CINXE.COM

What Is Data Exfiltration? Meaning & Prevention | Proofpoint UK

<!DOCTYPE html> <html lang="en-gb" dir="ltr" prefix="content: http://purl.org/rss/1.0/modules/content/ dc: http://purl.org/dc/terms/ foaf: http://xmlns.com/foaf/0.1/ og: http://ogp.me/ns# rdfs: http://www.w3.org/2000/01/rdf-schema# schema: http://schema.org/ sioc: http://rdfs.org/sioc/ns# sioct: http://rdfs.org/sioc/types# skos: http://www.w3.org/2004/02/skos/core# xsd: http://www.w3.org/2001/XMLSchema# " class="page-en-gb"> <head> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-MGR7P8X');</script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-B1V8SZE3GL"></script> <script>window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-B1V8SZE3GL');</script> <script>(function(){var a=window.mutiny=window.mutiny||{};if(!window.mutiny.client){a.client={_queue:{}};var b=["identify","trackConversion"];var c=[].concat(b,["defaultOptOut","optOut","optIn"]);var d=function factory(c){return function(){for(var d=arguments.length,e=new Array(d),f=0;f<d;f++){e[f]=arguments[f]}a.client._queue[c]=a.client._queue[c]||[];if(b.includes(c)){return new Promise(function(b,d){a.client._queue[c].push({args:e,resolve:b,reject:d})})}else{a.client._queue[c].push({args:e})}}};c.forEach(function(b){a.client[b]=d(b)})}})();</script> <script data-cfasync="false" src="https://client-registry.mutinycdn.com/personalize/client/d454424c4514a20a.js"></script> <meta charset="utf-8" /> <meta name="description" content="Data exfiltration is the unauthorised data movement from a server or individual’s computer. Learn about preventing data exfiltration and why it matters." /> <link rel="shortlink" href="https://www.proofpoint.com/uk/threat-reference/data-exfiltration" /> <link rel="canonical" href="https://www.proofpoint.com/uk/threat-reference/data-exfiltration" /> <link rel="icon" href="/themes/custom/proofpoint/apps/drupal/favicon.ico" /> <link rel="mask-icon" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon.svg" /> <link rel="icon" sizes="16x16" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-16x16.png" /> <link rel="icon" sizes="32x32" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-32x32.png" /> <link rel="icon" sizes="96x96" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-96x96.png" /> <link rel="icon" sizes="192x192" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-192x192.png" /> <link rel="apple-touch-icon" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-60x60.png" /> <link rel="apple-touch-icon" sizes="72x72" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-72x72.png" /> <link rel="apple-touch-icon" sizes="76x76" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-76x76.png" /> <link rel="apple-touch-icon" sizes="114x114" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-114x114.png" /> <link rel="apple-touch-icon" sizes="120x120" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-120x120.png" /> <link rel="apple-touch-icon" sizes="144x144" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-144x144.png" /> <link rel="apple-touch-icon" sizes="152x152" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-152x152.png" /> <link rel="apple-touch-icon" sizes="180x180" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-180x180.png" /> <link rel="apple-touch-icon-precomposed" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-57x57.png" /> <link rel="apple-touch-icon-precomposed" sizes="72x72" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-72x72.png" /> <link rel="apple-touch-icon-precomposed" sizes="76x76" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-76x76.png" /> <link rel="apple-touch-icon-precomposed" sizes="114x114" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-114x114.png" /> <link rel="apple-touch-icon-precomposed" sizes="120x120" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-120x120.png" /> <link rel="apple-touch-icon-precomposed" sizes="144x144" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-144x144.png" /> <link rel="apple-touch-icon-precomposed" sizes="152x152" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-152x152.png" /> <link rel="apple-touch-icon-precomposed" sizes="180x180" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-180x180.png" /> <meta property="og:site_name" content="Proofpoint" /> <meta property="og:type" content="website" /> <meta property="og:url" content="https://www.proofpoint.com/uk/threat-reference/data-exfiltration" /> <meta property="og:title" content="What Is Data Exfiltration? Meaning &amp; Prevention | Proofpoint UK" /> <meta property="og:description" content="Data exfiltration is the unauthorised data movement from a server or individual’s computer. Learn about preventing data exfiltration and why it matters." /> <meta property="og:image" content="" /> <meta property="og:image:url" content="" /> <meta property="og:image:secure_url" content="" /> <meta property="article:published_time" content="2024-11-04T08:17:50-08:00" /> <meta property="article:modified_time" content="2024-11-04T08:27:07-08:00" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:site" content="@proofpoint" /> <meta name="twitter:title" content="What Is Data Exfiltration? Meaning &amp; Prevention | Proofpoint UK" /> <meta name="twitter:description" content="Data exfiltration is the unauthorised data movement from a server or individual’s computer. Learn about preventing data exfiltration and why it matters." /> <meta name="twitter:url" content="https://www.proofpoint.com/uk/threat-reference/data-exfiltration" /> <meta name="twitter:image" content="" /> <script data-cfasync="false" type="text/javascript" id="vwoCode">window._vwo_code=window._vwo_code || (function() { var account_id=767242, version=1.3, settings_tolerance=2000, library_tolerance=2500,z use_existing_jquery=false, is_spa=1, hide_element='body', /* DO NOT EDIT BELOW THIS LINE */ f=false,d=document,code={use_existing_jquery:function(){return use_existing_jquery},library_tolerance:function(){return library_tolerance},finish:function(){if(!f){f=true;var e=d.getElementById('_vis_opt_path_hides');if(e)e.parentNode.removeChild(e)}},finished:function(){return f},load:function(e){var t=d.createElement('script');t.fetchPriority='high';t.src=e;t.type='text/javascript';t.innerText;t.onerror=function(){_vwo_code.finish()};d.getElementsByTagName('head')[0].appendChild(t)},init:function(){window.settings_timer=setTimeout(function(){_vwo_code.finish()},settings_tolerance);var e=d.createElement('style'),t=hide_element?hide_element+'{opacity:0 !important;filter:alpha(opacity=0) !important;background:none !important;}':'',i=d.getElementsByTagName('head')[0];e.setAttribute('id','_vis_opt_path_hides');e.setAttribute('nonce',document.querySelector('#vwoCode').nonce);e.setAttribute('type','text/css');if(e.styleSheet)e.styleSheet.cssText=t;else e.appendChild(d.createTextNode(t));i.appendChild(e);this.load('https://dev.visualwebsiteoptimizer.com/j.php?a='+account_id+'&u='+encodeURIComponent(d.URL)+'&f='+ +is_spa+'&vn='+version);return settings_timer}};window._vwo_settings_timer = code.init();return code;}());</script> <meta name="facebook-domain-verification" content="l349mr2tyecyl7w3a1146378lqxru1" /> <meta name="MobileOptimized" content="width" /> <meta name="HandheldFriendly" content="true" /> <meta name="viewport" content="width=device-width, initial-scale=1.0" /> <link rel="preload" href="/themes/custom/proofpoint/dist/app-drupal/assets/fonts/proofpoint.woff2" as="font" crossorigin="anonymous" /> <link rel="preload" href="/themes/custom/proofpoint/dist/app-drupal/assets/fonts/RobotoCondensed-Regular-webfont.woff" as="font" crossorigin="anonymous" /> <link rel="preload" href="/themes/custom/proofpoint/dist/app-drupal/assets/fonts/fjalla-one-v7-latin-regular.woff" as="font" crossorigin="anonymous" /> <link rel="preload" href="/themes/custom/proofpoint/dist/app-drupal/assets/fonts/fjalla-one-v7-latin-regular.woff2" as="font" crossorigin="anonymous" /> <link rel="preload" href="/themes/custom/proofpoint/dist/app-drupal/assets/fonts/RobotoCondensed-Bold-webfont.woff" as="font" crossorigin="anonymous" /> <link rel="alternate" hreflang="en-us" href="https://www.proofpoint.com/us/threat-reference/data-exfiltration" /> <link rel="alternate" hreflang="en-gb" href="https://www.proofpoint.com/uk/threat-reference/data-exfiltration" /> <link rel="alternate" hreflang="fr" href="https://www.proofpoint.com/fr/threat-reference/data-exfiltration" /> <link rel="alternate" hreflang="de" href="https://www.proofpoint.com/de/threat-reference/data-exfiltration" /> <link rel="alternate" hreflang="es" href="https://www.proofpoint.com/es/threat-reference/data-exfiltration" /> <link rel="alternate" hreflang="ja" href="https://www.proofpoint.com/jp/threat-reference/data-exfiltration" /> <link rel="alternate" hreflang="en-au" href="https://www.proofpoint.com/au/threat-reference/data-exfiltration" /> <link rel="alternate" hreflang="it" href="https://www.proofpoint.com/it/threat-reference/data-exfiltration" /> <title>What Is Data Exfiltration? Meaning &amp; Prevention | Proofpoint UK</title> <link