Enterprise Data Protection Against Exfiltration
ABSTRACT: Enterprise wide data exfiltration will be prevented by designing and implementing a method to protect files based on logical group membership. Anyone outside that group without the group key(s) will be unable to decrypt the data. LEG will provide an automated approach to ensure confidentiality and tracking of data files early in their creation, throughout processing and during transmission. It is intended that LEG will transparently exist within current information systems by coexisting and occasionally relying upon cryptographic and information sharing infrastructure. A design goal of LEG will be to be entirely implemented as software that is installed on host systems. LEG will function low in the operating system architecture to provide transparent functionality to high level applications. BENEFIT: Host or network based detection of data exfiltration is generally an ineffective, reactive approach and as such the LEG effort is built around a new and promising approach to proactively prevent data exfiltration. A design goal of LEG is to be entirely implemented as software installed on a host system. LEG will function low in the operating system architecture to provide transparent functionality to user space applications. The LEG effort will ensure the successful coexistence within the current and future enterprise information security infrastructure while maximally protecting data from unauthorized access.
Small Business Information at Submission:
Assured Information Security, Inc.
153 Brooks Road Rome, NY -
Number of Employees: