Useful Links
Computer Science
Cybersecurity
Data Loss Prevention
1. Foundations of Data Loss Prevention
2. Core Components of DLP Systems
3. DLP by Data State
4. Types of DLP Solutions
5. DLP Implementation Strategy
6. DLP Operations and Management
7. DLP and Regulatory Compliance
8. Advanced DLP Topics
DLP by Data State
Endpoint DLP
Monitored Activities
File Operations
File Creation
File Modification
File Deletion
File Movement
File Copying
Removable Media
USB Drive Usage
External Hard Drives
Optical Media
Mobile Device Connections
Network Operations
File Uploads
Email Attachments
Cloud Synchronization
Peer-to-peer Transfers
System Operations
Clipboard Activities
Print Operations
Screen Captures
Application Usage
Agent Architecture
Agent-based Solutions
Agentless Solutions
Hybrid Approaches
Operating System Support
Windows Endpoints
macOS Endpoints
Linux Endpoints
Mobile Devices
Network DLP
Protocol Monitoring
Email Protocols
SMTP Monitoring
MAPI Monitoring
POP3 Monitoring
IMAP Monitoring
Web Protocols
HTTP Monitoring
HTTPS Monitoring
SSL/TLS Inspection
File Transfer Protocols
FTP Monitoring
SFTP Monitoring
SCP Monitoring
Messaging Protocols
Instant Messaging
Chat Applications
Video Conferencing
Cloud Protocols
API Monitoring
SaaS Application Monitoring
Cloud Storage Monitoring
Network Architecture
Inline Deployment
Mirror Port Deployment
Proxy-based Deployment
Gateway Integration
Traffic Analysis
Deep Packet Inspection
Metadata Analysis
Flow Analysis
Behavioral Analysis
Storage DLP
Storage Locations
File Servers
Network File Shares
Distributed File Systems
File Server Clusters
Database Systems
Relational Databases
NoSQL Databases
Data Warehouses
Data Lakes
Cloud Storage
Object Storage
Block Storage
File Storage
Hybrid Cloud Storage
Collaboration Platforms
SharePoint
Document Management Systems
Wiki Systems
Team Collaboration Tools
Archive Systems
Backup Systems
Long-term Archives
Compliance Archives
Discovery Methods
Full Content Scanning
Metadata Scanning
Index-based Scanning
Incremental Scanning
Remediation Options
In-place Remediation
Data Movement
Access Control Updates
Encryption Application
Previous
2. Core Components of DLP Systems
Go to top
Next
4. Types of DLP Solutions