Thomas Ptchek from Matasano tore DLP a new one in a discussion we were
a part of about a year ago. I'd check their blog for details.

My suggestion: start with data hiding technology that end users are
generally capable of using, such as a password protected zip. Then
move toward more complicated methods.

On 10/22/09, Brian Schultz <[email protected]> wrote:
> Our security department is testing out Symantec's Vontu and I am playing the
> guinea pig and have to try and get documents out of our company's
> environment. I have a really basic understanding of how it works. It has a
> span port sitting and listening to all outgoing web traffic and there is
> also an agent that sits on desktops and watches to see if any sensitive
> information leaves via USB drive or e-mail.
>
> Does anyone have any whitepapers or info regarding how it actually works or
> any tactics I should try?
>

-- 
Sent from my mobile device

- Chris Merkel
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to