Then you need to add device discovery because, as described above, companies and organizations must probe specific devices using techniques that identify the device type, model number, vendor, operating system and version. These devices can be sources of data leakage. Imagine the proverbial road warrior who travels frequently for sales meetings and business conferences — which require an added layer of security. The same rule applies to perimeter discovery, which probes the hosts on a network to isolate the forwarding traffic out of an entity's network. This benefit will show the hosts that are forwarding traffic, including those hosts forwarding to unknown and possibly undesired IP addresses.
Finally, this solution to plugging data leaks should be lightweight and safe for use on large networks — even during production hours, operating essentially at the level of network "noise" and using only properly formed packets to elicit benign responses. Intuitive reports and color-coded maps generated by these tools present an impressive overview of the leaks and potential threats confronting a network. Summarizing this information is a good scorecard for businesses to use, a means towards establishing a more secure environment.
Following these steps is a necessary beginning in the effort to eliminate data leaks, backed by proven tools that address the interests of various organizations. Accomplishing that goal should be a top priority.
Sign up for MIS Asia eNewsletters.