Data Detection Methods Whitepaper

Data Detection Methods Whitepaper

This paper describes the different methodologies in finding confidential or regulated data using Data Loss Prevention technology. There are several security products available today that search for Personally Identifiable Information (PII) in outbound email and web transactions, scan for it on internal file shares, and look for it exiting on external devices. But these solutions are only as good as their ability to accurately detect PII. In this paper find out:

  • Why searching for PII can be problematic
  • The advantages and disadvantages of of traditional data detection methods
  • What makes Database Record Matching (DBRM) different

Download Now