rel="stylesheet" media="all" href="/sites/default/files/css/css_5x1zduTS4IFCCOssa4IT2g5zuOu1aGbQfcPEEW3PgCM.css?delta=0&amp;language=en-gb&amp;theme=particle&amp;include=eJxlkVtuAyEMRTcUiqr-dDeRYRwGxdjINlGz-5Iq0jDqJ4cr3Yd7v9bPb44EXAYUDBs6Zhe99H5toHd0iW1w3u-VX8wQNO9xeCV7vX3HhtFFKIFe7GmOLSYwvHRQr5kwZlFcpJAYUqpcDkURKYThJux20JuIo4bH1yIkMQN9Bpbt5MCO7KHPBnrgHWE7-SSdJOto6c8GikLfLW46OtDHQT4G95Go2o7b4uIQEjCvFjNQAgpIs9opvHXIS0JFk6EZLSSSfF8ikZT_slDnjAd2_PGQhUbjdR9FDK51-ndgpOPnfbg5qLZ1DpV3gdOor5kmYnj8AgYByp8" /> <link rel="stylesheet" media="all" href="/sites/default/files/css/css_H1oo2K_LNbajykqO9MfwB2whGBlZ1n0V8VRcHQ_goDg.css?delta=1&amp;language=en-gb&amp;theme=particle&amp;include=eJxlkVtuAyEMRTcUiqr-dDeRYRwGxdjINlGz-5Iq0jDqJ4cr3Yd7v9bPb44EXAYUDBs6Zhe99H5toHd0iW1w3u-VX8wQNO9xeCV7vX3HhtFFKIFe7GmOLSYwvHRQr5kwZlFcpJAYUqpcDkURKYThJux20JuIo4bH1yIkMQN9Bpbt5MCO7KHPBnrgHWE7-SSdJOto6c8GikLfLW46OtDHQT4G95Go2o7b4uIQEjCvFjNQAgpIs9opvHXIS0JFk6EZLSSSfF8ikZT_slDnjAd2_PGQhUbjdR9FDK51-ndgpOPnfbg5qLZ1DpV3gdOor5kmYnj8AgYByp8" /> <script src="/sites/default/files/js/js_Wi8RdyzDF-uwGcwq9eMv1Giiu7RfMo7nYneG5kg6rd4.js?scope=header&amp;delta=0&amp;language=en-gb&amp;theme=particle&amp;include=eJxlkVtuAyEMRTcUiqr-dDeRYRwGxdjINlGz-5Iq0jDqJ4cr3Yd7v9bPb44EXAYUDBs6Zhe99H5toHd0iW1w3u-VX8wQNO9xeCV7vX3HhtFFKIFe7GmOLSYwvHRQr5kwZlFcpJAYUqpcDkURKYThJux20JuIo4bH1yIkMQN9Bpbt5MCO7KHPBnrgHWE7-SSdJOto6c8GikLfLW46OtDHQT4G95Go2o7b4uIQEjCvFjNQAgpIs9opvHXIS0JFk6EZLSSSfF8ikZT_slDnjAd2_PGQhUbjdR9FDK51-ndgpOPnfbg5qLZ1DpV3gdOor5kmYnj8AgYByp8"></script> </head> <body class="path-node"> <a href="#main-content" class="visually-hidden focusable"> Skip to main content </a> <div class="limit-width-wrapper"> <div class="dialog-off-canvas-main-canvas" data-off-canvas-main-canvas> <div class="header-nav__spacer"></div> <div class="header-nav js-is-top"> <div class="header-nav__extra"> <div class="header-nav__extra-wrap"> <div class="header-nav__top-language" data-open="content:x_lng"> <span>English (Europe, Middle East, Africa)</span> </div> <div class="header-nav__actions"> <div class="header-nav__top-search" data-open="content:x_sch"> <span>Search</span> </div> <div class="header-nav__top-login" data-open="content:x_lgn"> <span>Login</span> </div> </div> </div> </div> <div class="header-nav__main"> <div class="header-nav__main-wrap"> <div class="header-nav__expand" data-open="home"></div> <ul class="header-nav__top-links"> <li class="header-nav__top-link"> <div data-open="content:platform_panel" class="header-nav__top-link-text"> Platform </div> </li> <li class="header-nav__top-link"> <div data-open="content:products_panel" class="header-nav__top-link-text"> Products </div> </li> <li class="header-nav__top-link"> <div data-open="content:solutions_panel" class="header-nav__top-link-text"> Solutions </div> </li> </ul> <a href="/uk" class="header-nav__logo">Proofpoint</a> <div class="header-nav__buttons"> <a href=/uk/contact class="global-elements__cta-button--outline header-nav__button" > <span>Contact</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> </div> <div class="header-nav__mobile-actions"> <div class="header-nav__mobile-search" data-open="content:x_sch">Search</div> <div class="header-nav__mobile-menu" data-open="home"></div> </div> </div> </div> </div> <div class="header-nav__menu"> <div class="header-nav__menu-wrapper"> <div class="header-nav__menu-close"></div> <div class="header-nav__menu-pane" data-home={true}> <ul class="header-nav__home-links"> <li class="header-nav__home-link" data-open="content:platform_panel" ><span>Platform</span></li> <li class="header-nav__home-link" data-open="content:products_panel" ><span>Products</span></li> <li class="header-nav__home-link" data-open="content:solutions_panel" ><span>Solutions</span></li> <li class="header-nav__home-link" data-open="content:partners_panel" ><span>Partners</span></li> <li class="header-nav__home-link" data-open="content:resources_panel" ><span>Resources</span></li> <li class="header-nav__home-link" data-open="content:company_panel" ><span>Company</span></li> </ul> <div class="header-nav__menu-extras"> <div class="header-nav__menu-search" data-open="content:x_sch">Search</div> <div class="header-nav__menu-login" data-open="content:x_lgn">Login</div> <div class="header-nav__menu-language" data-open="content:x_lng">English (Europe, Middle East, Africa)</div> </div> </div> <div class="header-nav__menu-pane" data-sublinks="Platform"> <div class="header-nav__sublinks"> <div class="header-nav__expand-title">Platform</div> <ul class="header-nav__expand-links"> </ul> </div> </div> <div class="header-nav__menu-pane" data-sublinks="Products"> <div class="header-nav__sublinks"> <div class="header-nav__expand-title">Products</div> <ul class="header-nav__expand-links"> </ul> </div> </div> <div class="header-nav__menu-pane" data-sublinks="Solutions"> <div class="header-nav__sublinks"> <div class="header-nav__expand-title">Solutions</div> <ul class="header-nav__expand-links"> </ul> </div> </div> <div class="header-nav__menu-pane" data-sublinks="Partners"> <div class="header-nav__sublinks"> <div class="header-nav__expand-title">Partners</div> <ul class="header-nav__expand-links"> </ul> </div> </div> <div class="header-nav__menu-pane" data-sublinks="Resources"> <div class="header-nav__sublinks"> <div class="header-nav__expand-title">Resources</div> <ul class="header-nav__expand-links"> </ul> </div> </div> <div class="header-nav__menu-pane" data-sublinks="Company"> <div class="header-nav__sublinks"> <div class="header-nav__expand-title">Company</div> <ul class="header-nav__expand-links"> </ul> </div> </div> <div class="header-nav__menu-pane" data-content="products_panel"> <div class="header-nav__content"> <a href="/uk/products/protect-people" class="header-nav__content-link-group-anchor"> <div class="header-nav__content-link-group"> <div class="header-nav__content-group-title">Protect People</div> <div class="header-nav__content-group-desc">Multi-layered, adaptive defences for threat detection, impersonation, and supplier risk.</div> </div> </a> <div class="header-nav__content-link"> <a href="/uk/products/threat-defense" class="header-nav__content-link-text">Email Security</a> </div> <div class="header-nav__content-link"> <a href="/uk/products/impersonation-protection" class="header-nav__content-link-text">Impersonation Protection</a> </div> <div class="header-nav__content-link"> <a href="#" class="header-nav__content-link-text" data-open="content:products_more_tp_products_panel">More products</a> </div> <a href="/uk/products/defend-data" class="header-nav__content-link-group-anchor"> <div class="header-nav__content-link-group"> <div class="header-nav__content-group-title">Defend Data</div> <div class="header-nav__content-group-desc">Transform your information protection with a human-centric, omni-channel approach.</div> </div> </a> <div class="header-nav__content-link"> <a href="/uk/products/data-loss-prevention" class="header-nav__content-link-text">Enterprise DLP</a> </div> <div class="header-nav__content-link"> <a href="/uk/products/adaptive-email-dlp" class="header-nav__content-link-text">Adaptive Email DLP</a> </div> <div class="header-nav__content-link"> <a href="/uk/products/insider-threat-management" class="header-nav__content-link-text">Insider Threat Management</a> </div> <div class="header-nav__content-link"> <a href="/uk/products/compliance-and-archiving" class="header-nav__content-link-text">Intelligent Compliance</a> </div> <div class="header-nav__content-link-group"> <div class="header-nav__content-group-title">Mitigate Human Risk</div> <div class="header-nav__content-group-desc">Unlock full user risk visibility and drive behaviour change.</div> </div> <div class="header-nav__content-link"> <a href="/uk/products/mitigate-human-risk" class="header-nav__content-link-text">Security Awareness</a> </div> <div class="header-nav__content-link-group"> <div class="header-nav__content-group-title">Augment Your Capabilities</div> </div> <div class="header-nav__content-link"> <a href="/uk/products/premium-services" class="header-nav__content-link-text">Managed Services</a> </div> <div class="header-nav__content-link"> <a href="/uk/products/packages" class="header-nav__content-link-text">Product Packages</a> </div> <div class="header-nav__content-link-spacer"></div> </div> </div> <div class="header-nav__menu-pane" data-content="products_more_tp_products_panel"> <div class="header-nav__content"> <div class="header-nav__content-heading">More Protect People Products</div> <div class="header-nav__content-link"> <a href="/uk/products/identity-protection" class="header-nav__content-link-text">Account Take-Over and Identity Protection</a> <div class="header-nav__content-link-desc">Secure vulnerable identities, stop lateral movement and privilege escalation.</div> </div> <div class="header-nav__content-link"> <a href="/uk/products/adaptive-email-security" class="header-nav__content-link-text">Adaptive Email Security</a> <div class="header-nav__content-link-desc">Stop more threats with a fully integrated layer of behavioural AI.</div> </div> <div class="header-nav__content-link"> <a href="/uk/products/email-security-and-protection/secure-email-relay" class="header-nav__content-link-text">Secure Email Relay</a> <div class="header-nav__content-link-desc">Secure your application email and accelerate DMARC implementation</div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="solutions_panel"> <div class="header-nav__content"> <h3 class="header-nav__content-title">Solutions</h3> <div class="header-nav__content-heading">See how we solve today's complex cyber threats and attacks.</div> <div class="header-nav__content-link"> <a href="#" class="header-nav__content-link-text" data-open="content:solutions_by_industry_panel">Solutions by Industry</a> <div class="header-nav__content-link-desc">People-centric solutions for your organisation.</div> </div> <div class="header-nav__content-link"> <a href="/uk/solutions/email-authentication-with-dmarc" class="header-nav__content-link-text">Authenticate Your Email</a> <div class="header-nav__content-link-desc">Protect your email deliverability with DMARC.</div> </div> <div class="header-nav__content-link"> <a href="/uk/solutions/combat-email-and-cloud-threats" class="header-nav__content-link-text">Combat Email and Cloud Threats</a> <div class="header-nav__content-link-desc">Protect your people from email and cloud threats with an intelligent and holistic approach.</div> </div> <div class="header-nav__content-link"> <a href="/uk/solutions/change-user-behavior" class="header-nav__content-link-text">Change User Behaviour</a> <div class="header-nav__content-link-desc">Help your employees identify, resist and report attacks before the damage is done.</div> </div> <div class="header-nav__content-link"> <a href="/uk/solutions/combat-data-loss-and-insider-risk" class="header-nav__content-link-text">Combat Data Loss and Insider Risk</a> <div class="header-nav__content-link-desc">Prevent data loss via negligent, compromised and malicious insiders.</div> </div> <div class="header-nav__content-link"> <a href="/uk/solutions/enable-intelligent-compliance" class="header-nav__content-link-text">Modernise Compliance and Archiving</a> <div class="header-nav__content-link-desc">Manage risk and data retention needs with a modern compliance and archiving solution.</div> </div> <div class="header-nav__content-link"> <a href="/uk/solutions/protect-cloud-apps" class="header-nav__content-link-text">Protect Cloud Apps</a> <div class="header-nav__content-link-desc">Keep your people and their cloud apps secure by eliminating threats and data loss.</div> </div> <div class="header-nav__content-link"> <a href="/uk/solutions/prevent-loss-from-ransomware" class="header-nav__content-link-text">Prevent Loss from Ransomware</a> <div class="header-nav__content-link-desc">Learn about this growing threat and stop attacks by securing ransomware&#039;s top vector: email.</div> </div> <div class="header-nav__content-link"> <a href="/uk/solutions/secure-microsoft-365" class="header-nav__content-link-text">Secure Microsoft 365</a> <div class="header-nav__content-link-desc">Implement the best security and compliance solution for Microsoft 365.</div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="solutions_by_industry_panel"> <div class="header-nav__content"> <h3 class="header-nav__content-title">Solutions By Industry</h3> <div class="header-nav__content-heading">People-centric solutions for your organisation.</div> <div class="header-nav__content-link"> <a href="/uk/solutions/state-and-local-government" class="header-nav__content-link-text">State and Local Government</a> <div class="header-nav__content-link-desc">Protecting the public sector, and the public from cyber threats.</div> </div> <div class="header-nav__content-link"> <a href="/uk/solutions/higher-education-security" class="header-nav__content-link-text">Higher Education</a> <div class="header-nav__content-link-desc">A higher level of security for higher education.</div> </div> <div class="header-nav__content-link"> <a href="/uk/solutions/financial-services-and-insurance" class="header-nav__content-link-text">Financial Services</a> <div class="header-nav__content-link-desc">Eliminate threats, build trust and foster growth for your organisation.</div> </div> <div class="header-nav__content-link"> <a href="/uk/solutions/healthcare-information-security" class="header-nav__content-link-text">Healthcare</a> <div class="header-nav__content-link-desc">Protect clinicians, patient data, and your intellectual property against advanced threats.</div> </div> <div class="header-nav__content-link"> <a href="/uk/solutions/mobile-message-security-solutions-for-service-providers" class="header-nav__content-link-text">Mobile Operators</a> <div class="header-nav__content-link-desc">Make your messaging environment a secure environment.</div> </div> <div class="header-nav__content-link"> <a href="/uk/solutions/email-security-solutions-for-service-providers" class="header-nav__content-link-text">Internet Service Providers</a> <div class="header-nav__content-link-desc">Cloudmark email protection.</div> </div> <div class="header-nav__content-link"> <a href="/uk/solutions/protection-compliance-small-business" class="header-nav__content-link-text">Small and Medium Businesses</a> <div class="header-nav__content-link-desc">Big-time security for small business.</div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="partners_panel"> <div class="header-nav__content"> <h3 class="header-nav__content-title">Partners</h3> <div class="header-nav__content-heading">Deliver Proofpoint solutions to your customers.</div> <a href=https://partners.proofpoint.com class="global-elements__cta-button header-nav__content-button" > <span>Channel Partners</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> <div class="header-nav__content-link"> <a href="/uk/partners/trusted-data-solutions-partnership" class="header-nav__content-link-text">Archive Extraction Partners</a> <div class="header-nav__content-link-desc">Learn about Extraction Partners.</div> </div> <div class="header-nav__content-link"> <a href="/uk/global-system-integrator-gsi-and-global-managed-service-provider-msp-partners" class="header-nav__content-link-text">GSI and MSP Partners</a> <div class="header-nav__content-link-desc">Learn about our global consulting.</div> </div> <div class="header-nav__content-link"> <a href="/uk/partners/technology-alliance-partners" class="header-nav__content-link-text">Technology and Alliance Partners</a> <div class="header-nav__content-link-desc">Learn about our relationships.</div> </div> <div class="header-nav__content-link"> <a href="/uk/partners/digital-risk-and-compliance-partners" class="header-nav__content-link-text">Social Media Protection Partners</a> <div class="header-nav__content-link-desc">Learn about the technology and....</div> </div> <div class="header-nav__content-link"> <a href="/uk/channel-partners-small-and-medium-business" class="header-nav__content-link-text">Proofpoint Essentials Partner Programs</a> <div class="header-nav__content-link-desc">Small Business Solutions .</div> </div> <div class="header-nav__content-link"> <a href="https://partners.proofpoint.com/prm/English/s/applicant" class="header-nav__content-link-text">Become a Channel Partner</a> </div> </div> </div> <div class="header-nav__menu-pane" data-content="resources_panel"> <div class="header-nav__content"> <h3 class="header-nav__content-title">Resources</h3> <div class="header-nav__content-heading">Find reports, webinars, blogs, events, podcasts and more.</div> <a href=/uk/resources class="global-elements__cta-button header-nav__content-button" > <span>Resource Library</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> <div class="header-nav__content-link"> <a href="/uk/blog" class="header-nav__content-link-text">Blog</a> <div class="header-nav__content-link-desc">Keep up with the latest news and happenings.</div> </div> <div class="header-nav__content-link"> <a href="/uk/webinars" class="header-nav__content-link-text">Webinars</a> <div class="header-nav__content-link-desc">Browse our webinar library to learn about the latest threats, trends and issues in cybersecurity.</div> </div> <div class="header-nav__content-link"> <a href="/us/cybersecurity-academy" class="header-nav__content-link-text">Cybersecurity Academy</a> <div class="header-nav__content-link-desc">Earn your certification to become a Proofpoint Certified Guardian.</div> </div> <div class="header-nav__content-link"> <a href="/uk/podcasts" class="header-nav__content-link-text">Podcasts</a> <div class="header-nav__content-link-desc">Learn about the human side of cybersecurity.</div> </div> <div class="header-nav__content-link"> <a href="/uk/new-perimeters" class="header-nav__content-link-text">New Perimeters Magazine</a> <div class="header-nav__content-link-desc">Get the latest cybersecurity insights in your hands.</div> </div> <div class="header-nav__content-link"> <a href="/uk/threat-reference" class="header-nav__content-link-text">Threat Glossary</a> <div class="header-nav__content-link-desc">Learn about the latest security threats.</div> </div> <div class="header-nav__content-link"> <a href="/uk/events" class="header-nav__content-link-text">Events</a> <div class="header-nav__content-link-desc">Connect with us at events to learn how to protect your people and data from ever-evolving threats.