data security
Categories: network security,prescription
digitalsuretyprescription
demand analysis
Security incidents are frequent and leaks are getting worse. For example, Yahoo Data Breachgate, Jingdong Data Breachgate, Hillary Emailgate and so on. According to Gemalto's Data Breach Level Index: 1.9 billion records were compromised or stolen in the first half of 2017, more than the total for the whole of last year (1.4 billion) and more than 1,60% more than the second half of 2016.
In September 2013, the telecom industry implemented the Provisions on the Protection of Personal Information of Telecommunications and Internet Users, Article 14 of which states that telecom regulatory agencies and their staff shall keep confidential the personal information of users known in the course of performing their duties, and shall not disclose, tamper with, or destroy such information, and shall not sell it or illegally provide it to others; in July 2015, the financial industry issued the Guiding Opinions on the Guiding Opinions on Promoting the Healthy Development of Internet Finance" in July 2015, Article 17 requires that practitioners should effectively improve the level of technical security, properly store customer data and transaction information, and shall not illegally trade or disclose customer personal information.
Information leakage escalates, national legislation safeguards. The People's Republic of ChinareticulationOne of the backgrounds of the Security Law stems from the seriousness of personal information leakage. The Net Security Law imposes new requirements on network operators. Article 21 requires network operators to adopt data classification, important data backup and encryption measures to prevent network data from being stolen or tampered with.
Products
Tianqing Hanma USGData Leakage Prevention System (DLP)It is a sensitive data leakage prevention product independently developed by Qixingchen, which analyzes the data from three perspectives: the content of sensitive information, the owner of sensitive information, and the operation behavior of sensitive information, and through a clear and intuitive view, it allows managers to understand the use of sensitive information within the enterprise in a timely manner. It helps managers to identify potential leakage risks within the organization, supervise the compliant and reasonable use of important data within the organization, and safeguard the organization's intellectual property rights and core competitiveness.
DLP consists of two major components: the control center and the detection engine. The control center is mainly responsible for policy management, device management and event management, while the engine is mainly responsible for content detection, response blocking and event reporting.
Functional Features
Technical Advantages
- Automatic classification and clustering based on Chinese language processing and word segmentation technology, using unsupervised automatic clustering algorithms for automatic clustering of samples and extraction of semantic features of the category, based on the semantic features of the generation of classification rules, and automatically classify and classify the documents that the user wants to protect; but also through the addition of positive and negative samples, to reduce the rate of false positives and omissions.
- Accurate content recognition combines document type recognition, document content recognition, and document location recognition to fully parse documents.
- Intelligent semantic analysis integrates the combination of key features such as mature Chinese participial thesaurus, intelligent fuzzy matching, and automatic recognition of Chinese traditional characters to make the localization know more about Chinese.
- Multi-dimensional intelligent detection of keywords, regular, file fingerprints, classification fingerprints, file attributes and other detection algorithms, cross-detection, noise reduction, accurate alarm .
- Comprehensive leakage protection monitors and protects all aspects of local terminal leakage, network transmission leakage, and storage sharing leakage.
- Centralized management and analysis of terminal DLP, network DLP (bypass DLP, MailDLP, WebDLP), and storage DLP saves purchasing expenses and reduces management costs; facilitates correlation and analysis of terminal and network leakage events to improve detection efficiency.
typical application
Typical scenarios of Tianqing Hanma USG Data Leakage Prevention System are illustrated below:
Terminal DLP scans terminal files, finds and tracks the use of sensitive files, and stops the flow of sensitive files through peripherals.
Storage DLP scans server files, finds and tracksSensitive documentsThe distribution of the information is communicated to the administrator in a timely manner.
Bypass DLP monitors data in transit, detects sensitive data leakage behavior and alerts.
WebDLP is deployed at the Internet egress to monitor outgoing or uploaded data to the Internet and block sensitive data as it is found.
MailDLP is deployed in front of mail servers to monitor outgoing emails and respond in many different ways when sensitive data is found, such as bouncing, redirecting, modifying, or approving.