• ABOUT US
  • Advertise With Us
  • Contact US
  • Edit Calendar
IT Magazine for Channel Partners in India | SMEChannels
Advertisement
  • Home
  • News
    • AI & ML
    • Cloud Computing
    • Cyber Security
    • Surveillance
    • Automation
    • Server & Storage
    • Power Solutions
    • Networking
  • Hardware News
    • PC-and-Notebooks
    • Component
    • Printers & Peripherals
    • Software
    • Semiconductor
  • Events & Webinars
    • Channel Accelerator Awards 2025
    • Channel Accelerator Awards 2024
    • MSP India Summit 2024
    • MSP India Summit 2023
    • Channel Accelerator Awards 2023
    • SME Channels Summit & Awards 2022
    • SME Channels Summit & Awards 2021
    • WEBINAR
    • SME AWARDS 2020
  • Women in IT
  • Corporate News
  • Interview
  • Executives Movement
  • Partner Corner
No Result
View All Result
  • Home
  • News
    • AI & ML
    • Cloud Computing
    • Cyber Security
    • Surveillance
    • Automation
    • Server & Storage
    • Power Solutions
    • Networking
  • Hardware News
    • PC-and-Notebooks
    • Component
    • Printers & Peripherals
    • Software
    • Semiconductor
  • Events & Webinars
    • Channel Accelerator Awards 2025
    • Channel Accelerator Awards 2024
    • MSP India Summit 2024
    • MSP India Summit 2023
    • Channel Accelerator Awards 2023
    • SME Channels Summit & Awards 2022
    • SME Channels Summit & Awards 2021
    • WEBINAR
    • SME AWARDS 2020
  • Women in IT
  • Corporate News
  • Interview
  • Executives Movement
  • Partner Corner
No Result
View All Result
IT Magazine for Channel Partners in India | SMEChannels
No Result
View All Result
Home News

Importance of Data Leak Prevention Technology and its Implementation in Office and Work from Home Environment

SME Channels by SME Channels
October 11, 2023
in News

After COVID in the last few years, hybrid working became a normal thing in our life. Employees started working from home. Even after that, when the company started their office, some employees were still working from home. Some were working remotely. Some were working on the contractor third party location and working from and outside India. The biggest problem we faced at this time in the process is that when the employee gets the laptop, desktop, and employer data, there is a lot of sensitive data on it. If the software is developed, then it will be source code. If the sales candidate or team member is there, then it will have sales data, customer data, if it is marketing, then marketing budgets will be there, marketing will be launched. R &D’s staff has recently developed data on their machines. If you track the last two years, every day, some data is breached. The biggest problem in the global system is the employee as the biggest reason. Any research report is taken by any big company, any consulting company, 75 -80% of it is clearly written that the internal threat is an employee. The employee we used to control, when he used to work in the organization, he was very secure, he had a lot of things in his hands, he had controls, because everyone was working from office. When the employee came home, he brought information as well as assets, he brought sensitive critical IP with him. Now the IP is so vulnerable, so exposed that it can be shared anywhere, for any benefit. We have seen that in the last few years, employees have come to cases where employees are working in 3 -4 companies.

Why are they getting jobs? Because they have skills, but they don’t get the same job. They get the same job, they get the same skills supported by some data, some information. So that information is read by their machines, which are not secure and they upload it to any services. The second thing is that we started the work from home, there are some convenience in life. Like we are in this virtual session, and you organize virtual sessions, we do virtual meetings. In this session, we have an option to upload a file. So I am sitting here, at home, with my laptop, source IP, code, any data I can share with you. So on the one hand, there is a convenience, that if you are sitting at home, it is not working. But at the same time, the effect that happened, this convenience controlled security. which means now employed can share anything on whatsapp, chat GPT, google messenger, google meets etc. When the hybrid culture moved, threat landscape also changed. Nobody steals from USB nowadays, it’s done through google drive or third party drive. The companies have balanced themselves with their operational needs like not impacting their revenue generation, business and satisfying the client but compromised their security due to convenince, Wherein data breach becomes the most important element.

Problem occurs when the company asset is handed over to the employee. But after work hours, the employee watches movies, does software downloading. One should learn how to segregate both their personal and professional documents while working on the company asset as DLP only looks into the sensitive information being leaked out of the company.

FAQ’s –

Since hybrid working is new normal, what challenges clients faces during work from anywhere model?

Data leakage has become critical for the companies especially in the HR domain to keep a tap on the employees. The intro for ISO 2700 has been added since the data leak has become very critical now days due to hybrid work mode. One cannot stop an employee from using whatsapp, chat GPT or any other software on machine, but here’s where DLP enters where it ensures no data leakage is happening even working from Hybrid mode.

Critical IP is everywhere across the organization, what are two good practices you suggest for the audience?

Critical IP is everywhere – source code, balance sheet, new marketing plan, R& D info, etc. There are a set of software’s provided to an employee according to their KRA’s but if extra softwares like whatsapp, etc are being in use which can help in leaking the data easily. They can access anywhere due to big landscape. Most organisation cannot track 90% of their employees data if scanned. Information value changes from an employee to the top most manager (hierarchy wise). IP leakage becomes very difficult if application asset and information asset both are segregated in the system.

What’s your view on the changing data leak threat landscape?

For a software development/manufacturing organisation are doing online business today. Github is the new application where in many software developers put their code as their personal asset and the company controls the data from being leaked. Many tools like flock or slack are good tools but when an employee downloads any information through whatsapp web from their home, wherein the new threat should also support the landscape. A CXO has to make sure that installing a dlp solution in a software development/manufacturing organisation co creates a use case for it.

Data Leak is an old wine in the new bottle, what’s your views?

When deployed a data leak tool, it interfaces with operating system, hardware development and drives. The baseline has changed with the above aspects since last few years.

Basic constituency still remains the same but the third landscape has changed.

How about success stories of Data Leak deployment, what worked?

Use case – when a customer is onboarded, it requires different parameters, process, operation, etc called data flow analysis. And so the parameters, use cases are defined. As a CXO it’s important to see whether the baseline, use cases meet which is very critical. No dlp is same, all are different and this is the reason why 90% deployment fails and use cases don’t match.

When use cases are matched, deployment takes place, important rule sets are to be customised which are called by default rule sets. We can also build custom rule set based on Threat landscape or IT information asset on machines.

DLP assessment is not done by 99% customers. Once DLP is deployed, profiling of application, data and software, customer rule set done, and the use cases matches, everything is done.

Printing is also very critical element of DLP. Today USB, Email and print. Although print is traditional but it’s the 3rd category where maximum data is being leaked. DLP comes in the picture where it can help take a shutterlog of the print proving machine, timestand, name of the user stored in the repository if the user does not understand what data is to be printed. It’s a tamperproof document which can be presented as the forensic report in the coufrt of law as a proof against the user if there’s breach that has taken place.

Previous Post

SME Channels Accelerator Awards 2023 Witnesses Robust Industry Participation

Next Post

Pure Storage Ushers in the Next Generation of Storage as-a-Service and Data Resilience

Related Posts

Yanbing Li, Chief Product Officer at Datadog.
Cyber Security

Datadog Launches MCP Server to Provide AI Agents with Secure, Real-Time Access to Unified Observability Data

March 10, 2026
Nithya Cadambi, General Manager of Global Centres of Excellence at Commvault
Executives Movement

Commvault Appoints Nithya Cadambi as General Manager of Global Centres of Excellence

March 10, 2026
RAH Infotech
News

RAH Infotech and PointGuard AI Collaborate to Redefine Enterprise AI and Application Security

March 10, 2026
Chandrodaya Prasad
Guest Article

Why the Next Endpoint and SASE Disruption will not Come from a Security Vendor

March 9, 2026
Raj Vattikuti (Left), Founder & Executive Chairman, Calibo and N. Chandrababu Naidu (Right), Chief Minister of Andhra Pradesh during the signing of the MoU
Corporate News

Andhra Pradesh Partners with Calibo to Advance Business Innovation with Bite Size Use Case Leveraging Data and AI

March 9, 2026
Ashish Kumar, Managing Director, OptiValue Tek
Corporate News

OptiValue Tek Partners with SFJ Business Solutions to Help Enterprises Accelerate Digital Transformation

March 9, 2026

Print Magazine

About Us

SMEChannels is a leading IT Channel magazine, which represents the voice of more than 32,000 partners in India. The focus is to work towards the growth of the entire channel ecosystem. Therefore, the magazine covers all the topics that are relevant to the partner ecosystem. Broadly we cover technologies that go as solutions and services. Therefore, the topics we cover include cloud computing, big data & analytics, security, surveillance, mobility, enterprise applications, data center, 3D printing, robotics, machine learning, IOT, etc.

Contact Us

For Editorial:
Sanjay Mohapatra, Group Editor
Email : sanjay@accentinfomedia.com
Phone No. +91 99100 97969
Manash Ranjan Debata, Editor
Email : manash@accentinfomedia.com

For Print and Online Advertisement :

Sangram Rajeswar, Marketing Lead
Email : sangram@accentinfomedia.com
Phone No. +91 7042135833, +91 9938039199

For Events and Webinar:
Sanjib Mohapatra, Director
Email : sanjib@accentinfomedia.com

Usefull Links

  • ABOUT US
  • Advertise With Us
  • Contact US
  • Edit Calendar
  • ABOUT US
  • Advertise With Us
  • Contact US
  • Edit Calendar

@2026 Powered By SMEChannels Theme By Accent Info Media

No Result
View All Result
  • Home
  • News
    • AI & ML
    • Cloud Computing
    • Cyber Security
    • Surveillance
    • Automation
    • Server & Storage
    • Power Solutions
    • Networking
  • Hardware News
    • PC-and-Notebooks
    • Component
    • Printers & Peripherals
    • Software
    • Semiconductor
  • Events & Webinars
    • Channel Accelerator Awards 2025
    • Channel Accelerator Awards 2024
    • MSP India Summit 2024
    • MSP India Summit 2023
    • Channel Accelerator Awards 2023
    • SME Channels Summit & Awards 2022
    • SME Channels Summit & Awards 2021
    • WEBINAR
    • SME AWARDS 2020
  • Women in IT
  • Corporate News
  • Interview
  • Executives Movement
  • Partner Corner

@2026 Powered By SMEChannels Theme By Accent Info Media