</div> </div> <div class="header-nav__content-link"> <a href="/uk/customer-stories" class="header-nav__content-link-text">Customer Stories</a> <div class="header-nav__content-link-desc">Read how our customers solve their most pressing cybersecurity challenges.</div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="company_panel"> <div class="header-nav__content"> <h3 class="header-nav__content-title">Company</h3> <div class="header-nav__content-heading">Proofpoint protects organisations' greatest assets and biggest risks: their people.</div> <a href=/uk/company/about class="global-elements__cta-button header-nav__content-button" > <span>About Proofpoint</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> <div class="header-nav__content-link"> <a href="/uk/why-proofpoint" class="header-nav__content-link-text">Why Proofpoint</a> <div class="header-nav__content-link-desc">Learn about our unique people-centric approach to protection.</div> </div> <div class="header-nav__content-link"> <a href="/uk/company/careers" class="header-nav__content-link-text">Careers</a> <div class="header-nav__content-link-desc">Stand out and make a difference at one of the world&#039;s leading cybersecurity companies.</div> </div> <div class="header-nav__content-link"> <a href="/uk/newsroom" class="header-nav__content-link-text">News Center</a> <div class="header-nav__content-link-desc">Read the latest press releases, news stories and media highlights about Proofpoint.</div> </div> <div class="header-nav__content-link"> <a href="/uk/legal/trust" class="header-nav__content-link-text">Privacy and Trust</a> <div class="header-nav__content-link-desc">Learn about how we handle data and make commitments to privacy and other regulations.</div> </div> <div class="header-nav__content-link"> <a href="/uk/legal/esg" class="header-nav__content-link-text">Environmental, Social, and Governance</a> <div class="header-nav__content-link-desc">Learn how we apply our principles to positively impact our community.</div> </div> <div class="header-nav__content-link"> <a href="/uk/support-services" class="header-nav__content-link-text">Support</a> <div class="header-nav__content-link-desc">Access the full range of Proofpoint support services.</div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="platform_panel"> <div class="header-nav__content"> <h3 class="header-nav__content-title">Platform</h3> <div class="header-nav__content-heading">Discover the Proofpoint human-centric platform.</div> <a href=/uk/platform class="global-elements__cta-button header-nav__content-button" > <span>Learn More</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> <div class="header-nav__content-link"> <a href="/uk/platform/nexus" class="header-nav__content-link-text">Proofpoint Nexus</a> <div class="header-nav__content-link-desc">Detection technologies to protect people and defend data.</div> </div> <div class="header-nav__content-link"> <a href="/uk/platform/zen" class="header-nav__content-link-text">Proofpoint Zen</a> <div class="header-nav__content-link-desc">Protect and engage users wherever they work.</div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="x_sch"> <div class="header-nav__content"> <div class="header-nav__content-title--search"> Search Proofpoint </div> <div class="header-nav__search"> <form class="header-nav__search-form"> <input type="text" class="header-nav__search-input" placeholder=""> <input type="submit" class="header-nav__search-button" val="Search"> </form> <div class="header-nav__search-sugg-title">Try searching for</div> <div class="header-nav__search-suggestions"> <a href="/uk/search?content%5Bquery%5D=Email%20Security" class="header-nav__search-suggestion">Email Security</a> <a href="/uk/search?content%5Bquery%5D=Phishing" class="header-nav__search-suggestion">Phishing</a> <a href="/uk/search?content%5Bquery%5D=DLP" class="header-nav__search-suggestion">DLP</a> <a href="/uk/search?content%5Bquery%5D=Email%20Fraud" class="header-nav__search-suggestion">Email Fraud</a> </div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="x_lgn"> <div class="header-nav__content"> <div class="header-nav__content-title"> Select Product Login </div> <ul class="header-nav__logins"> <li class="header-nav__content-login"> <a href="https://proofpoint.my.site.com/community/s/" target="_blank">Support Log-in</a> </li> <li class="header-nav__content-login"> <a href="https://proofpointcybersecurityacademy.adobelearningmanager.com" target="_blank">Proofpoint Cybersecurity Academy</a> </li> <li class="header-nav__content-login"> <a href="https://digitalrisk.proofpoint.com/" target="_blank">Digital Risk Portal</a> </li> <li class="header-nav__content-login"> <a href="https://emaildefense.proofpoint.com/login.php" target="_blank">Email Fraud Defence</a> </li> <li class="header-nav__content-login"> <a href="https://threatintel.proofpoint.com/" target="_blank">ET Intelligence</a> </li> <li class="header-nav__content-login"> <a href="https://us1.proofpointessentials.com/app/login.php" target="_blank">Proofpoint Essentials</a> </li> <li class="header-nav__content-login"> <a href="https://proofpointcommunities.force.com/community" target="_blank">Sendmail Support Log-in</a> </li> </ul> </div> </div> <div class="header-nav__menu-pane" data-content="x_lng"> <div class="header-nav__content"> <div class="header-nav__content-title"> Select Language </div> <ul class="header-nav__language-links"> <li class="header-nav__language-link"> <a href="/uk">English (Europe, Middle East, Africa)</a> </li> <li class="header-nav__language-link"> <a href="/us">English (Americas)</a> </li> <li class="header-nav__language-link"> <a href="/au">English (Asia-Pacific)</a> </li> <li class="header-nav__language-link"> <a href="/es">Español</a> </li> <li class="header-nav__language-link"> <a href="/de">Deutsch</a> </li> <li class="header-nav__language-link"> <a href="/fr">Français</a> </li> <li class="header-nav__language-link"> <a href="/it">Italiano</a> </li> <li class="header-nav__language-link"> <a href="/br">Português</a> </li> <li class="header-nav__language-link"> <a href="/jp">日本語</a> </li> <li class="header-nav__language-link"> <a href="/kr">한국어</a> </li> </ul> </div> </div> </div> </div> <div class="layout-container"> <div> <div data-drupal-messages-fallback class="hidden"></div> </div> <main class="container" role="main"> <a id="main-content" tabindex="-1"></a> <section class="row"> <div class="layout-content"> <div> <div id="block-particle-content"> <article about="/uk/threat-reference/data-exfiltration" class="node--type--glossary node--view-mode--full node node-glossary-full"> <script type="application/ld+json"> { "@context": "https://schema.org/", "@type": "DefinedTerm", "name": "What Is Data Exfiltration?", "description": "Data Exfiltration Meaning How Does Data Exfiltration Occur? Types of Data Exfiltration Data Exfiltration vs. Data Leakage vs. Data Breach How to Detect Data Exfiltration How to Prevent Data Exfiltration with User and Data Activity Monitoring How Proofpoint Can Help", "url": "https://www.proofpoint.com/uk/threat-reference/data-exfiltration", "inDefinedTermSet": "https://www.proofpoint.com/uk/threat-reference" } </script> <div class="glossary-content__breadcrumbs"> <div class="breadcrumbs"><div class="nav-crumbs"><div class="breadcrumb__item"><a href="/uk/threat-reference" class="breadcrum__item-link">Glossary</a></div><div class="breadcrumb__item"> What Is Data Exfiltration? </div></div></div> </div> <div class="glossary-content__hero"> <div class="paragraph paragraph--type--hero-banner-v3 paragraph--view-mode--default hero-banner-v3" style="background-image: url(&quot;/sites/default/files/styles/webp_conversion/public/general-banners/pfpt-placeholder-banner-2022.png.webp?itok=E050rqaL&quot;)"> <div class="hero-banner-v3__wrapper hero-banner-v3__wrapper-default"> <h1 class="hero-banner-v3__title"> What Is Data Exfiltration? </h1> <a href=/uk/free-trial-request class="global-elements__cta-button--white" target="" > <span>Request a Free Trial</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> <a href=/uk/resources/threat-reports/state-of-phish class="global-elements__cta-button" target="" > <span>Download the 2023 State of the Phish Report</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> </div> </div> </div> <div class="glossary-content"> <h3 class="glossary-content__headline"> Table of Contents </h3> <div class="node-full__body glossary-content__body"> <div style="display: flex; flex-wrap: wrap; margin: 25px 0;"> <ul style="margin: 0; width: 400px;"> <li><a href="#toc-1">Data Exfiltration Meaning</a></li> <li><a href="#toc-2">How Does Data Exfiltration Occur?</a></li> <li><a href="#toc-3">Types of Data Exfiltration</a></li> <li><a href="#toc-4">Data Exfiltration vs. Data Leakage vs. Data Breach</a></li> </ul> <ul style="margin: 0; width: 400px;"> <li><a href="#toc-5">How to Detect Data Exfiltration</a></li> <li><a href="#toc-6">How to Prevent Data Exfiltration with User and Data Activity Monitoring</a></li> <li><a href="#toc-7">How Proofpoint Can Help</a></li> </ul> </div> </div> </div> <div class="glossary__components"> <span data-smooth-scroll="true" class="anchor_link" id="toc-1"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">Data Exfiltration Meaning</h3> <div class="block-text-cols__body"> <p>Data exfiltration is the unauthorised copying, transfer, or retrieval of data from a server or an individual’s computer. It’s a type of security breach that occurs when personal or company data is illicitly copied, transferred, or retrieved from a device or server without proper authorisation, often with malicious intent.