While Data Leak Prevention attempts to provide an overlay of classification, network monitoring, and end point management (for USB devices), there is another approach that uses advanced agents on the desktop that continuously check for abnormal behavior that is indicative of root kits and custom Trojans.
FORBES: Bottom Line: Assume That You've Been Hacked