Compare and Evaluate

Data Loss Prevention

Data Loss Prevention (DLP) are services and measures taken to ensure sensitive/critical information does not leave an organization, electronically. In addition to perimeter security, security on endpoints (laptops, PCs) are also locked.

Data Quadrant report cover

The Data Quadrant is a thorough evaluation and ranking of all software in an individual category to compare platforms across multiple dimensions.

These include:

  • User Satisfaction Rankings
  • Business Value Scores
  • Vendor Capability Comparisons
  • Product Feature Evaluations
Emotional Footprint report cover

The Emotional Footprint is a powerful indicator of overall user sentiment toward the relationship with the vendor, capturing data across five dimensions.

These include:

  • Strategy and Innovation
  • Service Experience
  • Conflict Resolution
  • Product Impact
  • Negotiation and Contract

Still need assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Powered by Info-Tech Research Group
Powered by Info-Tech Research Group

Latest Research

5
Aug

Author: Isaac Kinsella (Info-Tech) &
Jimmy Tom (Info-Tech)

Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.

Latest Research

5
Aug

Author: Cassandra Cooper (Info-Tech)

Microsoft recently previewed the specific features to tackle data security and risk management for end users with Microsoft Endpoint Data Loss Prevention (DLP) and Double Key Encryption. The reason for the launch? The increasing shift towards a remote work environment and a need to mitigate the accompanying risks.

Latest Research

5
Aug

Author: Scott Bickley (Info-Tech)

IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.

Data Loss Prevention Products

Filter by:

Data QuadrantReport

A thorough evaluation and ranking of all software to compare software across every dimension.

Data Quadrant Report report

Emotional FootprintReport

A detailed and unique report that captures a powerful indicator of overall user feeling toward the vendor and product.

Emotional Footprint Report report

McAfee

McAfee DLP

McAfee Total Protection for Data Loss Prevention (DLP) safeguards intellectual property and ensures compliance by protecting sensitive data wherever it lives—on premises, in the cloud, or at the endpoints. McAfee Total Protection for DLP is delivered through physical or virtual low-maintenance appliances and the McAfee ePolicy Orchestrator platform for streamlined deployment, management, updates, and reports.

8.9

Composite Score

9.1

CX Score

+96

Emotional Footprint

93%

Likeliness to Recommend

11

Reviews

IBM

IBM DLP

IBM Data Security Services – enterprise data loss prevention solution, leveraging Symantec’s data loss prevention technology, is designed to help your company better identify sensitive data, monitor and control its usage and protect your assets without impeding business productivity and expansion.

8.2

Composite Score

8.5

CX Score

+87

Emotional Footprint

80%

Likeliness to Recommend

18

Reviews

Cisco Systems

Cisco DLP

The Cisco Data Loss Prevention solution delivers high-performance, comprehensive data loss prevention - helping organizations of all sizes prevent leaks, enforce compliance, and protect their brand and reputation

8.0

Composite Score

8.1

CX Score

+79

Emotional Footprint

84%

Likeliness to Recommend

21

Reviews

Microsoft

Microsoft BitLocker

Windows BitLocker Drive Encryption is a new security feature that provides better data protection for your computer, by encrypting all data stored on the Windows operating system volume. (In this version of Windows, a volume consists of one or more partitions on one or more hard disks. BitLocker works with simple volumes, where one volume is one partition.

8.0

Composite Score

8.5

CX Score

+84

Emotional Footprint

82%

Likeliness to Recommend

57

Reviews

Trend Micro

Trend Micro DLP

Trend Micro™ Integrated DLP minimizes the complexity and cost of data security by integrating DLP functionality directly into your existing Trend Micro solutions and management consoles.

7.8

Composite Score

8.0

CX Score

+78

Emotional Footprint

77%

Likeliness to Recommend

13

Reviews

ForcePoint (Websense)

Forcepoint Data Security Suite

Websense® Data Security Suite contains three modules — Data Security Gateway, Data Discover, and Data Endpoint — that can help manage the risk of losing your data to malicious users or accidental misuse. Each module can be licensed separately if you plan to start with one capability and later expand to others.

