• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 252
  • Last Modified:

best Data Loss Prevention software

is there something that somes close to that?
we have cisco ASA FW and an sourcefire IDS and an ISA a proxy.
but its not enough to have a complete security solution: ISA is outdated and users surf the internet by bypassing the proxy from their computers and mobiles.sooner or later,somebody will bring malware in.

any suggestions?
0
DukewillNukem
Asked:
DukewillNukem
4 Solutions
 
Tony GiangrecoCommented:
The Best Data Loss Prevention Software is probably based on opinion depending on your environment.

1. I would upgrade your firewall to the current Cisco version making sure it has the capacity to handle your current user base plus room for expansion.

2. The firewall should not allow the users to bypass the proxy. That is a big correction that needs to be fixed.

3. Make sure you have an enterprise level anti virus on all servers and workstations and a anti virus manager running on a server that controls all workstations.

4. Make sure you are in active directory and make sure all user passwords meet the Microsoft secure standards. Do the same for the firewall and servers.

5. Make sure you have a nightly or regular backup plan running to make sure servers and data are backed up on a schedule that suits your company's needs.

6. Upgrade the firmware on the firewall and bios and drivers on all servers and workstations.

This is a start. Hope it helps!
0
 
Andy MInternal Systems ManagerCommented:
So are you trying to lock down internet connections or wanting something to prevent data loss?

Data loss - making sure you have regular, working backups is probably the main area to look at - daily backups of all critical data will ensure that in the event something does happen you can recover the data.

Making sure you have good anti-virus and anti-spyware applications running on your computers is also recommended.

Blocking the internet - well there's plenty of web monitring/filtering applications out there - we have used GFI at one of our client sites and locked down the network so users cannot bypass the proxy (Group Policy locks out the setting, plus company IT policy specifies staff are in breach of company rules if they are caught trying and can face disciplinary procedures ). Users are also not allowed to join wireless with phones/other networks without prior permission (MAC filtering on the wireless system prevents unknown devices joining it - we have a separate network for guests).

There's no best way to do what you appear to be wanting - it's all about a combination of systems, policies, company rules, etc of which there's many ways to do this and I'm sure someone would do it differently to what I've noted above.
0
 
Tony GiangrecoCommented:
I agree with Morty500UK, as we both mentioned, there are multiple areas of security to review. Take a planned approach, explore your environment and document all areas so you know what you are starting with and discuss the areas of exposure with management.  Get pricing to resolve the hot spots, create a budget to address regular IT expenses and create a plan to upgrade and maintain the level of security your enterprise needs.

Hope this information helps!
0
Improved Protection from Phishing Attacks

WatchGuard DNSWatch reduces malware infections by detecting and blocking malicious DNS requests, improving your ability to protect employees from phishing attacks. Learn more about our newest service included in Total Security Suite today!

 
Tony GiangrecoCommented:
Have we answered your question?
0
 
Thomas Zucker-ScharffSystems AnalystCommented:
In the end the truth is that no matter what you do, if users want to bypass the security they can.  Whether they do it by using mobile devices or something else.  Have you ever gone to a Consumerization of IT conference?  They are an eye opener!

So the first order of business, IMHO, is user education.  You need to address why it is important to secure your data and how it will MONETARILY affect the user if data leaks or is stolen.  Above all, you need an HR policy that explicity prohibits, on pain of lost jobs, the kind of misuse of computing equipment and data of which you are afraid.

The other suggestions are extremely important as well.  You need to lock down and backup your data to protect it as well.
0
 
DukewillNukemAuthor Commented:
im aware that theres no "best solution" out there. im evaluating some products,however not sure which one to choose.

symantec gives me somewhat a hard time since it takes away resources,
mcaffee im not sure about.
maybe its better not to go for the big players,but something else instead-but what?
0
 
Tony GiangrecoCommented:
The starting point in any security effort on a network is to install a strong firewall. I installed a Sonicwall TZ210W on for a 75 employee client three years ago. Since then I've added their CGGS subscription that added a ton of functionality such as blocking access attempts from foreign countries, dropping hacking attempts, blocking social media access from within the network like facebook, twitter and others, dropping phissing attempts and many other malichious activities caught by the firewall. I have the firewall setup to send me a daily log of specific activities so I know what's going on. I also set it up to send me immediate alerts of situations that rate high on the security scale. I receive these alerts a few times a week. We had a five minute DDOS attack last week that the firewall caught, shutdown and alerted me of. That's the type of protection and communications I'm talking about.

Hope this helps!
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now