Announcing Agent Commander - The First Integrated solution from Veeam + Securiti.ai enabling the scaling of safe AI agents

View

The Risks of Legacy DLP: Why Cloud Security Needs DSPM

Author

Ozair Malik

Security Researcher at Securiti

Listen to the content

82% of 2024 data breaches involved cloud data, raising concerns about the effectiveness of legacy data loss prevention (DLP) solutions in today's cloud-centric data environment. These traditional solutions often struggle due to limited visibility and control in multi-cloud data environments. Designed for on-premises infrastructure, traditional DLP lacks the necessary APIs and integrations to scan data across diverse cloud platforms like AWS, Azure, and Google Cloud, leaving shadow data and misconfigured repos vulnerable. In contrast, DSPM solutions offer discovery, classification, continuous monitoring, automated risk assessments, and remediation, significantly mitigating data breach risks.

Read on to discover how a modern approach, Data Security Posture Management (DSPM), is revolutionizing cloud data protection and addressing the limitations of traditional solutions.

Rethinking DLP: The Need For DSPM In The Cloud

Traditional Data Loss Prevention (DLP) solutions were initially designed for a time when most enterprise data resided on-premises and moved primarily between endpoints. However, the digital landscape has undergone a significant transformation, with the majority of organizational data now residing in the cloud. Modern enterprises operate within complex, highly distributed data environments encompassing public and private clouds, SaaS applications, cloud data lakes, and data warehouses. The widespread adoption of hybrid and multi-cloud environments, cited at 82% in Cisco's 2022 Global Hybrid Cloud Trends Report, underscores this shift. Consequently, legacy DLP approaches struggle to effectively secure these dynamic and dispersed data assets.

Pitfalls of Traditional DLP

DLP solutions primarily monitor endpoint activity for potential data exfiltration. Their effectiveness is often hindered by inaccurate data classification and labeling, resulting in a high volume of both false-positive and false-negative alerts. The reliance on outdated Regex-based classification techniques contributes to these inefficiencies, resulting in alert fatigue and an increased risk of undetected sensitive data leakage.

Furthermore, in contemporary cloud environments, DLP tools lack the ability to monitor sensitive data exfiltration. They cannot evaluate the exposure risks associated with data sitting in a cloud data store, sensitivity levels, and access misconfigurations. Continuously monitoring and ensuring compliance with industry standards and data privacy regulations is also not the forte of legacy data security solutions.

According to IBM’s 2024 Cost of a Data Breach report, 82% of all data breaches involved cloud-stored data, indicating that the cloud is a significant target for attackers. 15% of the breaches involved cloud misconfigurations as the initial attack vector. The same report states that the global average cost of a data breach reached $4.88 million in 2024, with cloud-related breaches accounting for 45% of the total cost.

Hence, organizations relying on DLP as their primary data security tool in the cloud & AI era are at high risk. The limitations of legacy DLP result in significant gaps in visibility regarding the location of sensitive data in the cloud, as well as a lack of adequate controls for effective data protection. Consequently, organizations face heightened vulnerability to data breaches, financial repercussions, and reputational damage due to a weakened cloud data security posture.

Cloud Data Security With DSPM

The transition to cloud computing has introduced a distinct set of data security challenges, necessitating the adoption of modern solutions. Data Security Posture Management (DSPM) has emerged as a proactive and contemporary approach to safeguarding critical data assets. Securiti’s DSPM provides comprehensive visibility into sensitive data, including its location within the enterprise, user access privileges, and data usage patterns. It delivers valuable insights into the overall security posture and associated risks, enabling organizations to implement robust controls and policies for effective risk mitigation. In essence, DSPM enhances data security and privacy, ensures compliance with data regulations, and addresses the limitations of traditional DLP solutions.

Gartner first introduced and defined the term DSPM in its 2022 Hype Cycle™ for Data Security report. GigaOm further elaborated on this definition in its 2024 GigaOm Radar report, describing DSPM as a solution that offers

"visibility into where sensitive data is, who has access to it, and how it is being used. DSPM gives a comprehensive view of an organization’s data security posture, its compliance position, security and privacy risks, and, crucially, how to deal with them.”

Governing AI Data With DSPM

The proliferation of generative AI is fundamentally changing how organizations create and utilize data. AI models depend on high-quality data, and the practice of feeding substantial datasets into these models has become common. This introduces new data security risks, as organizations may inadvertently expose sensitive information to AI agents and copilots. Legacy DLP solutions are ill-equipped to monitor data flows into AI pipelines, exacerbating this risk. A Deloitte survey revealed that 58% of organizations are concerned about feeding sensitive data to AI models, reinforcing the inadequacy of traditional approaches in the current cloud and GenAI landscape.

Securiti’s DSPM offers solutions to these emerging challenges by enabling organizations to discover cloud-native data used by AI models, thereby facilitating the governance of sensitive data in AI model fine-tuning or Retrieval-Augmented Generation (RAG). It also aids in enforcing least privilege access to prevent excessive data sharing with AI users. Moreover, DSPM helps identify and manage redundant, obsolete, and trivial data stored in forgotten repositories, thereby improving the quality of AI outputs.

