Thomas Ptchek from Matasano tore DLP a new one in a discussion we were a part of about a year ago. I'd check their blog for details.
My suggestion: start with data hiding technology that end users are generally capable of using, such as a password protected zip. Then move toward more complicated methods. On 10/22/09, Brian Schultz <[email protected]> wrote: > Our security department is testing out Symantec's Vontu and I am playing the > guinea pig and have to try and get documents out of our company's > environment. I have a really basic understanding of how it works. It has a > span port sitting and listening to all outgoing web traffic and there is > also an agent that sits on desktops and watches to see if any sensitive > information leaves via USB drive or e-mail. > > Does anyone have any whitepapers or info regarding how it actually works or > any tactics I should try? > -- Sent from my mobile device - Chris Merkel _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
