Akshay your voice having all answers that you are very confident on your knowledge,concept and enthusiastic way to explain..knowable session :) Luv thanks for explaining things.
@subro.sengupta Жыл бұрын
Very informative and high quality content. Akshay's delivery is amazing. I absolutely loved it! Thanks Luv for organising this insightful session. You've have really helped me out!
@LearnITSecuritywithLuvJohar Жыл бұрын
thanks, please keep watching and share if you like this video :)
@vback42386 ай бұрын
Awesome session!! I learned a lot.
@LearnITSecuritywithLuvJohar6 ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@Sricha12373 жыл бұрын
Very useful video thanks Akshay
@eanobah89198 ай бұрын
very helpful, thank you for this
@LearnITSecuritywithLuvJohar8 ай бұрын
please share these videos with your friends and help me grow this channel
@ratnesh121002 жыл бұрын
Nicely explained.. thanks
@LearnITSecuritywithLuvJohar Жыл бұрын
thanks, please keep watching and share if you like this video :)
@Techfortress-6163 жыл бұрын
Perfect Explanation. (y)
@sairamjalli88613 жыл бұрын
Does DLP have capabilities like ips, antivirus and threat detection.
@Techfortress-6163 жыл бұрын
DLP solutions are not capable of doing mentioned features.
@devendrapandey31249 ай бұрын
Search a lot but get from here
@LearnITSecuritywithLuvJohar9 ай бұрын
thanks, please share the video with your friends and help me in growing this channel
@umeshkharat50913 жыл бұрын
Nice
@vidhimarkhedkar82084 жыл бұрын
Is there any certification available to become DLP implementor?
@luvkashyap4 жыл бұрын
Many starting with Security+, CISSP and so on. They all would cover to certain level and depth concepts/fundamental around Data Protection !!
@ketansrivastav19233 жыл бұрын
Sir do you have online classes...
@LearnITSecuritywithLuvJohar3 жыл бұрын
chat.whatsapp.com/B9gnx6t68ul5jAWUix7wwl
@honeyjoshi56502 жыл бұрын
How long does it take for dlp to get triggered?
@LearnITSecuritywithLuvJohar Жыл бұрын
The time it takes for a Data Loss Prevention (DLP) system to trigger or respond to a potential data breach or policy violation can vary based on several factors, including the specific DLP solution, the organization's configuration, and the nature of the incident. Here are some key factors that influence the response time of a DLP system: Real-Time vs. Periodic Scanning: DLP systems can operate in real-time, where they continuously monitor data in motion, data at rest, and data in use. In this case, triggers can occur almost instantly when a policy violation is detected. However, some DLP systems also perform periodic scans, which may introduce a delay in detection. Policy Configuration: The speed of detection depends on how DLP policies are configured. Policies can be set to trigger immediately upon detecting a violation, or they can be configured with thresholds or delays to reduce false positives. System Performance: The efficiency and speed of the DLP solution itself can impact response times. Faster and more efficient DLP solutions can detect and respond to violations more quickly. Network and Data Volume: The volume of data being monitored can affect response times. If there is a large amount of data to scan, it may take longer to detect policy violations. Alert and Notification Configuration: DLP systems can be configured to generate alerts or notifications when a policy violation is detected. The speed at which these alerts are delivered depends on the configuration of alerting mechanisms and notification channels. Remediation Actions: The response time can vary based on the remediation actions specified in the DLP policies. For example, if the policy triggers actions like blocking data transmission or isolating a device, the response time may be very rapid. However, actions that require human intervention may introduce delays. Incident Investigation: DLP systems often include features for investigating and confirming policy violations. The time it takes to investigate an incident can vary based on the complexity of the case and the availability of personnel to conduct the investigation. In summary, DLP systems can be configured to operate in real-time or with specific detection policies and response actions, and their response times can vary accordingly. For critical and sensitive data, organizations may configure DLP systems to provide rapid and immediate responses to policy violations to minimize the risk of data breaches. It's important for organizations to strike a balance between rapid detection and minimizing false positives to ensure the effectiveness of their DLP solution.
@186rajput4 жыл бұрын
So many ads
@LearnITSecuritywithLuvJohar4 жыл бұрын
I have turned off the ads now, you can watch easily!