While Data Leak Prevention attempts to provide an overlay of classification, network monitoring, and end point management (for USB devices), there is another approach that uses advanced agents on the desktop that continuously check for abnormalbehavior that is indicative of root kits and custom Trojans.