</p> <p>As a critical security concern with potentially catastrophic consequences, organisations with high-value data are particularly at risk of data exfiltration attacks, whether from outside threat actors or trusted insiders. They can occur through various attack methods, ranging from phishing and malware attacks to physical theft and file-sharing sites.</p> <p>Today, data exfiltration is a top organisational concern. According to a <a href="https://www.darkreading.com/vulnerabilities---threats/database-leaks-network-traffic-top-data-exfiltration-methods/d/d-id/1334576" rel="noopener" target="_blank">recent study from McAfee</a>, 61% of security professionals have experienced a <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="089fd102-4c13-4972-ae00-d80e9b78ad6f" href="/uk/threat-reference/data-breach" title="Data Breach">data breach</a> at their current company. Stricter compliance regulations around data privacy, like <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="03c62b07-e2e1-49a5-860b-6454ed897f9d" href="/uk/threat-reference/gdpr" title="GDPR">GDPR</a> and the <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="244c0f94-a024-40b8-a842-a0f9fbf0a37e" href="/uk/threat-reference/ccpa-compliance" title="CCPA Compliance">California Consumer Privacy Act</a>, have raised the stakes for reporting data exfiltration events.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__sm"> </div> </div> </div> <div class="paragraph paragraph--type--free-trial-panel paragraph--view-mode--full free-trial-panel free-trial-panel--black v3-dark-bg-only free-trial-panel--no-img"> <div class="free-trial-panel__wrapper"> <div class="free-trial-panel__content"> <div class="free-trial-panel__heading"> <h3>Cybersecurity Education and Training Begins Here</h3> </div> <a href=# class="global-elements__cta-button--white free-trial-panel__action-btn" > <span>Start a Free Trial</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> </div> </div> <div class="free-trial-panel-form"> <div class="paragraph paragraph--type--marketo-form paragraph--view-mode--default marketo-form UNCONVERTED"> <div class="marketo-form__content"> <h2>Here’s how your free trial works:</h2> <ul> <li>Meet with our cybersecurity experts to assess your environment and identify your threat risk exposure</li> <li>Within 24 hours and minimal configuration, we’ll deploy our solutions for 30 days</li> <li>Experience our technology in action!</li> <li>Receive report outlining your security vulnerabilities to help you take immediate action against cybersecurity attacks</li> </ul> <p>Fill out this form to request a meeting with our cybersecurity experts.</p> </div> <div class="marketo-form__form-container"> <div class="mk-form"> <div class="mk-form__form-container"> <script type="IN/Form2" data-data-form="mktoForm_3414" data-field-firstname="FirstName" data-field-lastname="LastName" data-field-email="Email" data-field-company="Company" data-field-title="Title" data-field-state="State" data-field-country="Country" ></script> <form id="mktoForm_3414" data-mkto-id="3414" data-mkto-base="//app-abj.marketo.com" data-munchkin-id="309-RHV-619" data-submit-text="" data-redirect-link="" data-prefill="" data-event-label="" data-lang-code="uk" data-validate-email="1" class="mk-form__form marketo-form-block__form" ></form> </div> </div> <div class="mk-form__success"> <p>Thank you for your submission.</p> </div> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__md"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-2"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">How Does Data Exfiltration Occur?</h3> <div class="block-text-cols__body"> <p>Outsider attacks and insider threats are the two primary ways data is exfiltrated.</p> <p><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="dc00abb4-0611-4d1e-9b06-66929590f24f" href="/uk/threat-reference/insider-threat" title="Insider Threat">Insider threat incidents</a>&nbsp;are one of the top causes of data exfiltration, whether accidental or malicious. Malicious insider threats are trusted individuals who intentionally exfiltrate data to harm an organisation for their own (or someone else’s) gain. However, two out of three insider threat incidents are accidental, which could prove equally costly to an organisation if these mistakes take too long to investigate.</p> <p>As for outsider attacks, data exfiltration can happen through:</p> <ul> <li>Social engineering via email or various internet channels like spoofed sites for phishing, file-sharing sites, and social media.</li> <li>Malware injection onto an endpoint, such as a computer or mobile device connected to the corporate network.</li> <li>Hackers who breach systems that rely on vendor-set or easy-to-crack passwords.</li> </ul> <p>Data exfiltration can be conducted manually by an individual with physical access to a computer but can also be automated through malicious programming over a network.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__sm"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-3"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">Types of Data Exfiltration</h3> <div class="block-text-cols__body"> <p>According to McAfee’s research cited above, the most common data exfiltration methods at organisations include:</p> <ul> <li><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="5021d5f5-e118-42aa-94ba-306c619a211d" href="/uk/threat-reference/data-leak" title="Data Leak">Database leaks</a></li> <li>Network traffic</li> <li>File shares</li> <li>Corporate email</li> <li>Malware attacks</li> </ul> <h4>Cloud Apps and Databases</h4> <p>A recent “CA Technologies Insider Threat” report called databases “The number-one most vulnerable IT asset”, ahead of file servers, cloud apps, and mobile devices. Because the data contained within them is so valuable, databases are commonly targeted by both insiders and external attackers alike.</p> <h4>Exfiltration of Data Through Removable Storage Media</h4> <p>Removable media are another common insider threat vector. Even in the age of ubiquitous cloud storage, old-school data exfiltration methods like flash drives are still pervasive. While altogether banning USB use for every organisation is unrealistic, employees must understand the risks and adhere to policies around data access and storage.</p> <p>While file shares top the list of data exfiltration methods in North America, USB drives are the number-one exfiltration vector in APAC and Europe.</p> <h4>Accidental Insider Threats</h4> <p>Besides users with malicious intentions, accidental insider threats are a primary cause of data exfiltration.&nbsp;<a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="3d41a44d-bc21-401b-8912-4f84e4e683ce" href="/uk/threat-reference/phishing" title="Phishing">Phishing</a>&nbsp;emails and social engineering attacks remain a tried-and-true way for hackers to access company data. In addition, weak or reused passwords or a lack of&nbsp;<a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="b8d75393-714c-4d80-9662-80f4c02efedc" href="/uk/threat-reference/multifactor-authentication" title="Multifactor Authentication">multifactor authentication</a>, are common weaknesses hackers seek to infiltrate a user’s account. In these scenarios, the best defence is often cybersecurity awareness. McAfee’s study also showed that insider threats frequently used email data exfiltration.</p> <h4>Data Misuse</h4> <p>According to a recent&nbsp;<a href="https://www.verizon.com/business/resources/reports/insider-threat-report/" rel="noopener" target="_blank">Verizon Insider Threat Report</a>, misuse is another top cause of data exfiltration. Unlike its careless cousin, the accidental insider threat, misuse is when users intentionally or unintentionally circumvent security controls or policies. For example, an employee may use unsanctioned software to work with a third-party contractor because it’s faster or easier to use, resulting in unintentional data exfiltration.</p> <p>Employees can also exfiltrate company data in various ways, including personal email accounts, cloud storage, printers, file-sharing sites, keyboard shortcuts, and more. Organisations can find it challenging to distinguish legitimate user activity from malicious activity. However, using a system that delivers context into user actions can help.</p> <h4>Malware Attacks</h4> <p>Data exfiltration is often the target of malware attacks, where the malware is injected into a computer or mobile device connected to an organisation’s network. Once injected, the malware exfiltrates the data to an external server controlled by the attacker, where it’s sold or distributed. These malware attacks can spread across an organisation’s network and infiltrate other devices, searching for sensitive corporate data to exfiltrate information.