Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Best Data Loss Prevention Software

Data Loss Protection and Prevention software give enterprises visibility into and control over who accesses and shares their data. DLP solutions aid DLP strategies through pre-established policy controls and detection to track data movement and prevent any unauthorized transfer, sharing, or leaks. DLP software is used primarily to prevent internal data leaks, also known as the “insider threat.” As policy regulations become more developed and demanding, DLP solutions also help companies maintain privacy compliance. Data...

We've collected videos, features, and capabilities below. Take me there.

All Products

(1-25 of 139)

1
Druva Security Cloud

Workforce mobility and the rise of…

2
Keepit

The Keepit platform, from the company of the same name in Copenhagen, is a solution that protects cloud data, boasting simple deployment and restore options that enable users to recover historic data. The Keepit platform supports any Cloud Workload and offers full retention on the…

Try Keepit
3
DataMotion

DataMotion integrates modern secure information exchange into the systems users are in today. A variety of flexible APIs, a no-code web component, connectors, and pre-built solutions enable integration with existing workflows without having to replace systems or develop a new solution…

Explore recently added products

4
Microsoft Purview Data Loss Prevention

Microsoft Purview Data Loss Prevention is used to provide intelligent detection and control of sensitive information across Office 365, OneDrive, SharePoint, Microsoft Teams, and on the endpoint. It also helps prevent data loss through identifying and preventing risky or inappropriate…

5
Veeam Data Cloud for Microsoft 365

Veeam Data Cloud for Microsoft 365 is a BaaS (Backup as a Service) solution used to back up and restore Microsoft 365 data, including Microsoft Exchange, Microsoft SharePoint, Microsoft OneDrive for Business and Microsoft Teams data.

6
Kaspersky Endpoint Security Cloud

Kaspersky Endpoint Security Cloud provides a solution for organizations' IT security needs, blocking ransomware, file-less malware, zero-day attacks and other emerging threats. Kaspersky’s cloud-based approach helps users to work securely on any device, and collaborate safely online,…

7
Zscaler Internet Access

Zscaler Internet Access™ (ZIA) is a secure web gateway (SWG), delivering cloud native cyberthreat protection and zero trust access to the internet and SaaS apps.

8
Zscaler Data Protection

Zscaler Data Protection provides a comprehensive, cloud-delivered platform built to safeguard an organization's sensitive data. The unified platform first provides a complete understanding of where all sensitive data is located and its risky exposure. The platform's cloud-delivered…

9
Marshal
0 reviews

Marshal is a solution that enables companies to quickly scan their cloud services to uncover any exposed sensitive data that is possibly being shared. Once authorized, Marshal scans through a company’s Box, Dropbox, Go…

10
GitGuardian Public Monitoring

GitGuardian Public Monitoring allows real-time GitHub scanning and alerting to uncover sensitive company information hiding in online repositories. It monitors both organization repositories and developers' personal repositories. The solution gives visibility to developers and security teams on…

11
Teramind

Teramind helps organizations track user behaviors to detect insider threats and prevent data leaks. The software lets users monitor and record the activities of employees, remote users, external contractors both onsite and offsite in real-time.

Teramind’s monitoring features can track virtually all user behavior including apps, websites, emails, instant messages/chats, social media, document & file transfers, printers, networks and more. The software also guards against insider threats by letting administrators configure rules to notify, block, log-out, redirect or lock-out a user. The software provides rule-based risk analysis, remote desktop control, IT forensics, automated alerts and behavior shaping guidance features to prevent data breaches. Teramind also enables administrators to block access to social media websites, USB drives, unauthorized hardware and other potent…

12
Paubox Email Suite

Paubox, headquarted in San Francisco, offers their HIPAA compliant encrypted email service, the Paubox Email Suite, which features Encrypted Email, Inbound Security with ExecProtect, and Email DLP under one subscription.

13
AccessPatrol by CurrentWare

AccessPatrol by CurrentWare provides a solution for securing company endpoints against data breaches caused by illicit data transfers and rogue USB devices.

AccessPatrol can be used to block flash drives, cell phones, tablets, Bluetooth, and more. File operations alerts and permissions…

14
Lepide Data Security Platform

The Lepide Data Security Platform is a solution for organizations looking to protect their data, detect and react to threats, and meet compliance. Using Lepide DSP, organizations can determine where their most sensitive data is, who has access to it, and what users are doing with…

15
Rewind Backups

Rewind from Third Blink Software in Ontario (dba Rewind) is a service that protects the data that is driving your ecommerce and small to midsize businesses, focusing on backing up data that lives in the cloud – specifically in apps like Shopify, BigCommerce, and QuickBooks Online.…

16
Strac
0 reviews

Strac.io provides businesses with a platform for securing sensitive d…

17
SearchInform Risk Monitor

SearchInform Risk Monitor is an internal threat mitigation and insider risk protection solution, that controls the maximum quantity of information channels as well as featuring built-in analytical tools. The system conducts a re…

18
Forcepoint Data Loss Prevention

Forcepoint DLP promises to address human-centric risk by providing visib…

21
Altitude Networks

Altitude Networks is an enterprise cloud security and data loss protection company headquartered in San Francisco, offering their eponymous platform to protect a company’s cloud data against unauthorized access, accidental or malicious sharing, and theft. With their DLP application,…

25
Symantec Data Loss Prevention

Symantec Data Loss Prevention (DLP) is a data loss protection option.

