Skip to main content

Data Loss Prevention: How to detect and prevent data leaks with Teramind

Updated over a month ago

Introduction: The Imperative for Data Loss Prevention

Data breach incidents are escalating rapidly, making data protection a critical priority for organizations globally. This growing threat environment necessitates a robust and future-proof strategy. The sheer frequency, diverse causes (ranging from internal error to malicious intent), and devastating impact of data leaks prove that businesses must move beyond simple perimeter defense to adopt a comprehensive data loss prevention strategy and associated technology.

What is Data Loss Prevention (DLP)?

Data Loss Prevention (DLP) is fundamentally a risk minimization strategy focused on proactively monitoring, detecting, and blocking potential data breach incidents. Its ultimate objective is to ensure that employees and other stakeholders do not accidentally or intentionally share sensitive and confidential data outside your organization's authorized boundaries.

A DLP solution functions by:

  • Identifying and Categorizing sensitive data and Intellectual Property (IP) using techniques like content discovery and digital inspection.

  • Applying Contextual Analysis to understand how and where the data is being used.

  • Enforcing Preventative Measures to stop or contain data transfers when unauthorized activity is detected.

A complete defense strategy targets data in three key states: in-use (on endpoints), in-motion (across the network), and at-rest (in storage). Traditional DLP measures often rely on a combination of standard tools such as firewalls, signature databases, file tagging, or structured data fingerprinting to protect this sensitive information.

Differences between Traditional vs Endpoint DLP Solutions*

DLP Type*

Focus Area

Monitoring Method

Limitation

Network-Based DLP

(e.g., Palo Alto Networks DLP, Broadcom)

Data in Motion (Email, Web, FTP network traffic).

Installed at network egress points.

Mostly blind to local actions, USB transfers, screenshots, and encrypted activity on the endpoint.

Storage/Cloud-Based DLP

(e.g., Google Cloud DLP)

Data at Rest (File servers, databases, cloud storage).

Scans stored documents periodically.

Cannot detect real-time actions, like copy-pasting or typing sensitive data.

Endpoint DLP

(e.g., Teramind, Fortra, Digital Guardian)

Data In Use (User’s machine, real-time activity).

Lightweight agent monitors every action, input, and application.

Provides deep, contextual visibility, covering the gaps left by traditional solutions.

*DLP Type Comparison Disclaimer: In the modern security landscape, many leading DLP vendors offer unified platforms that integrate Endpoint, Network, and Storage DLP capabilities. Therefore, solutions are rarely confined to a single column. For example, while Broadcom's Symantec DLP Core traditionally focuses heavily on Network Protection modules, it also includes dedicated Endpoint modules to ensure protection across all three key states of data. This table is based on the primary focus and historical strength of each solution type, helping to illustrate the architectural differences in data protection.

Data Loss Prevention with Teramind DLP

Teramind's Data Loss Prevention solution (Teramind DLP) is built directly atop our activity monitoring (employee monitoring) and behavior analytics platform. This foundation provides a unique advantage by integrating advanced DLP capabilities, such as automated data discovery, classification, and content-based rules with deep user context.

This integration makes Teramind DLP highly effective against the human factor (malicious intent, errors, or accidents) which often bypasses traditional perimeter defenses. By correlating data access with user behavior, Teramind enables you to implement a robust and adaptive plan against data breaches and exfiltration attempts.

Teramind DLP utilizes a simple, comprehensive 3-step process to safeguard your organization against data and IP leakage:

Step 1: Data Discovery & Classification (Knowing Your Assets)

Teramind's approach to data identification is unique: we do not perform traditional, resource-intensive data-at-rest scanning. Instead, the endpoint Agent scans in-motion data in real-time as the user interacts with it, such as when they send an email, access a file, or browse a website.

This focused, real-time scanning ensures immediate detection while covering all necessary classification features for common and complex use cases.

Teramind DLP Data Classification Capabilities

Built-in Classification

Built-in classified data definitions are available for Personally Identifiable Information (PII), Protected Health Information (PHI), Financial Information (PCI/PFI), and Code Snippets. Custom definitions can be created using keywords, dictionary lists and regular expressions.

