Watch Metomic CEO, Rich Vibert, chat with Christopher Reed, CISO at SunFire & Mackenzie Jackson, Developer Advocate at GitGuardian about the key differences between DLP and DSPM and what they mean for your organisation.
For decades, security professionals have been managing the security of their data leveraging Data Loss Prevention (DLP) tools. However, contemporary teams are embracing a more holistic approach through the adoption of Data Security Posture Management (DSPM).
As new cyber security threats emerge on an almost daily basis, companies are understanding the significance of a comprehensive strategy for safeguarding sensitive data with holistic DSPM solutions.
Whereas traditional DLPÂ stops unauthorised access and transmission of sensitive information, sometimes acting as a blocker to productivity, DSPM tools, such as Metomic, focus on detecting and protecting data without getting in the way of employees doing their jobs.
đ»Webinar: Watch Metomic CEO, Rich Vibert, chat with Christopher Reed, CISO at SunFire & Mackenzie Jackson, Developer Advocate at GitGuardian about the differences between DLP and DSPM. Together, they shed light on DSPMâs fundamental principles, its practical implications, the latest trends and innovations, and its pivotal role in modern cybersecurity.
Take control of your sensitive data with Metomic, your #1 DSPM tool for SaaS, Cloud and GenAI. Metomic is a DSPM vendor that continuously monitors your ecosystem to detect sensitive data on autopilot, alerting your team to critical risks created across the business.
Book a personalised demo to uncover how Metomic can help you navigate comprehensive security and safeguard your data integrity effectively.
There has been talk of DSPM replacing DLP completely, and the trio talked about the downfalls of using DLP tools, such as the blocker they can put on productivity. However, it turns out itâs best not to write it off just yet.Â
Mackenzie said, "I know we've been bashing DLP a little bit, but there still needs to be that component of actually preventing that data from leaving as well. It's less about trying to change or remove it, it's more about adding layers of security to that - that's really what DSPM is about.
âDLP has been all about focusing on outside the wall and DSPM is including inside the wall security as well. We still need both. DLP absolutely has its place, but it's just not enough anymore. We need to add components to it."
With a multiplicity of new application services available for employees to use, itâs not just about having a wall of defence anymore; itâs about having multiple layers in place to control the many different avenues a threat can originate from.Â
Mackenzie said, âItâs not just about having this wall - itâs about increasing your posture. Itâs about having multiple layers of defence, and having lots of different types of controls and access.âÂ
DSPM answers that call, bringing a more holistic approach to data security. However, Chris added that organisations are a little behind the times with using it.Â
âItâs a paradigm shift weâve needed for a while,â he said, âbecause data is spreading across your organisation, and having that visibility of where it is across all your services and technologies, thatâs the hard thing to do. We definitely need more of a governance posture with it.âÂ
When employees were working in offices five days a week, the network perimeter was easier to quantify. But now that thereâs so much more data in the cloud, it can be difficult to control data that sprawls across many different platforms and SaaS applications.Â
"We used to have much more control over our data,â explained Mackenzie. âAnd now we've put everything into the cloud. What's interesting is if we look at the cloud, itâs still a data server - it's just managed by someone else. So we've lost that wall. We've lost control over that now. I'm not here to say that's necessarily a bad thing because we all know the benefits, but we have to be aware of the security challenges that this massive transition into the cloud or into other people's data servers has actually created for us."
Chris added that the impact of the pandemic meant the cloud was the go-to solution for most businesses. âIt's almost like there's been a veil of trust added in there with the pandemic,â he said. âThat was a huge boom of, âeveryone has to go remote. We have to do this to keep business running.â And with that, people forget that it's still a shared responsibility when you're putting that data within a public or private cloud."
While it may be easier to allow everyone access to everything in the name of productivity, this might be a lot more difficult to tidy up after a data breach has taken place.Â
"We forego some control to be able to move faster,â Mackenzie said. âAnd so it's much easier to produce some admin credentials or admin keys and give them to everyone. Then, you don't have to manage multiple keys, but that's a terrible security posture. Having these different levels in understanding who should have access to what, making sure that's well documented and mapped out - there's a way to actually audit and enforce that.Â
âThat's going to be a really important step in actually starting to reduce some of these more high valued leaks that are coming from it. I feel like that's a step that's often overlooked, especially when people get into panic mode."
Being proactive in setting access controls is essential to prevent data leaks.
It all depends on what your priorities are as a business, but according to Christopher Reed, you should be looking at the key components of a DSPM solution, which incorporates data discovery and access controls.Â
âYou still want to be looking for all those key components of the DSPM solution - the type of controls that you want, those preventative, corrective, detective controls to ensure that you can actually do a full holistic posture,â he said. âAnd that's the whole idea of having a posture. You have a stance to say, âI know we might have a gap. It might not be the most prioritised one at this point in time, but we know where it is. We know what to do. We're aware of it."
And focusing on whatâs right for your business is crucial, as Mackenzie explains: "The type of information that you really want to secure is going to be different for a healthcare company than it is for a cloud service provider. I think you really need to look at the type of data that you're securing. Is this the right tool for me? Is it going to create too many false positives? And then the last thing you need to look at is from a cost perspective as well. I donât always go with the cheapest tool."
Metomic's DSPM solution detects and protects your most sensitive data wherever it lives across your SaaS, cloud and GenAI ecosystem.
Book a personalised demo to uncover how Metomic can help you navigate comprehensive security and safeguard your data integrity effectively.