Data Leakage Detection/Prevention Solutions

18Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

According to the Forrester Wave report [Raschke, 2008], most early DLP solutions focused on finding sensitive data as they left the organizational network by monitoring data-in-motion at the various network egress points. In the second stage, as removable storage devices (e.g., USB sticks, external hard drives) proliferated, DLP solutions began to focus on detecting data leakage at the endpoint and on providing capabilities, for example, to subvert copying of sensitive information to USB devices or CD/DVDs even if the endpoint is not connected to the network.

Cite

CITATION STYLE

APA

Shabtai, A., Elovici, Y., & Rokach, L. (2012). Data Leakage Detection/Prevention Solutions. In SpringerBriefs in Computer Science (Vol. 0, pp. 17–37). Springer. https://doi.org/10.1007/978-1-4614-2053-8_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free