3/6 Data Security Market

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Difficulty
Beginner
Video Transcription
00:00
If you've been to the expo floor of any cybersecurity industry conferences, you might have seen the seemingly unending rows of booth after Booth.
00:11
All of them will claim to help with cybersecurity, but in order to choose the products that would be effective in stopping data breaches, it is important to understand the basic categories and classes of data security products.
00:26
Part three goes over the data security market.
00:29
It explains why intrusion, prevention, intrusion, detection and anti virus are not enough.
00:35
It goes over the classic categories of information protection products, such as information rights management did a loss prevention, digital rights management and a new category of product called Data Breach Prevention. You don't see new product categories every day, so it should be interesting.
00:55
Intrusion prevention products have classically blocked threats and contained their damage,
01:00
while intrusion detection products have classically found threats and responded to them.
01:06
Anti virus is specifically for looking for malware and stopping malware.
01:11
A data centric approach is needed to stop data breaches.
01:15
These products that stopped inner peaches should focus on data regardless of the avenue of attack.
01:21
For example, zero days malicious insiders, malware or stolen laptops
01:26
in this example, I PS and idea smite stop
01:30
zero days and anti virus might stop malware. But what's the point of all these products if the human
01:38
malicious insider or even human errors can still cause data to be breached?
01:44
A classic example is Edward Snowden at the National Security Agency and NSA probably had a lot of high end technology to detect malware and stop zero day exploits. But what about Edward Snowden? It was a very low tech attack. He just took the data, copied it and walked out with it.
02:01
If S a was using a data centric approach, they would have been able to stop. Edward Snowden
02:10
Information Rights Management Algorithmic Lee protected data through custom application specific plug ins.
02:17
This means that the Iran vendor can only protect what they know about leaving security gaps in the products that they do not know about and therefore cannot protect.
02:28
The holistic information security solution should have compatibility with unknown software and unknown file formats because not all the file formats in the world are known to or I'm going to be known to in Iran vendor.
02:43
An example is ah, hospitals custom medical imaging application, which could read scans from Let's Say, M R I machines. And let's say the vendor has also gone out of business.
02:53
Chances are that the imaging application was not known to the Iran product when the imaging vendor was in business.
03:00
Now that the imaging vendor has gone out of business, there is a near certainty that the Iran product will not protect the imaging application.
03:09
A generic approach that does not need to know about what is protecting would have closed the security gap.
03:21
Data loss Prevention uses signatures to scan for sensitive data and often requires human analysts to waste their valuable time looking at repetitive alerts, which may contain false positives and false negatives.
03:35
In the cyber security space. Human analysts are in short supply due to the cyber security skills gap, making human analyst time extremely valuable.
03:46
Human analysts should be doing more important and intelligent things than looking at repetitive alerts, which can be easily automated by the security product.
03:54
I duly, there would not even be any alerts to look at
03:59
deal pecan, protect structured data but not unstructured data. So the security gap would be that any unstructured data leaving the organization could possibly contain sensitive data. Even within structured file formats, Steganography would be able to bypass scanning examples were given before
04:17
in this course about
04:18
steganography and in text, for example. Also, custom file formats and custom applications cannot be protected.
04:27
That's the same problem as with Iran that we discussed.
04:30
Finally, the phrase sensitive is not even clearly defined. And Enterprises Deal Peak Team can have many meetings about the definition of sensitive for their organization, but still not come to any agreement.
04:46
Digital rights management is similar to information rights management, except that it focuses mostly on media files such as audio, video and video games. Sometimes it requires special hardware and is usually not general purpose for all file formats.
05:02
Data breach prevention is a new product category that is a mix of I R M Deal P and D R M because it takes the strengths of all of these categories, but not the weaknesses of all three categories.
05:16
It is better than I R M and D R M because it is independent of the application and file format that it's protecting, which means that it can protect applications that were not even designed to be protected by the D. B P application. DBP is better than DLP because there are no heuristics signatures or alerts
05:35
which avoid wasting valuable human analyst time,
05:40
repetitive tasks.
05:42
In addition, DDP is resilient to steganography because there are no heuristics.
05:51
This is a Venn diagram overview comparing in contrast, ing the characteristics of D. V P, D. R EM Iram and Deal P.
06:01
As you can see, DBP takes the strengths of all the other product categories, but not the weaknesses.
Up Next
4/6 Evolving The Market
5/6 Data Formats
6/6 A1FILO
Instructed By