@inbook{db27a9bb3d054b1bbf03f6dfa377d6c2,
title = "Data Leakage Detection/Prevention Solutions",
abstract = "According to the Forrester Wave report [Raschke, 2008], most early DLP solutions focused on finding sensitive data as they left the organizational network by monitoring data-in-motion at the various network egress points. In the second stage, as removable storage devices (e.g., USB sticks, external hard drives) proliferated, DLP solutions began to focus on detecting data leakage at the endpoint and on providing capabilities, for example, to subvert copying of sensitive information to USB devices or CD/DVDs even if the endpoint is not connected to the network.",
author = "Asaf Shabtai and Yuval Elovici and Lior Rokach",
note = "Publisher Copyright: {\textcopyright} 2012, The Author(s).",
year = "2012",
month = jan,
day = "1",
doi = "10.1007/978-1-4614-2053-8_4",
language = "English",
series = "SpringerBriefs in Computer Science",
publisher = "Springer",
number = "9781461420521",
pages = "17--37",
booktitle = "SpringerBriefs in Computer Science",
address = "Germany",
edition = "9781461420521",
}