- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
Network World - The rapid consolidation in the anti-data leakage market in the past year is enough to make an IT manager’s head spin: This segment of the security sector ballooned to include dozens of start-ups, then even more quickly dwindled down to a few independent companies as larger vendors cherry-picked smaller ones to add data leakage to their own product portfolios.
A rough estimate shows at least $1.6 billion was spent by vendors acquiring anti-data leakage -- also referred to as data-loss prevention or data-leak prevention -- start-ups over the past year, and that figure only includes the transaction values that were made public.Now that the spending spree is winding down and the acquiring vendors are revamping their product road maps to include these new wares, observers say enterprises can look forward to having the benefits of these security products baked into existing offerings that they’re probably already using.
“We found there was a significant hole in the security product suite vendors,” says Trent Henry, vice president and research director with Burton Group. “The hole has been information-flow protection and protecting the endpoint, not just network content flow.”
As many of the data leak products (compare products) evolved from protecting information “in motion,” or being e-mailed, sent via instant messaging or copied to removable media, but also data “at rest,” many large vendors thought it best to buy rather than build these capabilities.
Turning anti-data leakage into a feature of existing products represents a logical progression, analysts agree. In fact, many existing products are already moving in that direction; e-mail security offerings from companies such as Proofpoint, Secure Computing and Google’s Postini already have some basic data-leak-protection functions that can, for example, scan outbound e-mail, instant messaging and Web traffic and flag messages that contain information thought to be sensitive, such as Social Security or credit card numbers.
Going beyond these basic features to add the finely tuned content-inspection and policy-enforcement capabilities of some data-leak-prevention tools to existing security offerings would reduce the number of products operating at an organization’s gateway, and offer universal management and policy enforcement to simplify administration.
Knowing what’s going out of the corporate network, and being able to stop policy violations, is an important part of what makes anti-data leakage valuable, says one enterprise user.
“You can generate all the polices that you want, but unless you have some kind of monitoring and enforcement mechanism, you don’t know if a policy is working or not,” says Bob Gorrie, information security project manager at USEC, a supplier of enriched uranium fuel for commercial nuclear power plants based in Bethesda, Md., which uses Vontu products.