<s>
Data	B-Application
loss	I-Application
prevention	I-Application
(	O
DLP	O
)	O
software	O
detects	O
potential	O
data	O
breaches/data	O
ex-filtration	O
transmissions	O
and	O
prevents	O
them	O
by	O
monitoring	O
,	O
detecting	O
and	O
blocking	O
sensitive	O
data	O
while	O
in	O
use	O
(	O
endpoint	O
actions	O
)	O
,	O
in	O
motion	O
(	O
network	O
traffic	O
)	O
,	O
and	O
at	O
rest	O
(	O
data	B-General_Concept
storage	I-General_Concept
)	O
.	O
</s>
<s>
The	O
terms	O
"	O
data	B-General_Concept
loss	I-General_Concept
"	O
and	O
"	O
data	O
leak	O
"	O
are	O
related	O
and	O
are	O
often	O
used	O
interchangeably	O
.	O
</s>
<s>
Data	B-General_Concept
loss	I-General_Concept
incidents	O
turn	O
into	O
data	O
leak	O
incidents	O
in	O
cases	O
where	O
media	O
containing	O
sensitive	O
information	O
is	O
lost	O
and	O
subsequently	O
acquired	O
by	O
an	O
unauthorized	O
party	O
.	O
</s>
<s>
Other	O
terms	O
associated	O
with	O
data	B-Application
leakage	I-Application
prevention	I-Application
are	O
information	O
leak	O
detection	O
and	O
prevention	O
(	O
ILDP	B-Application
)	O
,	O
information	B-Application
leak	I-Application
prevention	I-Application
(	O
ILP	O
)	O
,	O
content	O
monitoring	O
and	O
filtering	O
(	O
CMF	O
)	O
,	O
information	O
protection	O
and	O
control	O
(	O
IPC	O
)	O
and	O
extrusion	B-Application
prevention	I-Application
system	O
(	O
EPS	O
)	O
,	O
as	O
opposed	O
to	O
intrusion	O
prevention	O
system	O
.	O
</s>
<s>
Standard	O
security	O
measures	O
,	O
such	O
as	O
firewalls	O
,	O
intrusion	O
detection	O
systems	O
(	O
IDSs	O
)	O
and	O
antivirus	B-Application
software	I-Application
,	O
are	O
commonly	O
available	O
products	O
that	O
guard	O
computers	O
against	O
outsider	O
and	O
insider	O
attacks	O
.	O
</s>
<s>
Inside	O
attacks	O
can	O
be	O
averted	O
through	O
antivirus	B-Application
scans	O
that	O
detect	O
Trojan	O
horses	O
that	O
send	O
confidential	O
information	O
,	O
and	O
by	O
the	O
use	O
of	O
thin	O
clients	O
that	O
operate	O
in	O
a	O
client-server	B-Operating_System
architecture	I-Operating_System
with	O
no	O
personal	O
or	O
sensitive	O
data	O
stored	O
on	O
a	O
client	O
device	O
.	O
</s>
<s>
In	O
order	O
to	O
classify	O
certain	O
information	O
as	O
sensitive	O
,	O
these	O
use	O
mechanisms	O
,	O
such	O
as	O
exact	O
data	O
matching	O
,	O
structured	O
data	O
fingerprinting	O
,	O
statistical	O
methods	O
,	O
rule	O
and	O
regular	B-Language
expression	I-Language
matching	O
,	O
published	O
lexicons	O
,	O
conceptual	O
definitions	O
,	O
keywords	O
and	O
contextual	O
information	O
such	O
as	O
the	O
source	O
of	O
the	O
data	O
.	O
</s>
<s>
Network	O
(	O
data	B-General_Concept
in	I-General_Concept
motion	I-General_Concept
)	O
technology	O
is	O
typically	O
installed	O
at	O
network	O
egress	O
points	O
near	O
the	O
perimeter	O
.	O
</s>
<s>
A	O
next-generation	B-Protocol
firewall	I-Protocol
(	O
NGFW	B-Protocol
)	O
or	O
intrusion	O
detection	O
system	O
(	O
IDS	O
)	O
are	O
common	O