Videos for Data Loss Prevention Software

Data Loss Prevention Explained
04:59
A DLP can be the difference between a data breach and business as usual. In this video, you’ll learn about data loss prevention technologies and how DLP could have prevented significant real-world data exfiltrations.

Learn More About Data Loss Prevention Software

What is Data Loss Prevention?

Data Loss Protection and Prevention software give enterprises visibility into and control over who accesses and shares their data. DLP solutions aid DLP strategies through pre-established policy controls and detection to track data movement and prevent any unauthorized transfer, sharing, or leaks.

DLP software is used primarily to prevent internal data leaks, also known as the “insider threat.” As policy regulations become more developed and demanding, DLP solutions also help companies maintain privacy compliance. Data loss prevention tools have also expanded from focusing on networks to preventing data loss in cloud-first environments.

Some DLP capabilities are more aggressive than others. For instance, many DLP solutions will automatically encrypt company data, preventing any data leaks from being harmful, and will alert administrators when there is a suspected or proven breach. Other approaches are more intrusive to end-users, such as Zero Trust policies that prevent them from sending data to any non-trusted users in the first place. Many DLP solutions offer both passive and interventionist capabilities that companies can tailor to their needs.

There is an overlap between data loss prevention and backup & disaster recovery tools. Often, the level of control DLP software has over data transfer necessitates a preexisting backup of company data. This backup, usually via a virtual machine, reduces any reliance on endpoints to host sensitive data.

Data Loss Prevention Software Features & Capabilities


Data loss prevention software can differ in the specific feature sets and core capabilities, depending on the scope of the software. Some common DLP capabilities include:
  • Fingerprinting of document files and document file sources (watermarks, etc.)

  • Pattern matching capabilities allowing data to be easily and correctly identified even when encrypted.

  • Monitoring of Internet, e-mail, and instant messaging protocols

  • Archiving capabilities

  • Multiple inspection modes, both proxy, and flow-based

  • Remote device tracing and wiping if lost

  • User and network behavior analysis

Some data loss prevention solutions focus on specific at-risk environments. The most commonly specialized software areas are:

  • Email services

  • Cloud applications

  • Servers

Beyond standard protections (e.g. firewalls), advanced security may include machine learning or activity-based verification, user activity monitoring, and other methods of detecting and preventing malicious or accidental transmission of secure data.

Data Loss Prevention Solution Comparison

When comparing various DLP solutions, consider these factors:


  • Predefined policy vs. customized policy development: Data loss prevention software will vary in both the predefined policy library available out-of-the-box and the customizability of DLP policies to fit unique business needs. Compare the extensiveness of policy libraries each DLP product offers, as well as other users’ experiences applying the policies to similar business cases.

  • Integrations: DLP solutions, particularly traditional DLP, will need to be able to integrate with the company’s existing network stack and applications. Pay particular attention to how well a DLP software can integrate with the business’s database, email service, and web proxy. As cloud-first environments become the norm, also consider how well each product can provide DLP on an endpoint-by-endpoint basis.

  • Compliance focus vs. sensitive data protection: Data loss prevention vendors will vary in their focus on supporting privacy compliance and extra robust or intrusive data loss mechanisms. The compliance-focused vendors will offer better reporting and auditing support, while data protection-focused software will provide stronger capabilities for inhibiting any unauthorized sensitive data transfers.

Pricing Information

Data loss prevention software is often provided as either on-premise or cloud deployments. Cloud software ranges in price from about $5 per seat to $50 per seat or more, depending on the number of users and the contract term. Enterprise deployments usually start at about 5,000 seats.

Related Categories

Frequently Asked Questions

Who uses data loss prevention?

Any business that stores or uses sensitive information and/or has to comply with privacy regulations can benefit from DLP software. Many solutions have focused on serving enterprises’ needs.

What’s the difference between data loss prevention and data backup?

Data loss prevention is a security function that prevents sensitive data leaks. In contrast, data backup prevents valuable data from being erased, deleted, or lost in hardware crashes.

How does data loss prevention work?

Data loss prevention can work by encrypting company data, establishing policies that automatically prevent data from being sent to various external or untrusted users, and notifying administrators when there is a suspected or definite breach.

Are there open-source data loss prevention solutions?

There are a range of free, open-source DLP solutions. However, they often lack the robustness of paid products, as well as the continued support and updates over time.

How much does data loss prevention software cost?

Software pricing can vary significantly depending on whether the product is on-premise or cloud-based. Cloud-based DLP software pricing can range from $5/seat/month to $50+/seat/month, usually with a minimum number of seats required.