7.5

Composite Score

7.8

CX Score

+81

Emotional Footprint

71%

Likeliness to Recommend

16

Reviews

Symantec

Symantec DLP

Symantec extends data loss prevention to the cloud and across all of your high-risk data loss channels, so you can discover, monitor, and protect your information more completely and effectively.

7.4

Composite Score

7.4

CX Score

+66

Emotional Footprint

78%

Likeliness to Recommend

29

Reviews

Sophos

Sophos Enduser Protection Bundles

When you select a Sophos Enduser Protection bundle, you get more than just a great value. You get a set of products designed and supported by a single company focused on delivering security made simple. To us, that means the products are easy to use and that they complement each other, working even better together than they do on their own. For you, it means less work for better protection, with expert support just a phone call or email away.

7.1

Composite Score

7.8

CX Score

+81

Emotional Footprint

67%

Likeliness to Recommend

10

Reviews

Check Point Software Technologies

Check Point DLP

Check Point Data Loss Prevention (DLP) Software Blade combines technology and processes to revolutionize DLP, helping businesses to pre-emptively protect sensitive information from unintentional loss, educating users on proper data handling policies and empowering them to remediate incidents in real-time.

6.9

Composite Score

7.6

CX Score

+77

Emotional Footprint

54%

Likeliness to Recommend

18

Reviews

Trustwave Holdings, Inc.

Trustwave DLP

Trustwave Data Loss Prevention helps enterprises discover, monitor and secure data at rest, in motion, and in use to prevent exfiltration and ensure regulatory compliance.

8.3

Composite Score

8.6

CX Score

+88

Emotional Footprint

86%

Likeliness to Recommend

7

Reviews

Proofpoint

Proofpoint Enterprise Privacy

Industry-Leading Data Loss Prevention and Encryption to control information that leaves your organization in your emails, social media and web file sharing—and protect it from exposure at all times

7.9

Composite Score

8.1

CX Score

+85

Emotional Footprint

79%

Likeliness to Recommend

6

Reviews

Broadcom Inc.

CA Data Loss Prevention

Whether it’s on-premises, mobile or the cloud, CA Technologies' data protection solutions can meet your data security and regulatory requirements while enabling business to continue. It will allow your business to discover, classify and control of sensitive information across all phases of the data lifecycle: whether data is in-use, in-motion, at-rest or at-access.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Clearswift

Clearswift Adaptive Data Loss Prevention

Clearswift’s DLP technology automatically applies the optimal security treatment based on the data’s content, context and required regulation policy. It helps protect and secure critical information as it is shared via email, the internet or cloud.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Code Green Networks

Code Green Networks TrueDLP

Code Green Networks TrueDLP is a complete Data Loss Prevention (DLP) solution that allows companies to effectively discover, monitor, control, and secure sensitive data, whether on the network, in use on desktops or laptops, at rest on end-user devices and network servers, or stored in the cloud.

--

Composite Score

--

CX Score

+100

Emotional Footprint

67%

Likeliness to Recommend

1

Reviews

Fidelis Cybersecurity

Fidelis Network

Data Loss Prevention (DLP) is crucial to ensure that data is not lost, misused or accessed by unapproved individuals. It is largely driven by regulatory compliance as enterprises today must be able to demonstrate adequate care has been taken to avert the loss and theft of confidential and sensitive information on their networks.

--

Composite Score

10.0

CX Score

+100

Emotional Footprint

100%

Likeliness to Recommend

1

Reviews

Dell EMC

EMC RSA Data Loss Prevention

RSA Data Loss Prevention (DLP): Discover and monitor the location and flow of sensitive data such as customer credit card data, employee PII, or corporate intellectual property. Educate end users and enforce controls to prevent loss of sensitive data through email, web, PCs, smartphones, and more.

--

Composite Score

7.9

CX Score

+83

Emotional Footprint

93%

Likeliness to Recommend

3

Reviews

Digital Guardian

Digital Guardian DLP

Breaches are inevitable, losing data is not. Digital Guardian for Data Loss Prevention (DLP) gives you everything you need – the deepest visibility, the fine-grained control and the industry’s broadest data loss protection coverage – to stop sensitive data from getting out of your organization.

