According to the Forrester Wave report [Raschke, 2008], most early DLP solutions focused on finding sensitive data as they left the organizational network by monitoring data-in-motion at the various network egress points. In the second stage, as removable storage devices (e.g., USB sticks, external hard drives) proliferated, DLP solutions began to focus on detecting data leakage at the endpoint and on providing capabilities, for example, to subvert copying of sensitive information to USB devices or CD/DVDs even if the endpoint is not connected to the network.
CITATION STYLE
Shabtai, A., Elovici, Y., & Rokach, L. (2012). Data Leakage Detection/Prevention Solutions. In SpringerBriefs in Computer Science (Vol. 0, pp. 17–37). Springer. https://doi.org/10.1007/978-1-4614-2053-8_4
Mendeley helps you to discover research relevant for your work.