keywords like "VISA" or "AMEX" in proximity to dates that could be an expiration date to decide whether sensitive information is at risk.

When a violation is discovered, DLP remediates it by sending alerts, encrypting data, and other actions that prevent users from accidentally or maliciously sharing sensitive information. It also provides reports that enables businesses to meet compliance and auditing requirements, as well as identify areas of weakness.



More Information
Product NameFortiGate-200E 1 Year FortiGuard Data Loss Prevention Service
SKUFC-10-00207-589-02-12
ManufacturerFortinet
ActiveNo
Service Length1 Year License