| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
DLP systems are becoming more and more prevalent in medium to large enterprises. While these systems can be very effective at preventing data leakage, the operational complexity often limits the full capability of the technology. This talk examines some of the core technologies (not products), operational limitations, and proposes a systematic methodology to test end to end effectiveness of an implementation. Additionally techniques will be discussed that have been used in actual penetration tests to bypass highly restrictive DLP implementation and their components.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast