Compliance Commander – Sentry Print E-mail

Data Leak Prevention / Content Monitoring and Filtering Product

Since the introduction of email, then the web, and most recently instant messaging (IM), the internet has become a very effective tool for business communications. Unfortunately, these communications channels can be abused, resulting in high rates of identity theft and fraud from leaked confidential customer information. Email and web communications are ubiquitous and, therefore, are common channels for data leakage.  Industry has resisted adoption of IM, but, in many cases, these and other rogue applications have found their way onto employee PCs and are also disclosing customer data onto the internet, often through customer support operations. 

Although most of these incidents have been unintentional, the consequences are the same - a dramatic increase in fraud and identity theft, which has led to a significant number of furious customers, tarnished company reputations, regulatory fines, as well as expensive clean-up costs and litigation.

To make matters more difficult, new and often unforeseen applications keep finding their way onto corporate PCs. This trend quickly drives some “pure play” products to obsolescence, effectively as soon as they are installed, because they are inflexible when the next wave of applications hit the network. Other products may cover multiple protocols and applications, but the administrator must first define the ports and protocols which require filtering – a difficult job. Covert channels, including Trojan/backdoors and spyware which steal credit card numbers and other customer information, don’t play fair by disclosing the ports on which they will be hacking your network.

Our recent whitepaper, Fraud and Identity Theft Risk Report, of over 100 installed sites, has highlighted several business processes which represent common communication channels which leak confidential customer information:

  • Business partners
  • Customer support 
  • Mobile workers
  • Targeted attacks 

In this report, each of these processes has been documented by thousands of actual examples, all of which violate compliance laws.

The information security manager has a challenging job because the existing pillars of data security are ineffective for protecting databases against authorized users who abuse email, web, IM and other network communications. Some point solutions which address one or more existing applications (e.g. web and email) sound like a good approach, but they simply ignore other channels like IM, P2P and FTP, thereby missing critical links in the “security chain”.