Title
Deploy an automated tool on network perimeters that monitors for sensitive information , keywords, and other document characteristics to discover unauthorized attempts to exfiltrate data.
Description
Deploy an automated tool on network perimeters that monitors for sensitive information (e.g., personally identifiable information), keywords, and other document characteristics to discover unauthorized attempts to exfiltrate data across network boundaries and block such transfers while alerting information security personnel.
Reference Item Details
Category: Data Protection