According to a recent and comprehensive analysis of information security breaches, 23% of attacks are attributable to internal instances. Presented herein are techniques for protecting businesses against the sharing of confidential information within applications with unauthorized meeting participants. In particular, techniques presented herein restrict screen sharing of confidential information by preventing confidential content from being displayed on an unauthorized user’s endpoint device during a collaboration session.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.