Modernizing Data Protection: DSPM and Traditional Tools

Secure Web Gateways (SWG), Email Gateways, and Endpoint DLP share a fundamental goal: preventing the loss of sensitive data through their respective channels. However, a critical question arises: how do these tools accurately identify sensitive data? Data classification and labeling, the established methods for discovering and categorizing sensitive information like PII, PHI, and financial data, face significant challenges when implemented in isolation across each of these tools. These disparate tools often employ legacy classification techniques and algorithms. For example, Endpoint DLP might rely on traditional Regex-based methods for classification and labeling, which are slow, error-prone, and ineffective at scale. These fragmented and legacy approaches lead to issues such as false positives, redundancy, duplication of effort, and inconsistent labeling.

Consider this: a nine-digit number could be a Social Security Number or a product SKU. Similarly, "London" could refer to either a city or a surname. Regex and other non-AI-driven approaches often struggle with such contextual ambiguities, and different security tools might interpret them inconsistently.

Therefore, a precise, standardized, and intelligent data classification framework is essential for accurately identifying and labeling sensitive data across distributed data environments. This unified framework is also crucial for the consistent enforcement of compliance regulations, such as GDPR, HIPAA, and PCI-DSS.

Securiti DSPM: Intelligent, Context-Aware Data Security

Modern Data Security Posture Management (DSPM) solutions, such as Securiti, address these challenges by leveraging AI-powered discovery and classification engines to consistently label vast amounts of data in complex, distributed environments. Security teams can deploy DSPM to accurately classify and label sensitive data within source systems, SaaS applications, and multi-cloud environments. By utilizing AI and automation, these solutions can identify both structured and unstructured data, understand the sensitivity of each data asset, assess associated risks, and measure the overall security posture of every data store. They often include a comprehensive library of pre-built classifiers capable of identifying and tagging a wide range of sensitive data types, including PCI, PHI, and PII, as well as non-text formats like audio, video, and images.

The key advantage of this modern approach is that when consistently labeled data traverses to endpoints, web, or email gateways, these "traffic cops" can inspect and verify the source classification, ensuring consistent policy enforcement across diverse channels. For instance, if an employee downloads sensitive data from a cloud data system to their endpoint, and traditional DLP misses it due to inadequate classification, a DSPM solution would have already classified the data at its source. Consequently, the DLP system, leveraging these precise tags, would be able to detect and prevent sensitive data exfiltration.

Securiti's DSPM goes beyond data classification by actively mitigating data security risks. This includes minimizing the storage of sensitive data and remediating access misconfigurations at the source. This proactive approach reduces alert fatigue, compliance violations, and the workload of other security tools, improving overall data leakage prevention.

Furthermore, it provides a unified compliance management platform, a feature lacking in legacy tools. Governance teams can automate technical control tests for regulations like GDPR, EU AI Act, and NIST AI RMF to continuously assess and improve compliance. Additionally, it addresses emerging AI risks with integrated AI Security capabilities, allowing security teams to inspect and enforce controls using data context-aware LLM Firewalls at runtime to protect AI interactions.

This is precisely the value proposition of Securiti DSPM, powered by a knowledge graph: through the intelligent discovery, classification, and risk assessment, it delivers a fundamental shift from reactive incident response to proactive data security management.

Request a demo to discover how Securiti, a leader in DSPM, can proactively prevent sensitive data loss in your hybrid and multi-cloud environments.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share

More Stories that May Interest You
Videos
View More
Rehan Jalil, Veeam on Agent Commander : theCUBE + NYSE Wired: Cyber Security Leaders
Following Veeam’s acquisition of Securiti, the launch of Agent Commander marks an important step toward helping enterprises adopt AI agents with greater confidence. In...
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Latest
View More
Introducing Agent Commander
The promise of AI Agents is staggering— intelligent systems that make decisions, use tools, automate complex workflows act as force multipliers for every knowledge...
Risk Silos: The Biggest AI Problem Boards Aren’t Talking About View More
Risk Silos: The Biggest AI Problem Boards Aren’t Talking About
Boards are tuned in to the AI conversation, but there’s a blind spot many organizations still haven’t named: risk silos. Everyone agrees AI governance...
Largest Fine In CCPA History_ What The Latest CCPA Enforcement Action Teaches Businesses View More
Largest Fine In CCPA History: What The Latest CCPA Enforcement Action Teaches Businesses
Businesses can take some vital lessons from the recent biggest enforcement action in CCPA history. Securiti’s blog covers all the important details to know.
View More
AI & HIPAA: What It Means and How to Automate Compliance
Explore how the Health Insurance Portability and Accountability Act (HIPAA) applies to Artificial Intelligence (AI) in securing Protected Health Information (PHI). Learn how to...
Consent Orchestration for Safe AI View More
Consent Orchestration for Safe AI
Access the whitepaper and learn how to operationalize consent across data and GenAI with a practical framework, enforceable controls, and a 30/60/90-day implementation roadmap.
View More
2026 Privacy Compliance Readiness Checklist
Access the whitepaper to unlock a practical guide to strengthening privacy readiness, featuring key insights, the 2026 privacy compliance checklist, and how to operationalize...
DataAI Security for Retail View More
DataAI Security for Retail
Download the brief and explore how retailers can securely scale Data & AI with Securiti DataAI Command Center and protect sensitive data, manage risk,...
Emerging AI Security Trends For 2026 View More
Emerging AI Security Trends For 2026
Securiti’s latest infographic provides security leaders with a walkthrough of all the emerging AI security trends for 2026 to help them assess and plan...
View More
Take the Data Risk Out of AI
Learn how to prepare enterprise data for safe Gemini Enterprise adoption with upstream governance, sensitive data discovery, and pre-index policy controls.
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
What's
New