--

Composite Score

8.6

CX Score

+96

Emotional Footprint

89%

Likeliness to Recommend

1

Reviews

InfoWatch

InfoWatch DLP

InfoWatch software solutions are designed to control the handling of corporate data and protect it from being leaked or inappropriately shared, and to minimize the risks associated with the transmission of information.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

DeviceLock

DeviceLock DLP

DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can’t be moved to or from company laptops or desktop PCs via devices like phones, digital cameras, USB sticks, CD/DVD-R, tablets, printers or MP3 players. In addition, policies can be set and enforced for copy operations via the Windows Clipboard, as well as screenshot operations on the endpoint computer.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Wave systems Corp.

Wave Data Protection Suite

The Wave Data Protection Suite goes wherever your devices go, on or off your network, online or offline. Which means it protects your data from the full range of modern risks: device theft, missent emails, flash drives, portable hot spots, hardware keyloggers. All the stuff your nightmares are made of. And it’s managed with a single console

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Blue Coat

Blue Coat DLP

Safeguard your sensitive company data. Blue Coat Data Loss Prevention (DLP) enables you to detect and block potential data leaks quickly and accurately, all while achieving industry and regulatory compliance. With Blue Coat DLP, you can leverage powerful discovery capabilities to prevent sensitive, unsecured data from traveling across the network and winding up in the wrong hands.

--

Composite Score

--

CX Score

+100

Emotional Footprint

22%

Likeliness to Recommend

1

Reviews

Imperva

Imperva DLP

SecureSphere data protection solutions address all aspects of database security and compliance with database auditing and real-time protection that will not impact performance or availability. SecureSphere scales to support the largest database and Big Data installations. By automating security and compliance, it is not surprising that thousands of organizations choose Imperva SecureSphere for data to safeguard their most valuable assets.

--

Composite Score

8.8

CX Score

+100

Emotional Footprint

89%

Likeliness to Recommend

1

Reviews

Virtru

Virtru DLP

Virtru DLP is the easiest, most convenient way to prevent sensitive information from leaking outside of your organization unencrypted. Whether you need to comply with regulations or protect financial, legal, or HR information, Virtru DLP makes it easy.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Open Text Corporation

OpenText DLP

Secure mail data loss prevention helps ensure critical business information is protected based on your organization's security needs.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Hewlett-Packard Enterprise

HP Atalla

HP Atalla Information Protection and Control (IPC) Suite solves the complex challenge of providing data classification and data security by providing organizations the means to bring protection to the data itself. HP Atalla IPC applies protection at a point where information is created, and makes that protection persistent, so it follows the information wherever it goes. This secures sensitive data no matter where it actually resides.

--

Composite Score

8.7

CX Score

+98

Emotional Footprint

78%

Likeliness to Recommend

2

Reviews

Load More

All Research

Latest Research

5
Aug

Author: Isaac Kinsella (Info-Tech) &
Jimmy Tom (Info-Tech)

Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.

Latest Research

5
Aug

Author: Cassandra Cooper (Info-Tech)

Microsoft recently previewed the specific features to tackle data security and risk management for end users with Microsoft Endpoint Data Loss Prevention (DLP) and Double Key Encryption. The reason for the launch? The increasing shift towards a remote work environment and a need to mitigate the accompanying risks.

Latest Research

5
Aug

Author: Scott Bickley (Info-Tech)

IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.

Latest Research

23
Jul

Author: Isaac Kinsella (Info-Tech)

RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.

Latest Research

21
Jul

Author: Cassandra Cooper (Info-Tech)

To bolster and broaden its data privacy capabilities for end users, cyber and data protection vendor Acronis has acquired DLP player DeviceLock. The acquisition aligns with the increasingly prevalent role that data privacy plays in cybersecurity.

Latest Research

20
Jul

Author: Isaac Kinsella (Info-Tech)

Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.

Latest Research

15
Jul

Author: Isaac Kinsella (Info-Tech)

On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their vulnerability management programs to industry averages Kenna Security has compiled over the years.

Latest Research

10
Jul

Author: Isaac Kinsella (Info-Tech)

COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.

Latest Research

10
Jul

Author: Logan Rohde (Info-Tech)

GTB Technologies, a smaller vendor known for dedicating itself solely to DLP solutions, has introduced a new multi-tenancy feature for its SDK that aims to improve quality and efficiency for DLP-integrated application development.