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__sm"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-4"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">Data Exfiltration vs. Data Leakage vs. Data Breach</h3> <div class="block-text-cols__body"> <p>While these terms are often used interchangeably, they represent distinct types of <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="3ec6a423-6fcb-4f88-aa77-e9d91183132e" href="/uk/threat-reference/data-security" title="Data Security">data security</a> incidents. Understanding their differences is crucial for proper incident classification and response.</p> <p><strong>Data Exfiltration</strong> is a deliberate, targeted extraction of data from a secure system. It involves the unauthorised transfer of data to an external destination and typically requires malicious intent. This occurs through sophisticated attack methods like malware deployment, social engineering, or exploitation of system vulnerabilities.</p> <p><strong>Data Leakage</strong> occurs when sensitive information is unintentionally exposed due to human error or system misconfiguration. Common examples include misconfigured cloud storage, accidental email attachments, or improper data handling. Unlike exfiltration, leakage doesn’t require malicious intent and often results from negligence or lack of security awareness.</p> <p><strong>Data Breach</strong> encompasses a broader category of security incidents where unauthorised access to protected information occurs. It can result from either exfiltration or leakage and includes any incident involving unauthorised disclosure, loss of control, or data compromise.</p> <p>&nbsp;</p> <div class="mobile-display"> <div class="grid-container"><!-- Group 1 --> <div class="grid-item hdr"><strong>Aspect</strong></div> <div class="grid-item hdr"><strong>Data Exfiltration</strong></div> <div class="grid-item hdr"><strong>Data Leakage</strong></div> <div class="grid-item hdr"><strong>Data Breach</strong></div> <div class="grid-item center"> <p><strong>Intent</strong></p> </div> <div class="grid-item center">Always intentional</div> <div class="grid-item center">Typically unintentional</div> <div class="grid-item center">Can be either</div> <!-- Group 2 --> <div class="grid-item hdr"><strong>Aspect</strong></div> <div class="grid-item hdr"><strong>Data Exfiltration</strong></div> <div class="grid-item hdr"><strong>Data Leakage</strong></div> <div class="grid-item hdr"><strong>Data Breach</strong></div> <div class="grid-item center"> <p><strong>Cause</strong></p> </div> <div class="grid-item center">Malicious actors</div> <div class="grid-item center">Human error/negligence</div> <div class="grid-item center">Multiple causes</div> <!-- Group 3 --> <div class="grid-item hdr"><strong>Aspect</strong></div> <div class="grid-item hdr"><strong>Data Exfiltration</strong></div> <div class="grid-item hdr"><strong>Data Leakage</strong></div> <div class="grid-item hdr"><strong>Data Breach</strong></div> <div class="grid-item center"> <p><strong>Scope</strong></p> </div> <div class="grid-item center">Targeted data theft</div> <div class="grid-item center">Accidental exposure</div> <div class="grid-item center">Any unauthorised access</div> <!-- Group 4 --> <div class="grid-item hdr"><strong>Aspect</strong></div> <div class="grid-item hdr"><strong>Data Exfiltration</strong></div> <div class="grid-item hdr"><strong>Data Leakage</strong></div> <div class="grid-item hdr"><strong>Data Breach</strong></div> <div class="grid-item center"> <p><strong>Method</strong></p> </div> <div class="grid-item center">Sophisticated attacks</div> <div class="grid-item center">Configuration errors/mistakes</div> <div class="grid-item center">Various methods</div> </div> </div> <!-- Desktop --> <div class="desktop-display"> <div class="grid-container"><!-- hdrs --> <div class="grid-item hdr"><strong>Aspect</strong></div> <div class="grid-item hdr"><strong>Data Exfiltration</strong></div> <div class="grid-item hdr"><strong>Data Leakage</strong></div> <div class="grid-item hdr"><strong>Data Breach</strong></div> <!-- Row 1 --> <div class="grid-item center"> <p><strong>Intent</strong></p> </div> <div class="grid-item center">Always intentional</div> <div class="grid-item center">Typically unintentional</div> <div class="grid-item center">Can be either</div> <!-- Row 2 --> <div class="grid-item center"> <p><strong>Cause</strong></p> </div> <div class="grid-item center">Malicious actors</div> <div class="grid-item center">Human error/negligence</div> <div class="grid-item center">Multiple causes</div> <!-- Row 3 --> <div class="grid-item center"> <p><strong>Scope</strong></p> </div> <div class="grid-item center">Targeted data theft</div> <div class="grid-item center">Accidental exposure</div> <div class="grid-item center">Any unauthorised access</div> <!-- Row 4 --> <div class="grid-item center"> <p><strong>Method</strong></p> </div> <div class="grid-item center">Sophisticated attacks</div> <div class="grid-item center">Configuration errors/mistakes</div> <div class="grid-item center">Various methods</div> </div> </div> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__sm"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-5"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">How to Detect Data Exfiltration</h3> <div class="block-text-cols__body"> <p>Detecting data exfiltration requires a multi-layered approach to identify suspicious patterns and anomalous behaviours. Network monitoring tools can spot unusual spikes in outbound traffic or data transfers at odd hours.</p> <p>Organisations should watch for telltale signs like large, compressed file transfers, unexpected admin account usage, and unusual access to sensitive databases. Advanced detection systems can identify when data is encoded or encrypted differently than normal traffic patterns. Some of the most common detection methods include:</p> <ul> <li><strong>Monitoring DNS queries</strong>: Investigating suspicious DNS queries that lead to known malicious domains. This is crucial as attackers often use DNS tunnelling to surreptitiously exfiltrate data. Regular analysis of DNS query patterns and volume can help identify command-and-control communications.</li> <li><strong>Analysing outbound email traffic</strong>: Utilising automated tools to scrutinise outgoing emails for anomalies in content, large attachments, and unauthorised recipients. This includes monitoring for sensitive data patterns, unusual encryption methods, and suspicious email forwarding rules that could indicate compromise.</li> <li><strong>Tracking file access patterns</strong>: Implementing access logs and analytics to detect patterns that deviate from the norm, such as an employee accessing large amounts of sensitive data they wouldn’t typically need. This includes monitoring for mass file downloads, unusual file types, or access from unexpected locations.</li> <li><strong>Implementing data loss prevention (DLP) solutions</strong>: DLP systems can actively monitor and restrict the movement of sensitive data, alerting security teams when potential exfiltration attempts are detected. Modern <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="2fe775d9-f38e-42df-bb63-7c231e61425b" href="/uk/products/data-loss-prevention" title="Stop Data Loss">DLP solutions</a> can also identify and block attempts to transfer data to unauthorised cloud storage services or removable media.</li> <li><strong>User and entity behaviour analytics (UEBA)</strong>: Employing <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="0a237cc2-ef19-4ffa-9d15-5c50b049562a" href="/uk/threat-reference/user-entity-behavior-analytics-ueba" title="UEBA">UEBA</a> tools to establish a baseline of normal user activity, alerting teams to deviations that could signify malicious intent. This includes monitoring login patterns, resource access timing, and unusual lateral movement across network segments.</li> </ul> <p>Real-time alerts and automated response systems are also crucial detection features, as data exfiltration can happen within minutes. Security teams should regularly audit access logs and maintain updated threat intelligence feeds to spot emerging exfiltration techniques.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__sm"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-6"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">How to Prevent Data Exfiltration with User and Data Activity Monitoring</h3> <div class="block-text-cols__body"> <p>Preventing data exfiltration is a critical cybersecurity initiative that requires a comprehensive security strategy combining advanced monitoring tools, zero-trust architecture, and intelligent threat detection to address unauthorised activity in real-time. These measures, combined with the following tools and protocols, can effectively prevent data exfiltration from infiltrating an organisation’s network:</p> <ul> <li><strong>Monitor user activity</strong>: Implement UEBA to establish baseline behaviours and automatically detect anomalies. Administrators should track who accesses what files, when, and how often, using AI-powered analytics to identify potential insider threats and compromised accounts.