According to a recent and comprehensive analysis of information security breaches, 23% of attacks are attributable to internal instances. Presented herein are techniques for protecting businesses against the sharing of confidential information within applications with unauthorized meeting participants. In particular, techniques presented herein restrict screen sharing of confidential information by preventing confidential content from being displayed on an unauthorized user’s endpoint device during a collaboration session.
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.
Zacks, Dave; Szigeti, Tim; Hulick, Ted; Pignataro, Carlos M.; and Giorcelli, Stefano, "PREVENTING DATA LEAKS FROM APPLICATION SCREEN-SHARING", Technical Disclosure Commons, (April 28, 2023)