AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Using DLP to Deploy Endpoint Security
The policy is what's really, really important. Once you understand to Jason's point, those critical resources and you have the visibility and you know where you want to start to protect that, you need to come up with a policy based on varying levels of granularitybased on these different signals. So do I trust this device or not trust this device? How is this user behaving? How is that out of the norm? Is it not? And the various permutations, then you might even apply a different policy based on data classification. Think about running end point security now with a crowd check or something. It's not the same. You can auto run auto classify systems, users, apps