Top 6 Questions to Ask Your Cloud DLP Vendor: Robust DLP Capabilities

Netskope

We’ve put together an ebook of considerations when choosing a cloud DLP vendor to protect sensitive data in the various cloud services that your employees use. We’ll go over the fourth consideration in this blog post.

We’ve put together an ebook of considerations when choosing a cloud DLP vendor to protect sensitive data in the various cloud services that your employees use. We’ll go over the fifth consideration in this blog post.

Many organizations have unique processes and requirements when it comes to sensitive data in terms of collection, the various types, where the data resides, and more. Oftentimes, basic DLP capabilities may not cover all the sensitive data that an organization collects or would cause a large number of false positives, necessitating more advanced DLP features to meet the custom requirements of the organization.

Question 5: Are the included DLP capabilities robust enough to meet the organization’s unique requirements around sensitive data and reduce false positives?

Finding and securing sensitive content across cloud services is critical. Many organizations, including highly regulated ones, have sensitive data that goes beyond those that can be found with pre-defined DLP profiles. To reduce the number of false positives, CASBs need to have advanced DLP features like exact match, fingerprinting of documents, support for custom keywords with weight dictionaries, and more to meet the needs of these organizations and reduce the complexity of rules and number of false positives.

What to look for: Look for solutions that include capabilities like support for 3,000+ language-independent data identifiers, 1000+ file types, proximity analysis, volume thresholds, international double-byte characters, document fingerprinting, content exact match, “and” and “or” rules, optical character recognition (OCR) and validation mechanisms such as Luhn check for credit cards. Require integration with on-premises DLP solutions so you can perform the first pass of detection and protection in the cloud, and then backhaul suspected violations to your highly-tuned systems on-premises via secure ICAP for further inspection.

Test for it: Test for it by using OCR to find sensitive data in images or fingerprinting a document being uploaded in cloud services and confirming the coaching message that appears. Perform actions on that content like encryption, quarantine, or legal hold.

For the full ebook, go here.