Tuesday, December 5, 2017

Word of the Day: extrusion prevention

Word of the Day WhatIs.com
Daily updates on the latest technology terms |December 5, 2017
extrusion prevention

Extrusion prevention, also called exfiltration prevention, is the practice of stopping data leaks by filtering outbound network traffic and preventing unauthorized packets from moving outside the network. In contrast, extrusion detection simply alerts the existence of problem that should be investigated.

Network administrators responsible for maintaining data securely face unprecedented challenges when it comes to controlling the flow of proprietary data across both private and public networks. A catastrophic data breach involving proprietary information can have a substantial negative impact on an organization's market share, brand, financial health and ability to remain compliant with legal mandates.

Data loss prevention (DLP) software, which combines sophisticated network monitoring systems with real-time packet filtering, uses business rules to classify and protect confidential and critical information so that unauthorized end users cannot accidentally or maliciously share data that could put the organization at risk. In addition to being able to monitor and control endpoint activities, DLP tools can filter data streams on the corporate network and prevent unauthorized data in motion from being extruded.

Currently, there are several broad approaches to extrusion prevention. They include:

Sniffers that monitor files moving across a network. Some sniffers can be configured to look for particular types of data, such as personally identifiable information (PII), and prevent it from being transferred outside a proprietary network.

 

Sophisticated algorithms that are used by network anomaly detection (NBAD) or network behavior analysis (NBA) software can identify and stop data transfers that occur outside the normal pattern of operations.

 

Cloud access security broker (CASB) gateways that sit between the enterprise and a cloud service provider can be configured to inspect data that is streaming into and out of cloud applications. CASBs can prevent data leak by enforcing enterprise DLP policies pertaining to encryption, access, authentication and authorization.

 

Intent-based networking that abstracts and automates business requirements for transporting outbound data can take into consideration the application, the user and the user's device when preventing authorized outbound data.

Quote of the Day

"We need a strong federal law in place to hold companies truly accountable for failing to safeguard data or inform consumers when that information has been stolen by hackers." - Sen. Bill Nelson (D-FL)

 

Trending Terms

packet filtering
data exfiltration
data loss prevention
intrusion detection
data protection

 
Learning Center

Proposed data breach legislation could put executives in jail
Democratic senators introduced a new version of the Data Security and Breach Notification Act. Find out what's in the new data breach legislation.

Six criteria for buying data loss prevention products
Data loss prevention products can be a key asset for enterprises. Bill Hayes lays out the five steps to take in order to buy the right DLP tools for your organization.

Risk & Repeat: Uber data breach has implications for infosec
This Risk & Repeat podcast discusses the 2016 Uber data breach and the ensuing cover-up by company officials, and what it means for the infosec industry.

Data breach litigation: What enterprises should know
Data breach litigation can make a bad situation even worse for enterprises. Find out more about the public and private litigation they may face.

Ransomware protection helps mitigate data loss, but attacks are increasing
Ransomware protection needs to get more sophisticated, judging by a recent Druva survey that found more organizations are experiencing multiple attacks.

Writing for Business

Most major security breaches ________ human error.
a. can be attributed to
b. are due to
Answer

 

Stay In Touch
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

 

Visit the Word of the Day Archives and catch up on what you've missed!

 

FOLLOW US

TwitterRSS
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Whatis.com, click here. Please note, this will not affect any other subscriptions you have signed up for.
TechTarget

TechTarget, Whatis, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2016 TechTarget. All rights reserved.

No comments: