Everything about Data Classification and DLP Data Loss Prevention By Luv Johar & Akshay Dixit

Поделиться
HTML-код
  • Опубликовано: 1 дек 2024

Комментарии • 25

  • @kirandeepkaur7447
    @kirandeepkaur7447 4 года назад +3

    Akshay your voice having all answers that you are very confident on your knowledge,concept and enthusiastic way to explain..knowable session :) Luv thanks for explaining things.

  • @subro.sengupta
    @subro.sengupta Год назад +2

    Very informative and high quality content. Akshay's delivery is amazing. I absolutely loved it! Thanks Luv for organising this insightful session. You've have really helped me out!

  • @vback4238
    @vback4238 7 месяцев назад +1

    Awesome session!! I learned a lot.

  • @eanobah8919
    @eanobah8919 9 месяцев назад +1

    very helpful, thank you for this

  • @Sricha1237
    @Sricha1237 3 года назад +1

    Very useful video thanks Akshay

  • @ratnesh12100
    @ratnesh12100 2 года назад +1

    Nicely explained.. thanks

  • @sairamjalli8861
    @sairamjalli8861 3 года назад +3

    Does DLP have capabilities like ips, antivirus and threat detection.

    • @Techfortress-616
      @Techfortress-616 3 года назад +1

      DLP solutions are not capable of doing mentioned features.

  • @Techfortress-616
    @Techfortress-616 3 года назад +1

    Perfect Explanation. (y)

  • @vidhimarkhedkar8208
    @vidhimarkhedkar8208 4 года назад +2

    Is there any certification available to become DLP implementor?

    • @luvkashyap
      @luvkashyap 4 года назад

      Many starting with Security+, CISSP and so on. They all would cover to certain level and depth concepts/fundamental around Data Protection !!

  • @umeshkharat5091
    @umeshkharat5091 3 года назад

    Nice

  • @devendrapandey3124
    @devendrapandey3124 9 месяцев назад +1

    Search a lot but get from here

  • @ketansrivastav1923
    @ketansrivastav1923 3 года назад +1

    Sir do you have online classes...

  • @honeyjoshi5650
    @honeyjoshi5650 2 года назад

    How long does it take for dlp to get triggered?

    • @LearnITSecuritywithLuvJohar
      @LearnITSecuritywithLuvJohar  Год назад +1

      The time it takes for a Data Loss Prevention (DLP) system to trigger or respond to a potential data breach or policy violation can vary based on several factors, including the specific DLP solution, the organization's configuration, and the nature of the incident. Here are some key factors that influence the response time of a DLP system:
      Real-Time vs. Periodic Scanning: DLP systems can operate in real-time, where they continuously monitor data in motion, data at rest, and data in use. In this case, triggers can occur almost instantly when a policy violation is detected. However, some DLP systems also perform periodic scans, which may introduce a delay in detection.
      Policy Configuration: The speed of detection depends on how DLP policies are configured. Policies can be set to trigger immediately upon detecting a violation, or they can be configured with thresholds or delays to reduce false positives.
      System Performance: The efficiency and speed of the DLP solution itself can impact response times. Faster and more efficient DLP solutions can detect and respond to violations more quickly.
      Network and Data Volume: The volume of data being monitored can affect response times. If there is a large amount of data to scan, it may take longer to detect policy violations.
      Alert and Notification Configuration: DLP systems can be configured to generate alerts or notifications when a policy violation is detected. The speed at which these alerts are delivered depends on the configuration of alerting mechanisms and notification channels.
      Remediation Actions: The response time can vary based on the remediation actions specified in the DLP policies. For example, if the policy triggers actions like blocking data transmission or isolating a device, the response time may be very rapid. However, actions that require human intervention may introduce delays.
      Incident Investigation: DLP systems often include features for investigating and confirming policy violations. The time it takes to investigate an incident can vary based on the complexity of the case and the availability of personnel to conduct the investigation.
      In summary, DLP systems can be configured to operate in real-time or with specific detection policies and response actions, and their response times can vary accordingly. For critical and sensitive data, organizations may configure DLP systems to provide rapid and immediate responses to policy violations to minimize the risk of data breaches. It's important for organizations to strike a balance between rapid detection and minimizing false positives to ensure the effectiveness of their DLP solution.

  • @186rajput
    @186rajput 4 года назад +2

    So many ads