top of page

DLP-Data Leak Prevention

In summary, DLP is the system deployed to identify, monitor, and protect data in use, in motion, and at rest. For DLP to work properly, it is necessary to locate and classify data. Then, it is necessary to determine the flow of the data, how it is used and their place in our overall workflow, and correct the wrong workflows.

 

Pursuant to the relevant articles of the Personal Data Protection Law No. 6698, Institutions have legal obligations and responsibilities in the processing of personal data in terms of protecting the fundamental rights and freedoms of individuals, especially the privacy of private life.

 

“In order to protect the very important personal information of public institutions and citizens, it is necessary to establish a “Data Leakage Prevention” system on clients and servers within the institution.”

 

DATA TYPES IN DLP

The job/purpose of data leakage prevention technology, which is evaluated in the category of "data security" in information security, is to protect data throughout its life in the network, storage areas and end-user (end) points. Accordingly, data is handled in three different ways in DLP:

1. Data in Motion: It is a type of data that moves within the network, that is, it is in constant motion over transmission channels such as e-mail, instant messaging, web and P2P.

 

2. Data at Rest: It is the type of data that is sensitive in databases, file systems and other special storage units that is queried and used when necessary, and that is generally required to be protected in the first place.

 

3. Data in Use: It is an active data type that is connected with sensitive and confidential data, although it is the type that the end user constantly uses and processes.

 

Integration of DLP with Security Products

Thanks to the integration of DLP with security products, only a holistic data security can be mentioned.

 

Integrating DLP with other security products can broaden the security coverage and significantly reduce the overall burden on all security products. While any security product can do some of the tasks of DLP, it may not cover all of the policies in DLP or, conversely, in cases where the protection function of DLP is not sufficient to block, protection may be more effective by complementing each other.

bottom of page