Roughly 60% of breaches happen through employees that have access to the data based on their role. Simply blocking the users won't work therefore "trust and verify" is where GDP will monitor those people and DLP would potentially block based on customer policy. Combining monitoring with DLP should then enforce the "blocking" of the data from leaving the environment. Both solutions should send the information to the Security Intelligence solution to correlate and alert the SoC there is an issue and potentially a breach.
------------------------------
JIM BOYLES
Cybersecurity Architect
IBM
MI
------------------------------
Original Message:
Sent: 02-28-2019 12:38 PM
From: Calvin Bench
Subject: Hi-Def Data Security
Hi Community
Check out the presentation I gave with business partner Forcepoint at THINK
https://community.ibm.com/community/user/security/viewdocument/high-def-data-security-collaborati?CommunityKey=aa1a6549-4b51-421a-9c67-6dd41e65ef85
Is integration of solutions something you care about?
Is connecting endpoint DLP with Guardium Data Protection attractive?
------------------------------
Calvin Bench
Offering Manager
Austin TX
------------------------------