We at Deltagon often talk about how e-mail DLP can help prevent data leaks and follow the fulfillment of information security in e-mail communication. In this blog, we’ll tell you what we actually mean with e-mail DLP (Email Data Loss Prevention) and how it works in practice.
Company’s information security policy often takes a stand in regards to the use of e-mail. Confidential information must not be sent by unprotected e-mail. However, e-mail is the most used means of communication for businesses and accidents happen. Sometimes because of negligence, sometimes because of ignorance. For the top management and person in charge of information security, this is obviously a problem.
An e-mail encryption solution provides users with a tool to protect their communications. But we still need to address situations where a person forgets to use the encryption. E-mail DLP measures the implementation of information security policy and prevents data leaks due to human error.
E-mail DLP prevents data leaks and follows the realization of information security policy
Deltagon’s solution analyzes the outbound e-mail traffic and identifies messages requiring confidential processing. Identification is based on data security policy definitions of what is confidential in the company and how is it labeled in documents and messages.
As a result of the analysis, e-mail messages considered confidential can be blocked or automatically encrypted. This prevents potential data leaks.
E-mail DLP creates a clear insight into the state of the implementation of organization's information security policy in regards to e-mail traffic. From the statistics it is possible to see how confidential information is being handled, how much confidential material is sent from the company and are the instructions and rules being followed.
Identifying messages containing confidential information
How is the confidential information identified? The definition can be allocated to message subject, content or even attachment. For example, the system can search for specific number or letter combinations, such as contract numbers, credit card numbers, social security numbers, or bank account numbers.
Typically, best results are obtained by relying on classification of documents, e.g. by utilizing metadata stored in files.
For statistics, it is possible to assign rules to designated groups (personal data, contracts, confidential documents, etc.). This provides easily comprehensible graphs that can be used for reporting or even training personnel in identifying confidential material.
Deltagon's solution does not identify any messages or users whose messages contain confidential information. This way we can ensure that the privacy of the individual is taken into account.
Want to hear more? Contact us.