Then, for confidentiality, you can use almost any of the existing dlp solutions – Virtually all of these solutions intercept all possible ways to steal information. The only problem is the use of exotic file formats (for analysis of the contents of the file the product should "Know" its format). There are two basic types of dlp solutions by the method of work: The agency decision (when the workstations of employees established a special agent); Solutions that work at the site of exchange information (eg, gateway, internet access). The advantages of agency decisions are made that overlap all the way information theft, including portable media, and those programs communicators who use encryption (for example, skype). However, this method is not without flaws – on the user's need to create a trusted environment (otherwise the agent will simply be discharged by an attacker).
In addition, agents exist almost exclusively by the operating system, Microsoft, that does not suit all. In dlp solutions that work at the site of exchange of information there are other drawbacks – not "on the fly" parse encrypted traffic, and (for example, traffic may skype only control Agents DLP) will either have to take that risk, or to use other measures (including purely organizational) to ban such communications. Also, a DLP-solution is obviously not able to control using flash-disks and similar media. In the case of an agency dlp solutions, service, information security is necessary to compile a list of confidential information and places of its storage and install the software on employee workstations.