Debate: DLP for data in motion is more effective than DLP that secures data at rest.

PRO

Joe Leonard, director of technology, Global Velocity

I'll be one of the first to advocate a fully layered approach to securing sensitive data. However the stark reality is that CIOs and CISOs face budget constraints that force them to prioritize which solutions get implemented first. As such, the question is not “data at rest” or “data in motion,” but rather which should come first.

It is important to recognize that most – if not all – data at rest and endpoint solutions require planning and resources, as every relevant endpoint and system in the enterprise must be “touched.” In contrast, a properly implemented network-based, data-in-motion solution can be significantly less resource intensive to implement and maintain and can provide not only extremely fine-grained content control but also exacting controls over bandwidth use and which applications are allowed to communicate specific data to whom.

Ultimately, a solid, well planned “data in motion” approach can gain 80 percent of the bang for 20 percent of the buck, while providing additional operational benefits.

AGAINST

Todd Feinman,CEO, Identity Finder

Data-at-rest DLP finds the root cause of where data leakage can occur and prevents it at the source. The problem is employees store data on desktops, file servers and even home computers, and all data is vulnerable.Organizations must periodically clean these systems to prevent data loss at the source.  

Data-at-rest DLP searches files and emails with a deeper analysis to determine the context of sensitive information, while eliminating false positives. End-user client interfaces can be used by any employee, the actual data owners, to affect change and protect information. No expensive hardware, professional services or training is required. Administrators have management, reporting and remediation capabilities from a centralized console, but they're empowering employees not only to see the problem but also take action to fix it.

 In every category – including accuracy, ease of use, speed and cost-effectiveness – today's data-at-rest solutions meet or exceed organizations' business needs.

close

Next Article in Features

Sign up to our newsletters

More in Features

Suspect everything: Advanced threats in the network

Suspect everything: Advanced threats in the network

Are there ways to catch sophisticated malware that hides in trusted processes and services? Deb Radcliff finds out.

Urgent care: Safeguarding data at health care providers

Urgent care: Safeguarding data at health care providers

Health providers have pressing reasons to now embrace security, says INTEGRIS Health's John Delano. Karen Epper Hoffman reports.

Deciphering cloud strategy

Deciphering cloud strategy

There are steps security pros can take to achieve greater peace of mind with cloud implementations, reports Alan Earls.