In the example of FIG. 2, modules 102 are located server-side on server 206. Nevertheless, in other embodiments, some or all of the modules may be located in computing device 202 or another device, such as a proxy device. Accordingly, some or all of the modules may be located within computing device 202 and/or server 206 according to any permutation.
FIG. 3 is a flow diagram of an exemplary computer-implemented method 300 for data loss prevention of unidentifiable and unsupported object types. The steps shown in FIG. 3 may be performed by any suitable computer-executable code and/or computing system. In some embodiments, the steps shown in FIG. 3 may be performed by one or more of the components of system 100 in FIG. 1, system 200 in FIG. 2, computing system 610 in FIG. 6, and/or portions of exemplary network architecture 700 in FIG. 7.