examples	O
of	O
technology	O
that	O
can	O
be	O
leveraged	O
to	O
perform	O
DLP	O
capabilities	O
on	O
the	O
network	O
.	O
</s>
<s>
Network	O
DLP	O
capabilities	O
can	O
usually	O
be	O
undermined	O
by	O
a	O
sophisticated	O
threat	O
actor	O
through	O
the	O
use	O
of	O
data	B-General_Concept
masking	I-General_Concept
techniques	O
such	O
as	O
encryption	O
or	O
compression	O
.	O
</s>
<s>
Endpoint	O
(	O
data	B-General_Concept
in	I-General_Concept
use	I-General_Concept
)	O
systems	O
run	O
on	O
internal	O
end-user	O
workstations	O
or	O
servers	O
.	O
</s>
<s>
They	O
can	O
also	O
control	O
email	O
and	O
Instant	B-Application
Messaging	I-Application
communications	O
before	O
they	O
reach	O
the	O
corporate	O
archive	O
,	O
such	O
that	O
a	O
blocked	O
communication	O
(	O
i.e.	O
,	O
one	O
that	O
was	O
never	O
sent	O
,	O
and	O
therefore	O
not	O
subject	O
to	O
retention	O
rules	O
)	O
will	O
not	O
be	O
identified	O
in	O
a	O
subsequent	O
legal	O
discovery	O
situation	O
.	O
</s>
<s>
Endpoint	O
systems	O
have	O
the	O
advantage	O
that	O
they	O
can	O
monitor	O
and	O
control	O
access	O
to	O
physical	O
devices	O
(	O
such	O
as	O
mobile	O
devices	O
with	O
data	B-General_Concept
storage	I-General_Concept
capabilities	O
)	O
and	O
in	O
some	O
cases	O
can	O
access	O
information	O
before	O
it	O
is	O
encrypted	O
.	O
</s>
<s>
The	O
cloud	B-Architecture
now	O
contains	O
a	O
lot	O
of	O
critical	O
data	O
as	O
organizations	O
transform	O
to	O
cloud-native	B-General_Concept
technologies	I-General_Concept
to	O
accelerate	O
virtual	O
team	O
collaboration	O
.	O
</s>
<s>
The	O
data	O
floating	O
in	B-Architecture
the	I-Architecture
cloud	I-Architecture
needs	O
to	O
be	O
protected	O
as	O
well	O
since	O
they	O
are	O
susceptible	O
to	O
cyberattacks	O
,	O
accidental	O
leakage	O
and	O
insider	O
threats	O
.	O
</s>
<s>
Cloud	B-Architecture
DLP	O
monitors	O
and	O
audits	O
the	O
data	O
,	O
while	O
providing	O
access	O
and	O
usage	O
control	O
of	O
data	O
using	O
policies	O
.	O
</s>
<s>
It	O
establishes	O
greater	O
end-to-end	O
visibility	O
for	O
all	O
the	O
data	O
stored	O
in	B-Architecture
the	I-Architecture
cloud	I-Architecture
.	O
</s>
<s>
Structured	O
data	O
resides	O
in	O
fixed	O
fields	O
within	O
a	O
file	O
such	O
as	O
a	O
spreadsheet	O
,	O
while	O
unstructured	B-Application
data	I-Application
refers	O
to	O
free-form	O
text	O
or	O
media	O
in	O
text	O
documents	O
,	O
PDF	O
files	O
and	O
video	O
.	O
</s>
<s>
"	O
Data	B-General_Concept
at	I-General_Concept
rest	I-General_Concept
"	O
specifically	O
refers	O
to	O
information	O
that	O
is	O
not	O
moving	O
,	O
i.e.	O
</s>
<s>
"	O
Data	B-General_Concept
in	I-General_Concept
use	I-General_Concept
"	O
refers	O
to	O
data	O
that	O
the	O
user	O
is	O
currently	O
interacting	O
with	O
.	O
</s>
<s>
"	O
Data	B-General_Concept
in	I-General_Concept
motion	I-General_Concept
"	O
is	O
data	O
that	O
is	O
traversing	O
through	O
a	O
network	O
to	O
an	O
endpoint	O
.	O
</s>
