Top 8 Data Loss Prevention (DLP)

Symantec Data Loss PreventionForcepoint Data Loss PreventionGitGuardian Internal MonitoringCoSoSys Endpoint ProtectorMcAfee Total Protection for Data Loss PreventionDigital GuardianMicrosoft Purview Data Loss PreventionCode42 Incydr
  1. leader badge
    Symantec is one of the top players in the DLP space. It's a mature and flexible solution that gives you the option of endpoint and server-based DLP. One of their server capabilities is called Discover. It scans unstructured data like files, documents, emails, etc.
  2. leader badge
    We appreciate the user-friendliness and ease of implementation of the Forcepoint Data Loss Prevention platform. The availability of the vendor support team is an added advantage.
  3. Buyer's Guide
    Data Loss Prevention (DLP)
    June 2023
    Find out what your peers are saying about Broadcom, Forcepoint, GitGuardian and others in Data Loss Prevention (DLP). Updated: June 2023.
    710,326 professionals have used our research since 2012.
  4. leader badge
    Presently, we find the pre-commit hooks more useful.It enables us to identify leaks that happened in the past and remediate current leaks as they happen in near real-time. When I say "near real-time," I mean within minutes. These are industry-leading remediation timelines for credential leaks. Previously, it might have taken companies years to get credentials detected or remediated. We can do it in minutes.
  5. I like the data protection feature. Our users were working on a client's CRM application with a lot of client-related EIA information. We did not want the users to be able to send any of this data outside. I also like its ability to protect against data leaks via emails and social media. I like that you can deploy it quickly, and it requires no training.
  6. I am impressed with the tool's firewalls and web protection. The most valuable feature of McAfee Total Protection for Data Loss Prevention is data loss prevention.
  7. There is a built-in endpoint detection response that helps save money. Some of the features that are highly appreciated are its robust data loss prevention capabilities, flexible deployment options, and the ability to monitor data transfer across multiple vectors.
  8. report
    Use our free recommendation engine to learn which Data Loss Prevention (DLP) solutions are best for your needs.
    710,326 professionals have used our research since 2012.
  9. The product is easy to configure.Because everything is on Microsoft and we use Azure, integration with the product is easier. That's the most important thing when you use many Microsoft products. It's easier to integrate everything in one place.
  10. Risk factors can be adjusted for all intricate details. There are a couple of things. One of them is that they have what they call Incydr. Their detection and response solution to the insider threat area is called Incydr. That gives visibility to the clients that have widely dispersed employee bases due to work from home, or that had a dispersed workforce predating any of the work from home requirements. Even though they might not be inside the organization physically, they're inside the organization. It allows us to get some visibility into what people are doing, what the context is, and how to control what might be the potential for intellectual property theft or file exposure.

Advice From The Community

Read answers to top Data Loss Prevention (DLP) questions. 710,326 professionals have gotten help from our community of experts.
Rony_Sklar - PeerSpot reviewer
Rony_Sklar
Community Manager at a tech services company with 51-200 employees

Hi professionals,

There seems to be some controversy around whether or not SSL Inspection should be used by businesses. 

What is your opinion - should they be used, and if so when? Conversely, what are the reasons for not using SSL inspection?

Bruce Bennett - PeerSpot reviewer
Bruce BennettI am a proponent of SSL inspection, as long as you have another function/service… more »
10 Answers
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)

Hi infosec pros,

How are these two terms different? What modern tools and techniques should you use to protect each data?

ChrisLowe - PeerSpot reviewer
ChrisLoweData protection at rest - data storage has encryption applied, at the OS… more »
6 Answers
BaijuShah - PeerSpot reviewer
BaijuShah
CEO at Ebiashara Africa Limited

Hello peers,

We would like to monitor users' machines. Which monitoring solution would you recommend for an enterprise and why? 

I appreciate the help.

reviewer1195575 - PeerSpot reviewer
reviewer1195575Well, I suppose it really depends on the reason you ask the question. Is it… more »
8 Answers
Steven Palange - PeerSpot reviewer
Steven Palange
Information Technology Infrastructure Specialist at TLIC
Hi peers,  I'm a consultant looking for a Mac-based endpoint antivirus that includes DLP.  Does anyone have any ideas (aside from https://www.endpointprotector.com/ that just raised their pricing by over 100%)?
Read More »
Andrei Bigdan - PeerSpot reviewer
Andrei BigdanAntivirus and DLP are separate products even for vendors that provide both. Of… more »
4 Answers
Karin Krings - PeerSpot reviewer
Karin Krings
User at University of Phoenix

Hi peers,

I'm looking for recommendations for software to detect insider threats. 

Where can I find a pros/cons template (customized to an organization) to source insider threat detection support?

Xavier Suriol - PeerSpot reviewer
Xavier SuriolI would suggest statistical methods (including machine learning): First, outlier… more »
5 Answers

Data Loss Prevention (DLP) Articles

Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Hi peers, This is our new bi-weekly Community Spotlight that includes recent contributions (questions, articles and discussions) by the PeerSpot community members.  Articles Check the top products and solutions below (selected based on peer reviews) or contribute your own article! ...
Read More »
Netanya Carmi - PeerSpot reviewer
Netanya Carmi
Content Manager at PeerSpot (formerly IT Central Station)
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features...
Read More »

Data Loss Prevention (DLP) Topics

Why is data loss prevention important?

