I think it hashed files and fragments of known sensitive info then it checks the traffic against it and PII.
I would try to obfuscate something you would know would get caught otherwise. ---- Raffi On Oct 22, 2009, at 11:38 AM, Brian Schultz <[email protected]> wrote: > Our security department is testing out Symantec's Vontu and I am > playing the guinea pig and have to try and get documents out of our > company's environment. I have a really basic understanding of how it > works. It has a span port sitting and listening to all outgoing web > traffic and there is also an agent that sits on desktops and watches > to see if any sensitive information leaves via USB drive or e-mail. > > Does anyone have any whitepapers or info regarding how it actually > works or any tactics I should try? > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
