Data Security testing: use this site to
test controls that trigger security functions
DLP testing: visit this page from inside your enterprise to test
for data leakage policy compliance.
Endpoint DLP testing:
visit this page from any corporate computing device to test
detection and prevention of Endpoint DLP solutions.
Data Theft testing: visit this page from your cloud database
server to test the ability to leak test data -simulating mass
data exfiltration or abnormal data behavior.
full cloud proxy deployments this site can be used to test
advanced CASB DLP capabilities.
data leakage method should be detected by all network and
endpoint based Data Security tools and is the most common way
data is leaked through a browser. This is our most popular test.
POST is the most common method used to leak data over web pages. Social media
sites, blogs, forums, web based email, as well as botnet/ back door, malware
phone home, and data theft tools often use this method to "exfiltrate" or steal
POST is a method of upload from a web page form where the page variables
(form data) are pushed up to the server. In this case when the "Submit" button
is pushed the variables/ data are sent to the server to be used to build the content
of the following page. If the Data Security product worked a block page will be
displayed. If the page displays showing your data then the data was successfully
leaked to the world.
*Data posted through the "POST" form is not collected or stored