Latest Research

12
Jun

Author: Logan Rohde (Info-Tech)

Among the full set of features available in Zecurion’s new DLP product is the ability to perform user behavior analytics to help spot data loss events before they occur.

Latest Research

12
Jun

Author: Logan Rohde (Info-Tech)

Zecurion has one of the most robust DLP products on the market and this fact was recently recognized by SC Magazine, who placed the product in its “pick-of-the-litter" category for DLP.

Latest Research

27
May

Author: Isaac Kinsella (Info-Tech)

Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.

Latest Research

11
May

Author: Isaac Kinsella (Info-Tech)

We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.

Latest Research

30
Apr

Author: Isaac Kinsella (Info-Tech)

Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company simply stated, “It’s out of scope.” – meaning it had no intention to rectify or address the issue.

Latest Research

30
Apr

Author: Isaac Kinsella (Info-Tech)

The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for cyberattackers is created.

Latest Research

23
Apr

Author: Isaac Kinsella (Info-Tech)

Qualys VMDR has hit the live market. Originally unveiled in February 2020 at Qualys Security Conference, VMDR is now publicly available as of April 16, 2020. Partnering with both large and small MSSPs, VMDR is designed to be scalable to any business enterprise and to automate the entire management cycle on all endpoints.

Latest Research

31
Mar

Author: Shastri Sooknanan (Info-Tech)

GTB Technologies has been recognized as “Best Data Loss Prevention Solutions Provider for 2020.” With organizations addressing digital transformation and a growing remote workforce, the risk of data breaches is increased from both insider and outsider perspectives.

Latest Research

17
Mar

Author: Isaac Kinsella (Info-Tech)

Microsoft’s end-of-life support for Windows 7 has run into its first set of issues with its extended security updates (ESUs). Administrators who paid for the ESU found out their downloads are not applying.

Latest Research

17
Mar

Author: Isaac Kinsella (Info-Tech)

Qualys’ newest product, VMDR (Vulnerability Management, Detection, and Response), will be available in March and will provide an all-in-one cloud-based solution for vulnerability management. VMDR will automate the entire management cycle on all endpoints.

Latest Research

16
Mar

Author: Isaac Kinsella (Info-Tech)

Microsoft has added its Windows 10 Tamper Protection controls to the public version of Microsoft Defender. Previously available only to enterprise users, Tamper Protection is intended to better detect threats that make it past other defences and to provide remediation suggestions.

Latest Research

11
Mar

Author: Isaac Kinsella (Info-Tech)

Qualys Research Labs, a vulnerability management provider, discovered a vulnerability in the OpenSMTPD Mail server used in conjunction with the OpenBSD operating system. This flaw allows for an attacker to execute arbitrary code with command privileges.

Latest Research

3
Mar

Author: Isaac Kinsella (Info-Tech)

A leaked UN report showed that servers were compromised during a cyberattack that exploited an older version of Microsoft SharePoint. This breach is a case study in the importance of both patch management and transparency.

Latest Research

24
Feb

Author: Isaac Kinsella (Info-Tech)

Reported by Microsoft on January 17, the company admitted to another vulnerability in the older versions of its Windows products. A vulnerability in the remote code execution (RCE) was found in the scripting engine of Internet Explorer (IE).

Latest Research

24
Feb

Author: Isaac Kinsella (Info-Tech)

Last fall, Microsoft announced that it would be ending support for Windows 7 on January 14, 2020.

Latest Research

28
Jan

Author: Isaac Kinsella (Info-Tech)

On January 14, Microsoft issued a statement acknowledging a crucial security flaw within its Windows 10 operating systems: a failure in the Windows 10 CryptoAPI service that affects both Windows 10 and Windows Server Update systems.

Latest Research

31
Dec

Author: Logan Rohde (Info-Tech)

DataStealth is a difficult product to classify. It resembles DLP and privacy software but doesn’t fit neatly in either category. DataStealth focuses on data obfuscation, using a novel approach aimed at limiting sensitive-data acquisition.

Latest Research

18
Dec

Author: Logan Rohde (Info-Tech)

Zecurion DLP offers a robust set of features, including optical-character and voice analysis (for images and recordings, respectively), but equally attention-grabbing is the level of granularity that can be applied to Zecurion’s rules configuration.

Load More