I think it hashed files and fragments of known sensitive info then it  
checks the traffic against it and PII.

I would try to obfuscate something you would know would get caught  
otherwise.

----
Raffi

On Oct 22, 2009, at 11:38 AM, Brian Schultz <[email protected]>  
wrote:

> Our security department is testing out Symantec's Vontu and I am  
> playing the guinea pig and have to try and get documents out of our  
> company's environment. I have a really basic understanding of how it  
> works. It has a span port sitting and listening to all outgoing web  
> traffic and there is also an agent that sits on desktops and watches  
> to see if any sensitive information leaves via USB drive or e-mail.
>
> Does anyone have any whitepapers or info regarding how it actually  
> works or any tactics I should try?
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to