Data breaches are more likely to happen than ever, with so many people working remotely from so many different devices. While large organizations have more data to steal from, smaller ones can be an easy target because their networks are often less secure. Most organizations deal with data loss incidents every single day.

In addition to protecting your data and ensuring compliance, data loss prevention (DLP) is important because a data leak can cost your company financial loss and loss of reputation. It can also disrupt your business continuity. For all these reasons, a DLP security strategy will yield a significant return on investment (ROI).

What is the difference between data loss prevention and data leakage prevention?

The terms “data leak” and “data loss” are often used interchangeably. However, while data loss prevention focuses on the prevention of data being lost or stolen by someone outside of the organization, data leakage includes the risk of data flowing between your organization’s critical systems, such as human resources or CRM. When data is leaked, it is not necessarily lost.

Other associated terms include information leak prevention (ILP), information leak detection and prevention (ILDP), information protection and control (IPC), content monitoring and filtering (CMF), and extrusion prevention system (EPS).

What are the 3 types of data loss prevention?

There are three types of data loss prevention (DLP):

  1. Network DLP tracks and monitors data in motion on the network. If a user attempts to transmit sensitive data while on the company’s network, the network’s DLP security would encrypt, block, quarantine, or audit the transmission. It can also notify administrators of the attempt to transmit the information.
    Network DLP solutions don’t help when it comes to laptops or other on-the-go devices that are not connected to the network.
  2. Endpoint DLP is installed on individual devices to monitor data in motion or at rest in these endpoints, regardless of how they are connected.
    Endpoint DLP requires more management and can be more challenging logistically because the security software must be installed on each individual device.
  3. Cloud DLP integrates with cloud tools and enforces DLP rules and policies on cloud accounts.
What are data loss prevention tools?

Data loss prevention (DLP) tools monitor, detect, and block the transmission of sensitive data while it is in use, in motion, and at rest, in order to ensure that your organization’s data is not misused, accessed by unauthorized users, or lost (inadvertently or maliciously). They do this by providing visibility into your company’s data landscape, its patterns of utilization, and correlations with other enterprise systems, instituting measures to ensure that your company has consistent access to all of its data and to ensure that data’s integrity.

Features of Data Loss Prevention Software

Features of data loss prevention software include:


1. Content Analysis: The solution should be able to analyze deep content and segregate into groups, which helps in applying the security measures necessary in order to protect the data. A powerful DLP solution should also be able to analyze encrypted files as well..

2. Data throughout its Lifecycle:

  • Data in motion through a network endpoint or other channel.
  • Data at rest (being stored but not being used or moved). The feature that handles data at rest is called “content discovery, which helps apply one single policy across all data.
  • Data in use in any open and running application.

    Most data loss prevention solutions also offer endpoint protection for data on disconnected or unmanaged devices.

3. Admin management: A central management server or a central administration interface allows security administrators to manage the entire solution. The interface should have a customizable dashboard.

The solution should also offer hierarchical management, directory integration, and an option for role-based administration. Features should be able to be managed by technical as well as non-technical staff.

4. Policy management: This feature will help you to create and enforce security policies so that you can modify the overall security of your data according to your company’s requirements. This must also be able to cater to both technical as well as non-technical staff. You should be able to choose what data to protect and the data’s sources and destinations; what actions should be taken if a policy is violated; which users the policy applies to, and which users or admins can view or make changes to the policy.

5. Real-time analytics should alert you about incidents so that you can take action immediately whenever required. They should also allow you to keep an eye on both the performance of the solution as well as the security of your data.

Benefits of Data Loss Prevention Software

The benefits of data loss prevention software include:

1. Knowing where your data is - DLP software can help find your data wherever it may be by monitoring the network, scanning known data repositories, and scanning employees’ devices. Using DLP software you can also prove where your data isn’t.

2. Understanding where your data goes - DLP software can help your organization keep track of its data in three ways:

  1. Monitoring the network
  2. Monitoring endpoints (such as employee hard drives)
  3. Monitoring storage (tracking all sensitive data that is moved to portable storage)

3. Knowing how your data is being used - Different DLP tools offer you different features in terms of monitoring your data. You might be able to track when users print or fax information or when they cut and paste data between applications. Some DLP tools integrate with file monitoring tools and can track when files are accessed. Then you can track which business units are using the data and where it is being communicated externally, etc. The more you know, the more you can adjust your business processes appropriately rather than just blocking access to data.

4. Proactively preventing unwanted activities - Most data leaks are accidental and come from employees not knowing better. When a DLP solution catches an issue, you can notify and educate your employees so they know what not to do next time. Hundreds of companies that use DLP solutions have reported a drop in unwanted activity after they notified employees of their mistakes. This means you’ll have fewer issues to deal with in the future.

Buyer's Guide
Data Loss Prevention (DLP)
June 2023
Find out what your peers are saying about Broadcom, Forcepoint, GitGuardian and others in Data Loss Prevention (DLP). Updated: June 2023.
710,326 professionals have used our research since 2012.