Unstructured Data Scanning

Includes text within documents, emails, webpages, chat messages and other monitored channels.

Structured Data Scanning / Fingerprinting

Does not use fingerprinting databases, but can look for specific text or binary content inside documents.

OCR / Steganographic Exfiltration Detection

Detects and classifies text displayed on screen. Supports multi-screen setup and virtual desktops.

Keyword / Phrase Matching

Matches exact or partial words and phrases.

Regular Expressions (Regex)

Allows rule-based matching using C++ regular expressions.

Natural Language Processing (NLP) - Semantic and Contextual Analysis

On the roadmap.

Dictionary / Data Validation / Category Match

Supported via the bult-in Shared List feature.

Document Tagging

Detects file properties/meta-tags in supported file types (e.g., Microsoft Office documents), supporting string, integer, and date values.

Metadata Analysis

File Type / Extension Matching

Protocol Detection

Detects network transfers over common protocols like SMTP, HTTP/HTTPS, TCP, UDP, and RDP.

Identity/Directory Matching

Profiles and matches data sources using email addresses, IP addresses, Windows usernames, etc.

Geo-Location/IP-Based Classification

Can classify data contextually based on the user's geolocation and network address.

Custom Field Parsing

Can extract and monitor content from specific application windows/fields (custom feature).

Partial Data Matching

Encrypted / Compressed Documents Scanning

Unencrypted Zip files are supported.

AI/Machine Learning Based Detection

On the roadmap.

Statistical Data Analysis

Trend detection is possible using built-in analytics dashboards. DLP rules do not support historical context.

Storage-based Scanning

Teramind focuses on Data In Use; scanning data at rest (file servers, DBMS) is not conducted, though activities on those servers can be monitored via Agent installation.

Quarantine & Containment

Options for capturing user email copies, attachments, and printed documents for review.

Integration with Third-Party Classification

Supports integration with Microsoft Purview.

Use Predefined Data Categories

Teramind includes built-in templates for many predefined data categories, enabling immediate, real-time classification through Content Sharing rules:

  1. Personally Identifiable Data (PII): Detects Name, Address, Date, Zip Code, and other identifiers critical for compliance like GDPR.

    Financial Data (PCI/PFI): Identifies Credit Card Numbers, SWIFT code, ABA Numbers, and other financial data crucial for supporting compliance like PCI DSS, SOX, etc.

  2. Health Data (PHI/ePHI): Detects common Drug Names, Disease Names, HICN, etc. for HIPAA compliance.

  3. Code Snippets: Prevents source code leaks by detecting syntax for popular languages (C, C++, Java, SQL).

Create Your Own Custom Data Types

You can easily detect proprietary data, such as internal billing/invoice numbers, special project codes, or any other data formats using custom data types specific to your organization.

In Teramind, custom definitions can be built easily using:

  1. Keywords: Use the "equals" or "contains" condition to match exact or partial words.

  2. Regular Expressions: Type any C++ regular expressions and use the "matches regex" condition for complex pattern identification.

  3. Shared Lists: Build reusable lists of text, network addresses, or regular expressions, or import them from a CSV file. These lists ensure consistency across multiple behavior rules.

  4. Other Conditions: Utilize special conditions like "<, =, >" for numerical criteria and the "matches glob" condition for file path criteria.

Step 2: Enforcing Policies & Rules (Setting the Guardrails)

While Step 1 (Classification) defines what data is sensitive, Step 2 in your DLP implementation journey focuses on creating policies and rules that dictate how your workforce is authorized to handle that data. By defining these rules, you direct the Teramind Agent to automatically prevent any violation.

Rule Types By Use Case

Teramind DLP allows you to create three powerful rule types to cover every dimension of data risk:

  1. Activity Rules: These rules focus on the user's action. They can help you detect and prevent harmful activities such as:

    • Blocking the upload of files to personal cloud drives.

    • Detecting the sending of emails with attachments to non-business addresses.

    • Restricting the use of to unauthorized applications or websites.

