What is file shadowing and how is it useful for detecting data leakage?
File shadowing mirrors data that was read from and/or written to storage devices to one or more repositories where administrators can inspect the files. This can provide proof that data leakage has occurred, and allows administrators to detect sophisticated users who may change the names of files they are copying to storage devices in order to evade logging (e.g. “2008 Strategic Plan” could be changed to “XYZ Customer Presentation.
File shadowing mirrors data that was read from and/or written to storage devices to one or more repositories where administrators can inspect the files. This can provide proof that data leakage has occurred, and allows administrators to detect sophisticated users who may change the names of files they are copying to storage devices in order to evade logging (e.g.