</li> <li><strong>Deploy adaptive authentication</strong>: Implement risk-based authentication that adapts security requirements based on user behaviour, location, device health, and other contextual factors. This includes biometric verification and hardware security keys for high-risk actions.</li> <li><strong>Implement modern identity management</strong>: Utilise password-less authentication methods where possible and enforce strong password policies when necessary. Implement <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="0fa196df-1bc1-49dd-84fe-e3784d43e655" href="/uk/threat-reference/single-sign-on-sso" title="Single Sign-On (SSO)">Single Sign-On (SSO)</a> solutions integrated with identity governance frameworks.</li> <li><strong>Maintain robust patch management</strong>: Deploy automated <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="f7d3ef6a-7c69-45a6-bd6b-4659dabcfb1b" href="/uk/threat-reference/patch-management" title="Patch Management">patch management</a> systems prioritising critical security updates based on risk assessment. Implement vulnerability scanning and automated remediation workflows.</li> <li><strong>Use advanced DLP solutions</strong>: Deploy next-generation DLP solutions with machine learning capabilities that can understand context and content. These tools should integrate with cloud services and provide real-time policy enforcement across all data channels.</li> <li><strong>Implement end-to-end encryption and data classification</strong>: Apply intelligent data classification to automatically identify and protect sensitive information. Utilise homomorphic <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="60295b13-2f96-455d-ac54-ea0c31fea211" href="/uk/threat-reference/encryption" title="Encryption">encryption</a> for sensitive data processing and quantum-resistant encryption methods for data at rest.</li> <li><strong>Balance security with productivity</strong>: Implement security measures that are contextually aware and risk-appropriate. Use progressive security controls that adjust based on risk levels while maintaining workflow efficiency.</li> <li><strong>Deploy zero trust architecture</strong>: Implement a “never trust, always verify” approach with micro-segmentation and continuous validation of every access request.</li> <li><strong>Enable cloud access security broker (CASB)</strong>: Deploy <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="d01f5454-eb6a-4dbc-b8f3-238b31e6d88f" href="/uk/products/cloud-security/cloud-app-security-broker" title="Cloud App Security Broker">CASB solutions</a> to maintain visibility and control over cloud services while preventing unauthorised data movement.</li> <li><strong>Implement network detection and response (NDR)</strong>: Use NDR solutions to monitor network traffic patterns and detect potential exfiltration attempts in real-time.</li> </ul> <p>Organisations should regularly assess and update these prevention measures as threat landscapes evolve. Success in preventing data exfiltration requires a holistic approach that combines technological solutions with strong security policies and ongoing employee education.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__sm"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-7"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">How Proofpoint Can Help</h3> <div class="block-text-cols__body"> <p>Proofpoint offers a comprehensive, people-centric approach to preventing data exfiltration through our integrated <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="2fe775d9-f38e-42df-bb63-7c231e61425b" href="/uk/products/data-loss-prevention" title="Stop Data Loss"><strong>Enterprise DLP</strong></a> and <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="770593a0-07e8-4eb1-ba94-b6c5363b3b31" href="/uk/products/insider-threat-management" title="Contain Insider Threats"><strong>Insider Threat Management solutions</strong></a>. Our unified platform provides unprecedented visibility and control across email, cloud, and endpoints.</p> <p>Our Enterprise DLP solution delivers intelligent detection and response capabilities by combining content analysis with behavioural telemetry. This approach not only identifies sensitive data but also provides crucial context about how users interact with that information. The platform’s cloud-native architecture ensures quick deployment and seamless scaling to protect organisations of any size.</p> <p>For enhanced protection, Proofpoint’s Insider Threat Management solution provides deep visibility into user behaviour and data interactions. The platform can identify risky activities from careless, compromised, or malicious users through advanced behavioural analytics and AI-powered detection. With features like detailed activity timelines and automated alert systems, security teams can rapidly investigate and respond to potential insider threats.</p> <p>The combination of these solutions creates a robust security framework that:</p> <ul> <li>Detects and prevents data loss across all channels</li> <li>Provides contextual insights into user behaviour and intent</li> <li>Streamlines incident investigation and response</li> <li>Maintains user privacy while ensuring security</li> <li>Offers flexible deployment options with modern cloud architecture</li> </ul> <p>Organisations looking to strengthen their data protection strategy can experience these capabilities firsthand through Proofpoint’s demonstration environment. Our security experts can help assess your specific needs and demonstrate how our integrated approach can protect your sensitive data while maintaining operational efficiency.</p> <p>To learn more, <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="6bc75608-952f-4867-8cc7-9d004280fdee" href="/uk/contact" title="Contact Us"><strong>contact Proofpoint</strong></a>.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__sm"> </div> </div> </div> <div class="paragraph paragraph--type--resources paragraph--view-mode--full resources-block"> <div class="resources-block__wrapper"> <div class="resources-block__inner-wrapper"> <div class="resources-block__heading-wrapper"> <h3 class="resources-block__heading"> Related Resources </h3> </div> <div class="resources-block__resources"> <div lang="en" about="/us/resources/data-sheets/data-loss-prevention-dlp-small-and-medium-enterprises" class="node--type--resource-item node--view-mode--teaser-v3 resource-teaser-v3"> <a class="resource-teaser-v3__url" href="/us/resources/data-sheets/data-loss-prevention-dlp-small-and-medium-enterprises"> <div class="resource-teaser-v3__image" data-type="data-sheet"></div> <h3 class="resource-teaser-v3__type">Data Sheet</h3> <h4 class="resource-teaser-v3__title"> Data Loss Prevention (DLP) for Small and Medium Enterprises </h4> </a> </div> <div about="/uk/resources/threat-reports/cost-of-insider-threats" class="node--type--resource-item node--view-mode--teaser-v3 resource-teaser-v3"> <a class="resource-teaser-v3__url" href="/uk/resources/threat-reports/cost-of-insider-threats"> <div class="resource-teaser-v3__image" data-type="threat-report"></div> <h3 class="resource-teaser-v3__type">Threat Report</h3> <h4 class="resource-teaser-v3__title"> 2022 Cost of Insider Threats: Global Report </h4> </a> </div> <div about="/uk/resources/data-sheets/endpoint-data-loss-prevention" class="node--type--resource-item node--view-mode--teaser-v3 resource-teaser-v3"> <a class="resource-teaser-v3__url" href="/uk/resources/data-sheets/endpoint-data-loss-prevention"> <div class="resource-teaser-v3__image" data-type="data-sheet"></div> <h3 class="resource-teaser-v3__type">Data Sheet</h3> <h4 class="resource-teaser-v3__title"> Proofpoint Endpoint Data Loss Prevention </h4> </a> </div> <div about="/uk/blog/insider-threat-management/data-exfiltration-channels-used-attackers-and-how-defend-them" class="node--type--blog-post node--view-mode--teaser-v3 blog-teaser-v3 resource-teaser-v3 UNCONVERTED"> <a class="blog-teaser-v3__url" href="/uk/blog/insider-threat-management/data-exfiltration-channels-used-attackers-and-how-defend-them"> <div class="blog-teaser-v3__image"></div> <h3 class="blog-teaser-v3__type">Blog</h3> <h4 class="blog-teaser-v3__title"> <span>Data Exfiltration Channels Used by Attackers (and How to Defend Them)</span> </h4> </a> </div> </div> <div class="resources-block__link-wrapper"> <a class="resources-block__link" href="/uk/resources"> See more resources </a> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__xl"> </div> </div> </div> <div class="paragraph paragraph--type--cta-banner paragraph--view-mode--full cta-banner cta-banner--bg" data-background-image="/sites/default/files/styles/webp_conversion/public/cta-banner/cta-bkgd.jpg.webp?itok=lGrCI_5c"> <div class="cta-banner__wrapper"> <h2 class="cta-banner__heading"> Ready to Give Proofpoint a Try? </h2> <p class="cta-banner__body">Start with a free Proofpoint trial.