  2. Content-Sharing Rules: These rules focus specifically on the content of the data being shared. They apply to channels like Clipboard, File transfers, Email, and Instant Messaging (IM) to protect important information from malicious or accidental leaks. For example, blocking any clipboard action that contains a classified PII pattern.

  3. Schedule Rules: Primarily used for productivity oversight, these rules are also powerful tools for preventing potential data theft and risky behaviors. Examples include preventing user login during off-hours or blocking access from unknown or unauthorized IP addresses.

Rule Samples and Examples

Pre-Packaged Sample Rules

There are many sample rules included with your deployment. Just pick a sample, and the rule editor will be automatically populated with core settings and sample data you can customize for your needs.

Teramind Demo Rules

You can visit the Teramind Demo Dashboard to see live examples of policies and rules in action. This resource contains many pre-configured policies and rules that you can inspect, check out, and even export to accelerate your own deployment:

Rule Examples for Various Protection Scenarios

Here are some practical examples demonstrating how you can leverage Teramind's rule types to cover comprehensive security scenarios:

Rule Actions: Real-Time Prevention

Teramind moves beyond simple alerts by enabling dynamic, progressive, and real-time preventative action against rule violations. Based on factors like thresholds, timeframe, user group, and defined risk level, the system can automatically execute a range of responses.

These responses include:

  • Warn: Prompting the user with a message.

  • Notify: Alerting administrators or security teams instantly.

  • Block: Immediately terminating the risky activity.

  • Lock: Temporarily locking the user's session.

  • Record: Automatically recording the screen before and after an incident.

  • Redirect: Sending the user to different webpage.

  • Command: Executing an application, command or a custom script.

  • Switch Task: Automatically assigning a task to the user based on activity detected.

This comprehensive suite of actions allows organizations to enforce a proportionate and automated security response tailored to the severity and context of the data breach attempt.

Useful Resources:

Step 3: Investigate Rule Violation Incidents (Closing the Loop)

The final and critical stage of the DLP process is the effective investigation of security incidents to ensure swift remediation and continuous policy refinement. Teramind provides multiple integrated tools to analyze rule violations with forensic-level detail.

The Behavior Alerts Dashboard: Triage and Risk Scoring

The Behavior Alerts dashboard serves as your primary incident triage center. It offers a centralized list of all rule violation incidents, detailing crucial context such as the date/time, the user involved, the activity type, and the rule that was violated.

The dashboard includes a dedicated Risk tab where you can analyze the overall impact of incidents on your organization. This feature calculates unique risk scores to identify the top risky rules, users, applications, and websites. This scoring allows security teams to instantly identify high-risk areas requiring immediate attention. You can also conduct trend analysis by plotting risk trends across departments or by violation severity.

You can access the Behavior Alerts dashboard from the Dashboards > All Dashboards > Behavior Alerts menu:

From the dashboard, click the Three Dots icon in front of a row on a grid widget to access its Context Menu:

  • Show Details Record: View the complete details and metadata of the specific activity.

  • View Record: Immediately launch the Session Player to see the screen recording of the incident.

  • Investigate: Access the full trail of the employee’s activity reports to understand the chain of events leading up to and following the violation.

Session Recording & Playback: Forensic Evidence and Control

The Session Player is Teramind's essential tool for forensic investigation, providing irrefutable, contextual evidence. It allows you to view a user’s desktop in either live view or history playback mode.

Using the Session Player, you can:

  • Pinpoint the Incident: Precisely locate the exact moment a rule violation occurred.

  • Review Context: Check all alerts the user received and trace the complete sequence of user activities before and after the incident.

  • Take Remote Control: In live view mode, security personnel can utilize the Remote Control feature to intervene directly, taking over the user's desktop to stop a breach, shut down a malicious process, or preserve evidence.

  • Collaborate: Add tags and notes directly to the recording timeline to facilitate collaboration among analysts managing the case.

The Session Player is easily accessible via the Movie Camera icon found across the dashboards and other places, ensuring a quick transition from detection to visual investigation and necessary intervention.

Useful Resources:

Did this answer your question?