Data flow management: why and how
详细信息    查看全文
  • 作者:Jamie GravesAuthor Vitae
  • 刊名:Network Security
  • 出版年:2017
  • 出版时间:January 2017
  • 年:2017
  • 卷:2017
  • 期:1
  • 页码:5-6
  • 全文大小:271 K
  • 卷排序:2017
文摘
It's hard enough to be constantly on the lookout for the insider threat when you know what you're looking for. It becomes that much more difficult when you don't have a solid idea as to where your data is going, how it is getting there, when it's coming and going and why. Tracking user data movement in and out of your network, through measures such as user authentication to network resources or USB drive monitoring via endpoint data loss prevention (DLP), will greatly enhance your chances of detecting potential data thieves in your environment.It's hard enough to be constantly on the lookout for the insider threat when you know what you're looking for. It becomes more difficult when you don't know where your data is going or how it gets there.Tracking user data movement in and out of your network, through measures such as user authentication to network resources or device monitoring via endpoint data loss prevention (DLP), will greatly enhance your chances of detecting potential data thieves in your environment, explains Jamie Graves of ZoneFox.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700