Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Download Publication

Data Loss Prevention and Data Security Survey Report - Chinese Translation
Data Loss Prevention and Data Security Survey Report - Chinese Translation

Data Loss Prevention and Data Security Survey Report - Chinese Translation

Release Date: 11/13/2023

Working Group: Zero Trust

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].


As the traditional perimeter is reduced or eliminated with the move to remote and hybrid work, and as Zero Trust strategies gain popularity, data security in cloud computing has had to adapt and improve. Data loss prevention (DLP) solutions are often an integral part of these new data security strategies, but organizations are still struggling with the implementation of these solutions, especially for how complicated legacy DLP solutions are to manage and maintain.


Netskope commissioned CSA to develop this survey report to better understand the industry’s knowledge, attitudes, and opinions regarding DLP security in cloud-first technology environments. The survey was conducted in October and November of 2022 and received 2,673 responses from IT and security professionals. Topics covered in the survey included DLP strategies, Zero Trust and DLP, DLP pain points and challenges, and DLP strategies with remote workers.


Key Takeaways:

  • Cloud is the predominant means for transferring and sharing data. The most common way (46%) is cloud storage applications.
  • Most organizations (72%) use 2+ DLP solutions.
  • Organizations (29%) struggle to manage their complex DLP environments.
  • Organizations are searching for solutions that simplify management. Organizations (31%) say that unified policies and single console solutions will help them with management difficulty and deployment complexity. 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Using Asymmetric Cryptography to Help Achieve Z...
Zero Trust Guidance for Critical Infrastructure
Zero Trust Guidance for Critical Infrastructure
CSA Community Spotlight: Addressing Emerging Security Challenges with CISO Pete Chronis
CSA Community Spotlight: Addressing Emerging Security Challenges wi...
Published: 11/18/2024
Zero Standing Privileges (ZSP): Vendor Myths vs. Reality
Zero Standing Privileges (ZSP): Vendor Myths vs. Reality
Published: 11/15/2024
Modernization Strategies for Identity and Access Management
Modernization Strategies for Identity and Access Management
Published: 11/04/2024
Dispelling the ‘Straight Line’ Myth of Zero Trust Transformation
Dispelling the ‘Straight Line’ Myth of Zero Trust Transformation
Published: 11/04/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training