OREANDA-NEWS. IDGC of Centre implemented a DLP-system of protection of information leaks based on Zecurion software.

As part of the overall strategy to improve the information security IDGC of Centre’s management decided to implement a comprehensive data protection system against leakage. The objective was to provide a sufficient level of information security at the insider threat protection throughout the Company. When selecting a suitable DLP-solution IDGC of Centre’s management put high requirements both to the functionality of protection against information leaks itself, and its possibilities of administration, with a view of minimizing the necessary computing power and simplicity of the product implementation. As a result of an open tender Zecurion DLP software licenses were purchased.

Zecurion DLP implementation in IDGC of Centre began in June 2015, was conducted by IDGC of Centre’s staff with the support of experts from Zecurion and took place in several stages. Audit of the information structure was conducted and critical data were identified. Then the pilot zone was launched. After clarification of policies and debugging in 2016 the system was scaled on the Company’s corporate network.

The Zecurion DLP software combines several solutions to combat data leakage. Zecurion Zgate is designed to prevent leaks of confidential information via email, social networks, IM clients, and any other network data links. Zecurion Zlock delimits access to drives and printers, analyzes contents of files recorded on devices, and blocks actions of users in case of violations of security policy. Zecurion Zdiscovery system is designed to detect places of storage of confidential information on the corporate network and prevent violations of security policies.

According to experts of the Department of Corporate and Process Automation Management Systems of IDGC of Centre, the complexity of the task was that it was necessary to implement the DLP-solution in complex geographically distributed infrastructure of the company, without breaking the core business processes, ensuring the stability of the existing IT services.