</p> <div class="cta-banner__buttons"> <a href=/uk/free-trial-request class="global-elements__cta-button--white" target="" > <span>Get Protected</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> </div> </div> </div> <div class="paragraph paragraph--type--code-injection paragraph--view-mode--full"> <div class="code-injection__code"> <style type="text/css"> /***Table***/ .mobile-display { display: block; } .desktop-display { display: none; } .grid-container { display: unset; width: 100%; align-items: normal; !important; text-align: left; margin: 0 auto; } .grid-item { display: grid; color: #000; background-color: #FFF; font-size: 16px !important; align-items: center !important; padding: .5em !important; margin: .125em; border: 2px solid #F2F2F2; border-radius: 5px; line-height: normal; } .grid-item p { font-size: 16px !important; margin: unset !important; padding: unset !important; } .hdr { font-size: 16px !important; background-color: #000; color: #FFF; padding: .625em !important; text-align: center !important; } @media screen and (min-width: 481px) { .grid-container { display: grid; grid-template-columns: 1fr 2fr 2fr 2fr; } .mobile-display { display: none; } .desktop-display { display: block; max-width: 900px; } } .center { text-align: center; } </style> </div> </div> </div> <div class="glossary__content-pager"> <div class="content-pager"> <div class="content-pager__items-wrapper"> <div class="content-pager__items"> <div class="content-pager__item content-pager__item--prev"> <a href="/uk/threat-reference/data-classification" hreflang="en-gb">Previous Glossary</a> </div> <div class="content-pager__item content-pager__item--next"> <a href="/uk/threat-reference/data-labeling" hreflang="en-gb">Next Glossary</a> </div> </div> </div> </div> </div> </article> </div> </div> </div> </section> </main> </div> <div class="footer-v3" data-animate="true"> <div class="footer-v3__inner"> <nav class="footer-v3__nav"> <div class="footer-v3__nav-wrapper"> <div class="footer-v3__nav-heading">Products</div> <ul class="footer-v3__nav-collapsible"> <li><a href="/uk/products/email-security-and-protection/email-protection">Email Protection</a></li> <li><a href="/uk/products/advanced-threat-protection">Advanced Threat Protection</a></li> <li><a href="/uk/products/archiving-and-compliance">Archive &amp; Compliance</a></li> <li><a href="/uk/products/information-protection">Information Protection</a></li> </ul> </div> <div class="footer-v3__nav-wrapper"> <div class="footer-v3__nav-heading">Get Support</div> <ul class="footer-v3__nav-collapsible"> <li><a href="https://proofpoint.my.site.com/community/s/" target="_blank">Support Login</a></li> <li><a href="/uk/support-services">Support Services</a></li> <li><a href="https://ipcheck.proofpoint.com" target="_blank">IP Address Blocked?</a></li> </ul> </div> <div class="footer-v3__nav-wrapper"> <div class="footer-v3__nav-heading">Connect with Us</div> <ul class="footer-v3__nav-collapsible"> <li><a href="tel:+44 (0)118 402 5900" class="icon-phone-ppoint">+44 (0)118 402 5900</a></li> <li><a href="/uk/contact">Contact Us</a></li> <li><a href="/uk/contact">Office Locations</a></li> <li><a href="/uk/free-demo-request">Request a Demo</a></li> </ul> </div> <div class="footer-v3__nav-wrapper"> <div class="footer-v3__nav-heading">More</div> <ul class="footer-v3__nav-collapsible"> <li><a href="/uk/company/about">Overview</a></li> <li><a href="/uk/company/careers">Careers</a></li> <li><a href="/uk/events">Events</a></li> <li><a href="/uk/leadership-team">Leadership Team</a></li> <li><a href="/uk/news">News Center</a></li> <li><a href="/uk/technology-platform">Nexus Platform</a></li> <li><a href="/uk/legal/trust">Privacy and Trust</a></li> </ul> </div> </nav> <div class="footer-v3__bottom-wrap"> <section class="footer-v3__bottom"> <div class="footer-v3__logo"> <a href="/uk" class="footer-v3__logo-link"> <div class="footer-v3__logo-image"></div> </a> <div class="footer-v3__bottom-copyright-info">&copy; 2024. All rights reserved. </div> </div> <div class="footer-v3__bottom-copyright"> <a class="footer-v3__bottom-copyright-info" href="/uk/legal/license">Terms and conditions</a> <a class="footer-v3__bottom-copyright-info" href="/uk/legal/privacy-policy">Privacy Policy</a> <a class="footer-v3__bottom-copyright-info" href="/uk/sitemap">Sitemap</a> </div> <ul class="footer-v3__bottom-social-menu"> <li> <a href="http://www.facebook.com/proofpoint" class="icon-facebook" target="_blank"></a> </li> <li> <a href="http://www.twitter.com/proofpoint" class="icon-twitter" target="_blank"></a> </li> <li> <a href="https://www.linkedin.com/company/proofpoint" class="icon-linkedin" target="_blank"></a> </li> <li> <a href="https://www.youtube.com/channel/UCIvtJgsrUzFo90NKeiVozhQ" class="icon-youtube-play" target="_blank"></a> </li> <li> <a href="https://www.instagram.com/proofpoint" class="icon-instagram" target="_blank"></a> </li> </ul> </section> </div> </div> </div> </div> <script type="text/javascript">document.write(unescape("%3Cscript src='//munchkin.marketo.net/munchkin.js' type='text/javascript'%3E%3C/script%3E")); </script> <script>Munchkin.init('309-RHV-619');</script><div class="element-invisible" style="clear:both;"><!-- Google Code for Remarketing Tag --> <!-------------------------------------------------- Remarketing tags may not be associated with personally identifiable information or placed on pages related to sensitive categories. See more information and instructions on how to setup the tag on: http://google.com/ads/remarketingsetup ---------------------------------------------------> <script type="text/javascript"> /* <![CDATA[ */ var google_conversion_id = 950296937; var google_custom_params = window.google_tag_params; var google_remarketing_only = true; /* ]]> */ </script> <script type="text/javascript" src="//www.googleadservices.com/pagead/conversion.js"> </script> <noscript> <div style="display:inline;"> <img height="1" width="1" style="border-style:none;" alt="" src="//googleads.g.doubleclick.net/pagead/viewthroughconversion/950296937/?value=0&amp;guid=ON&amp;script=0"/> </div> </noscript></div> </div> <div id="flyout-container"></div> <script type="application/json" data-drupal-selector="drupal-settings-json">{"path":{"baseUrl":"\/","pathPrefix":"uk\/","currentPath":"node\/107171","currentPathIsAdmin":false,"isFront":false,"currentLanguage":"en-gb"},"pluralDelimiter":"\u0003","suppressDeprecationErrors":true,"ajaxPageState":{"libraries":"eJxtkFFuAyEMRC8Ugqr-9DaRYR0WxWsj20TN7UuiKMtK_fQb4xmmgUJRaKvFRXsDOrcPOXduPVG1FZfTwF4zYUwkZZoUYcnat2Q7zMKO7KFBQZ2x4jQ5hATM88ZVxFHD_XtCihhcK9A4x0i7UkjSoEi4DTM7CGagj8CyTIZFpBCGqxyW15F_WDLcj6xymYHKO-wh3AZ6Q5dxU7edKpp0zRiq4z_Ywqgw33bBGuQpp-OvhyzUNx4526V-_XAk4NJHnWFBx-yiT-VtH7fOeb1VfjJD0LzG7pVer30d9USHxJDS61MfJkIJ9GQPGzljAsM_tO7Knw","theme":"particle","theme_token":null},"ajaxTrustedUrl":[],"vwo":{"id":767242,"timeout_library":2500,"timeout_setting":2000,"usejquery":"false","testnull":null},"pp_i18n":{"language":"uk"},"instantsearch":{"indexName":"content","path":"uk\/search"},"user":{"uid":0,"permissionsHash":"26dd96d39e445e838e5f0382a0a4240ea0629de7ad59c3778594246405e2ccf5"}}</script> <script src="/sites/default/files/js/js_Wz4jmupPiuKuBfKm9p4blCCa_l2pzAE8RSkfNYk_43U.js?scope=footer&amp;delta=0&amp;language=en-gb&amp;theme=particle&amp;include=eJxlkVtuAyEMRTcUiqr-dDeRYRwGxdjINlGz-5Iq0jDqJ4cr3Yd7v9bPb44EXAYUDBs6Zhe99H5toHd0iW1w3u-VX8wQNO9xeCV7vX3HhtFFKIFe7GmOLSYwvHRQr5kwZlFcpJAYUqpcDkURKYThJux20JuIo4bH1yIkMQN9Bpbt5MCO7KHPBnrgHWE7-SSdJOto6c8GikLfLW46OtDHQT4G95Go2o7b4uIQEjCvFjNQAgpIs9opvHXIS0JFk6EZLSSSfF8ikZT_slDnjAd2_PGQhUbjdR9FDK51-ndgpOPnfbg5qLZ1DpV3gdOor5kmYnj8AgYByp8"></script> <script src="https://geoip-js.com/js/apis/geoip2/v2.1/geoip2.js"></script> <script src="/sites/default/files/js/js_DA7GHFg6Iz1O22c58zPl-nNTEwx5y7RuyKjesK1mXJI.js?scope=footer&amp;delta=2&amp;language=en-gb&amp;theme=particle&amp;include=eJxlkVtuAyEMRTcUiqr-dDeRYRwGxdjINlGz-5Iq0jDqJ4cr3Yd7v9bPb44EXAYUDBs6Zhe99H5toHd0iW1w3u-VX8wQNO9xeCV7vX3HhtFFKIFe7GmOLSYwvHRQr5kwZlFcpJAYUqpcDkURKYThJux20JuIo4bH1yIkMQN9Bpbt5MCO7KHPBnrgHWE7-SSdJOto6c8GikLfLW46OtDHQT4G95Go2o7b4uIQEjCvFjNQAgpIs9opvHXIS0JFk6EZLSSSfF8ikZT_slDnjAd2_PGQhUbjdR9FDK51-ndgpOPnfbg5qLZ1DpV3gdOor5kmYnj8AgYByp8"></script> <script src="//munchkin.marketo.net/munchkin.js"></script> <script src="/sites/default/files/js/js_Q_hAq3KoriT4uxdUnA3XDouviRgbwswFyj5MCBnzVHU.js?scope=footer&amp;delta=4&amp;language=en-gb&amp;theme=particle&amp;include=eJxlkVtuAyEMRTcUiqr-dDeRYRwGxdjINlGz-5Iq0jDqJ4cr3Yd7v9bPb44EXAYUDBs6Zhe99H5toHd0iW1w3u-VX8wQNO9xeCV7vX3HhtFFKIFe7GmOLSYwvHRQr5kwZlFcpJAYUqpcDkURKYThJux20JuIo4bH1yIkMQN9Bpbt5MCO7KHPBnrgHWE7-SSdJOto6c8GikLfLW46OtDHQT4G95Go2o7b4uIQEjCvFjNQAgpIs9opvHXIS0JFk6EZLSSSfF8ikZT_slDnjAd2_PGQhUbjdR9FDK51-ndgpOPnfbg5qLZ1DpV3gdOor5kmYnj8AgYByp8"></script> <script src="/themes/custom/proofpoint/apps/drupal/../../dist/app-drupal/assets/js/app.js?q=3BUXyHG2-0E&amp;v=1"></script> <script src="/sites/default/files/js/js_2LYNA9Zu5KE51oXU7U2qX9zbS5cCqO7wzxelxAEWhjk.js?scope=footer&amp;delta=6&amp;language=en-gb&amp;theme=particle&amp;include=eJxlkVtuAyEMRTcUiqr-dDeRYRwGxdjINlGz-5Iq0jDqJ4cr3Yd7v9bPb44EXAYUDBs6Zhe99H5toHd0iW1w3u-VX8wQNO9xeCV7vX3HhtFFKIFe7GmOLSYwvHRQr5kwZlFcpJAYUqpcDkURKYThJux20JuIo4bH1yIkMQN9Bpbt5MCO7KHPBnrgHWE7-SSdJOto6c8GikLfLW46OtDHQT4G95Go2o7b4uIQEjCvFjNQAgpIs9opvHXIS0JFk6EZLSSSfF8ikZT_slDnjAd2_PGQhUbjdR9FDK51-ndgpOPnfbg5qLZ1DpV3gdOor5kmYnj8AgYByp8"></script> <script src="//app-abj.marketo.com/js/forms2/js/forms2.min.js"></script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10