How to Create a Strategy to Deploy an Effective DLP Service Posted on April 19, 2012 by Tim Burke Data loss prevention (DLP) is a powerful security tool. So powerful that it’s tempting to try a broad, pervasive implementation. But this can backfire into a flood of false alerts — unless you first think through your DLP strategy: Decide/define what data you need to protect and how. Understand your organization’s business workflow, including how it uses sensitive data and where your network infrastructure is susceptible to data leakage. Develop a security policy that establishes organization-wide standards and procedures for data ownership and usage — and includes the means to enforce those policies. Seek out a DLP service provider who makes it easy for you to deploy DLP in cost-effective phases at your own pace. Forge an implementation plan that nails down specifics concerning your network, endpoints, discovery requirements, and so on. Aim initially for basic DLP capabilities, usually focused on (select one) network, endpoint, or storage (discovery) requirements — and just a single policy (to avoid being overwhelmed with alerts). Once one capability is deployed and optimized, you can tackle the next one with confidence and efficiency. DLP is not a box solution. To be effective, it must be deployed in the context of well-considered security policy and a willingness to assess and rank corporate data, apply user-privilege and access controls, routinely audit policy and data flows, and train employees about acceptable use. A trusted security services advisor can help you map your objectives to what’s possible with DLP and guide you through a successful DLP strategy, planning, and deployment process.