DLP techniques
The security of sensitive data is a top priority for organizations. A range of techniques and tools are used to maintain the confidentiality and accessibility of data.
The following table describes some of the industry standard techniques that are used for data loss protection, and if they can be configured in the GUI or CLI.
Technique |
Description |
GUI |
CLI |
---|---|---|---|
IDM creates unique fingerprints for your organization’s crucial documents that hold sensitive information. This process involves analyzing the content of these documents and generating a checksum for each one. See DLP fingerprinting for more information. |
|
✓ |
|
Identify a file by the data type in its meta data. See DLP File Pattern for more information. |
✓ |
✓ |
|
Identify a file based on its size. See Example 2: Block HTTPS downloads of EXE files and log HTTPS downloads of files larger than 500 KB for an example. |
|
✓ |