Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Data Loss Prevention – Two Approaches to Save Corporate Reputation and Protect the Bottom Line

By Todd Feinman
Security Newswire
February 8, 2011

 

Every two seconds someone becomes a victim of identity theft in America and last year, identity theft totals amounted to $100 billion. Even thoughmany organizations are expanding security efforts, the number of identity theft incidents is still increasing as thieves continue to change their tact on a daily basis.

Data Loss Prevention (DLP) has become a top priority for federal and state governments as well as industry regulators, whom have enacted laws with monetary fines, forcing organizations to improve protection of sensitive data.

Data leakage incidents cause breached organizations to suffer significant loss. The total average cost of a data breach has reached $92 per record compromised while the average total cost per reporting company was more than $2.75 million per breach and ranged from $165,000 to almost $7.5 million. The cost incurred is more than just the data that has been lost or corrupted as organizations now often pay for credit monitoring services for the impacted individuals. Organizations also suffer a damaged reputation because of laws stating that all security breaches must be publicly disclosed.

 

Data-at-Rest Vs. Data-in-Motion

Organizations still struggle with the challenge of how to tailor a data loss solution to fit the company’s needs. There are two approaches to information security to help alleviate the situation – “Data-at-Rest DLP” and “Data-in-Motion DLP”.

Growing in acceptance is the Data-at-Rest approach as it is being adopted because of its ability to guard data at its source. This approach refers to data stored on computers, storage devices, or being used by the data owner.

The Data-in-Motion DLP solution refers to protecting data transmitted over a network. It is successful in preventing data from leaving the organization when individuals send information that is unprotected.

While there is no “silver bullet” for all types of threats, data loss can be prevented by understanding the most reoccurring breach type and enacting a solution to best treat the problem, as shown in the table below:

 

Data Breach

DLP Approach

Hacker (includes malware)

Data-at-Rest

Digital Media (lost/stolen computers, backups, etc.)

Data-at-Rest

Web Content

Data-at-Rest, Data-in-Motion

Accidental Transmission (e-mail, etc.)

Data-in-Motion

Physical Media (lost/stolen papers, etc.)

Policy

Dishonest Insider

Policy, Access Controls

Other/Unknown

Access Controls

 

Choosing the Right Data Loss Prevention Technique for Your Organization

Preventing the majority of data loss problems, Data-at-Rest solutions allow organizations to be proactive because the technology secures data at its source. Advanced technologies allow core reporting on risk exposure which can create an informative analysis showing the patterns over time. Organizations should periodically clean their systems to prevent data loss at the source because, knowingly or not, employees may have personal information stored in a variety of locations, including emails, databases, websites and desktop files.

Data-in-Motion solutions may stop the transmission or sending of information, but they don’t help the problem at the source. Additionally, employees may feel that this is intrusive or interferes with productivity, if the emails they try to send continually get blocked, for example.

The responsibility for managing discovery and remediation efforts are moving in some organizations from the IT staff to the individual data owners. However, Data-in-Motion solutions usually require a centralized governing system that is run by an IT administrator. With Data-at-Rest solutions, it is important for organizations to empower employees to not only see the problem but to also take action to fix it even though administrators may have management, reporting and remediation capabilities from a centralized console. By transferring the processing power and remediation responsibilities to an entity’s data owner, the organization has the power to inform and educate its employees and positively influence their behavior.

Some Data-at-Rest solutions provide users with options regarding how to handle private information once it is located, including the ability to digitally shred, encrypt, redact or quarantine it. Data-at-Rest solutions help minimize exposure risk, and are often less costly than Data-in-Motion solutions.

Data-in-Motion systems are associated with higher ongoing maintenance costs, software costs, professional services costs and hardware costs as minimum infrastructure requirements for these solutions typically cost from $25K-$150K. Professional services required to configure Data-in-Motion systems can be more costly than the software itself, and the higher level of configuration and customization desired by an organization, the higher the cost.

To maximize the investment, organizations should look at solutions with only software and maintenance costs and minimal hardware requirements. Data-at-Rest solutions can typically be installed on simple pre-existing hardware, and do not require IT professionals to configure and setup the technology. Total cost for a Data-at-Rest solution is often less than half the cost of installing a Data-in- Motion solution.

 

Reputation, the Bottom Line and Data Loss Prevention 

Studies show that the most common data breaches occur from the loss of digital media (44 percent) and hackers (22 percent). Clearing the information before the loss occurred, these intrusions might have been avoided with a properly implemented Data-at-Rest approach to DLP. The “socially typical” types of data breaches account for 6 percent of all data historically lost, such as employees accidentally emailing sensitive data, showing they are not major sources of data breaching.

Many IT departments do not have the budget to implement both Data-at-Rest and Data-in-Motion solutions even though it may increase their protection. It is important to remember that the greatest threat occurs from unsecured Data-at-Rest breaches. Therefore selecting a security solution that helps protect data at its source will provide the majority of organizations with the best protection for the investment.

KEYWORDS: data IT

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Todd Feinman is CEO of Identity Finder, a global leader in identity protection and data loss prevention.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • half open laptop

    What data loss prevention can do to protect your most valuable asset

    See More
  • Frank Figliuzzi talks on security insider risk and brand reputation

    Spend 60 minutes learning to protect your corporate brand & reputation in the digital age

    See More
  • SEC0219-data-Feat-slide1_900px

    How to protect ERP data when access to corporate networks is both ubiquitous and for sale on the dark web

    See More

Related Products

See More Products
  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing