Oh no! Some styles failed to load. 😵 Please try reloading this page

Data Loss Prevention Software

Compare the Top Data Loss Prevention Software of 2021

Data Loss Prevention Software Guide

What is Data Loss Prevention Software?

Data loss prevention (DLP) software is used to manage and monitor stored sensitive data with the purpose of preventing potential data breaches or leaks. Compare the best Data Loss Prevention software currently available using the table below.

  • 1
    FileCloud

    FileCloud

    CodeLathe

    #1 Enterprise File Sharing, Sync, Backup & Remote Access. Get complete data ownership, control and governance. Self-host it on-premises or on cloud. Run your own private Dropbox-like file sharing and sync solution, integrated with your IT infrastructure and storage. We host FileCloud for you on a world class infrastructure in the region of your choice. No installation. We take care of all the technical details. Run FileCloud on your infrastructure, with full control over your data. Self-host FileCloud on AWS, AWS GovCloud and Azure. Pre-built FileCloud images are available on AWS and Azure marketplaces. Supports local storage (Disk, Network Shares, CIFS/NFS) and cloud storage. Can connect to multiple storage endpoints. Supports AWS S3, Azure Blob, Wasabi, EMC ECS and other S3 compatible storage systems. Both primary (managed) and file gateway (Network share) storage modes are supported.
    Starting Price: $50.00/year/user
  • 2
    Sonrai Security

    Sonrai Security

    Sonraí Security

    Identity and Data Protection for AWS, Azure, Google Cloud, and Kubernetes. Sonrai’s public cloud security platform provides a complete risk model of all identity and data relationships, including activity and movement across cloud accounts, cloud providers, and 3rd party data stores. Uncover all identity and data relationships between administrators, roles, compute instances, serverless functions, and containers across multi-cloud accounts and 3rd-party data stores. Inside the platform, our critical resource monitor continuously monitors your critical data sitting inside object stores (e.g. AWS S3, Azure Blob) and database services (e.g. CosmosDB, Dynamo DB, RDS). Privacy and compliance controls are monitored across multiple cloud providers and 3rd party data stores. Resolutions are coordinated with relevant DevSecOps teams.
  • 3
    Imatag

    Imatag

    IMATAG

    IMATAG protects your visual content online, such as product images, brand visuals, licensed content, or sensitive files. It comes in two flavours: - IMATAG LEAKS, the first online solution for the identification of photo or video leaks, - and IMATAG MONITOR, the most reliable visual search solution to track the use of your content on the internet. How it works: The software discreetly places an imperceptible identifier at the pixel level of images or videos. This invisible watermark allows to identify your content on the web regardless if it has been resized, cropped or trimmed, posted on social media or copied via a screenshot. Used as a tracker, it is also able to trace the origin of a leak. Supports images (photos, renders, design), videos, and PDF. Available as SaaS via Web UI or API, or on premise software.
  • 4
    ESET Endpoint Security
    Uncover the unknown in your network with this EDR solution. This endpoint detection and response tool leverages ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real-time endpoint data. Provides quick analysis and remediation of any security issue in the network. ESET Enterprise Inspector provides a unique behavior and reputation based detection that is fully transparent to security teams. All rules are easily editable via XML to allow fine-tuning. New rules can be created to match the needs of specific enterprise environments, including SIEM integrations. Utilize ESET’s endpoint detection and response tool to easily suppress false alarms by adjusting the sensitivity of detection rules for different computer groups or users. Combine criteria such as file name/path/hash/command line/signer to fine-tune the trigger conditions.
    Leader badge
    Starting Price: $38 per user per year
  • 5
    USB-LOCK-RP

    USB-LOCK-RP

    Advanced Systems International

    USB Control & Lockdown Software to Block USB Devices Access and Lock USB Ports in Windows Systems. Centralized USB Device Management, Monitoring and Whitelisting to Protect Computers in a Network. USB Device Control is an important part of Endpoint Security Management and focuses in the protection of computer systems and data assets from threats posed by unauthorized USB device usage. Controlling USB devices access to endpoints is required to secure networks that control machinery or store sensitive information. - Centralized USB Device Management. - Secures Groups of Computer or Specific Computers. - Whitelists Specific Devices by Hardware ID and Blocks the rest. -Automatically apply Group 1 protection settings to unassigned clients. NEW! - Receives Alerts & Logs Device Connections in the Network Automatically. -Export Status and Alerts Reports to csv format (Comma-separated value)NEW! -Automatic Authorizations Mode, Whitelist USB devices across the network automatically. NEW
    Starting Price: $20 per client/one-time
  • 6
    DriveStrike

    DriveStrike

    DriveStrike

    DriveStrike is easy to use, implement and manage. With DriveStrike you can execute secure remote wipe, remote lock, and remote locate commands on any platform. Integrated drive encryption support as well as mobile device management MDM for mobile platforms. Our professional support team is always available to answer your questions and help you install our services or manage your account and devices. Protecting your data and devices has never been easier or more cost effective. If you have questions or need help understanding how best to protect your data please contact us and we will gladly answer your questions. Protect your business with a device and data protection platform that keeps all devices safe with a single solution and Dashboard. Keep your Workstations, MacBooks, iPads, Smartphones, Tablets, Laptops safe, secure, and organized.
    Starting Price: $0.75 per month
  • 7
    Code42

    Code42

    Code42

    Welcome to data security for the collaborative and remote enterprise. Validate proper use of sanctioned collaboration tools, such as Slack and OneDrive. Uncover Shadow IT applications that may indicate gaps in corporate tools or training. Gain visibility into off-network file activity, such as web uploads and cloud sync apps. Quickly detect, investigate and respond to data exfiltration by remote employees. Receive activity alerts based on file type, size or count. Access detailed user activity profiles to speed investigation and response.
  • 8
    Endpoint Protector
    Endpoint Protector is an advanced, all-in-one Data Loss Prevention solution for Windows, macOS and Linux, that puts an end to data leaks and data theft and offers seamless control of portable storage devices. Endpoint Protector’s filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or data protection regulations such as GDPR, PCI DSS, CCPA, HIPAA, etc. Endpoint Protector features several specialized modules that can be mixed and matched based on client needs. The modules comprise: Content Aware Protection, Device Control, Enforced Encryption, and eDiscovery . It makes work more convenient, secure and enjoyable, offering an excellent ROI.
  • 9
    Panda Fusion 360

    Panda Fusion 360

    Panda Security

    Panda Fusion 360 is a holistic solution that provides automated advanced security, centralized IT management, and remote support for all workstations, laptops and servers on the corporate network, including mobile devices and tablets. As it is a cloud solution, it is deployed rapidly without the need for maintenance or costly investments in IT infrastructure. Panda Fusion 360 combines the best of two worlds. The advanced security provided by Panda Adaptive Defense 360 against all types of cyberthreats, and the integrated management, monitoring and remote support capabilities delivered by Panda Systems Management. Automated prevention, detection, containment and response against any present or future advanced threats, zero-day malware, ransomware, phishing, memory exploits and malwareless attacks. Cost savings thanks to centralized control and automation of infrastructure management tasks.
  • 10
    Teramind

    Teramind

    Teramind

    Teramind provides a user-centric security approach to monitor your employee's digital behavior. Our software streamlines employee data collection in order to identify suspicious activity, improve employee productivity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents by providing real-time access to user activities by offering alerts, warnings, redirects and user lock-outs to keep your business running securely and efficiently while a free Android app provides employee monitoring on the go. Teramind can be installed in minutes and can be deployed either without employees knowing or with full transparency and employee control to not erode trust.
    Starting Price: $10/month/user
  • 11
    AccessPatrol

    AccessPatrol

    CurrentWare Inc.

    Monitor and block the use of USB devices and other peripherals in your organization to protect corporate sensitive data against theft. BLOCK USB: You can restrict or permit device access to computers within your network by type device, device brand, and device serial number. DLP REPORTS: Investigate USB device usage, USB file transfer activity, and other file operations using AccessPatrol's report generator. DEVICES YOU CAN CONTROL WITH ACCESSPATROL: *Storage Devices* USB DVD /CD Floppy Disks Tape External Hard drives Firewire - Full / Read only / No access SD Cards & MM Cards *Wireless Devices* Bluetooth Infrared WiFi *Communication Ports* Serial Parallel *Imaging Devices* Scanners Cameras, Webcams & Others *Others* Printers USB Ethernet Adapter Sound Cards
    Starting Price: 2.99 PUPM
  • 12
    WipeDrive

    WipeDrive

    WipeDrive

    WipeDrive allows home users, corporations and government entities to securely and permanently erase data from hard drives, removable media, and mobile devices, providing a cost-effective, secure, and socially responsible way of recycling and retiring computer storage. WipeDrive is the world leader in secure data destruction.
    Starting Price: $19.95/one-time/drive
  • 13
    Sheetgo

    Sheetgo

    Sheetgo Europe

    Sheetgo is the no-code automation tool for teams. Create custom workflows to collect, manage and share data — all from a spreadsheet. From inventory management and financial forecasting to sales tracking and student attendance monitoring, you can build a tailor-made, automated system for any business process. Sheetgo works with Google Sheets, Excel and CSV files. Say goodbye to manual work and create an automated workflow today at sheetgo.com.
    Starting Price: $20/user/month
  • 14
    MinerEye DataTracker
    MinerEye’s DataTracker enables organizations to overcome the information governance and protection challenge. It automatically scans, indexes, analyzes, virtually labels and categorizes every piece of unstructured and dark data contained in the organization’s data repositories. With proprietary Interpretive AI™, machine learning, and computer vision, the solution locates relevant files out of the billions that are stored, accurately evaluates them, qualifies them by significance and purpose, and automatically sends alerts with next best action recommendations in cases of conflicts, duplications, or potential violations. This way, data protection is profoundly enhanced while risk and operational costs are reduced.
    Starting Price: $2000/1TB/month
  • 15
    Box Shield
    Shield lets you classify content your way, both manually and automatically. We're excited to announce our powerful, native capability that identifies PII and custom terms within files, and automatically classifies them based on your policies — helping you protect your data at scale. Placing controls close to your content helps prevent leaks in real time, while powering a frictionless end-user experience. Configure access policies within minutes to keep your data secure while letting people do their mission-critical work. Using machine learning, Shield brings you timely, accurate alerts on insider threats, account compromise, and malware attacks. Quickly evaluate alerts in Shield, or send them to your existing tools for further analysis. Shield works with the best-of-breed security tools you already have in place. Alerts containing more insights than ever before can be integrated with your SIEM and CASB for a unified view.
    Starting Price: $130 per month
  • 16
    Asigra

    Asigra

    Asigra

    Asigra helps IT teams increase their data recovery confidence through our unsurpassed reliability, security, manageability, and affordability in data protection software. Asigra's Enterprise Backup and Disaster Recovery (BDR) software platform was designed for Managed Service Providers (MSPs) to host and operate their own Backup as a Service solution. The easy to manage platform offers users the ability to white-label it to match your brand, while its breakthrough Hybrid Cloud Backup architecture combines a Cloud optimized scale-out architecture, a Cloud backup and recovery software platform, and a Cloud API and management system to help IT Teams seamlessly and efficiently manage, scale and deliver data protection services.
  • 17
    Data Rover

    Data Rover

    Data Rover

    Data Rover is the solution for managing and securing user-generated data on any File System. We help you uncover the junk and examine valuable, and probably delicate, data information on your “Planet�?, or in the Cloud! With this knowledge and our expertise you have the power to decide and do. Let us help you by discovering and taking full control over what you have... or, didn’t know you had! Let us also help you identify hidden threats within your organisation and then define preventive measures against further vulnerability. Let us show you on how to keep an eye on user behavioural patterns. Data Rover™ bridges the gap between user data and content management, data security and infrastructure. One really powerful dynamic solution for your business.
  • 18
    ManageEngine M365 Manager Plus
    M365 Manager Plus is an extensive Microsoft 365 tool used for reporting, managing, monitoring, auditing, and creating alerts for critical activities. With its user-friendly interface, you can easily manage Exchange Online, Azure Active Directory, Skype for Business, OneDrive for Business, Microsoft Teams, and other Microsoft 365 services all from one place. M365 Manager Plus provides exhaustive preconfigured reports on Microsoft 365 and helps you perform complex tasks including bulk user management, bulk mailbox management, secure delegation, and more. Monitor Microsoft 365 services around the clock, and receive instant email notifications about service outages. M365 Manager Plus eases compliance management with built-in compliance reports and offers advanced auditing and alerting features to keep your Microsoft 365 setup secure.
    Starting Price: $345.00/year/user
  • 19
    BigID

    BigID

    BigID

    BigID is data visibility and control for all types of data, everywhere. Reimagine data management for privacy, security, and governance across your entire data landscape. With BigID, you can automatically discover and manage personal and sensitive data – and take action for privacy, protection, and perspective. BigID uses advanced machine learning and data intelligence to help enterprises better manage and protect their customer & sensitive data, meet data privacy and protection regulations, and leverage unmatched coverage for all data across all data stores.
  • 20
    Check Point Data Loss Prevention (DLP)

    Check Point Data Loss Prevention (DLP)

    Check Point Software Technologies

    Check Point Data Loss Prevention (DLP) pre-emptively protects your business from unintentional loss of valuable and sensitive information. Monitor data movement and empower your employees to work with confidence, while staying compliant with regulations and industry standards. Tracks and controls any type or format of sensitive information in motion, such as e-mail, web browsing and file sharing services. Educates and alerts end-users on proper data handling without involving IT/security teams, and allows for real-time user remediation. Centrally managed across your entire IT infrastructure from a single console. Leverages out-of-the-box best practice policies.
  • 21
    Data Rescue

    Data Rescue

    Prosoft Engineering

    Have you accidentally deleted or lost important files? Our data recovery software can retrieve your priceless photos, videos, important business documents, school work, and more. All with only a few simple steps. Data Rescue is designed for the everyday home user to professional business users. Recover from internal and external hard drives, USB flash drives, and SD cards. Clone a failing hard drive and create a Recovery Drive so you can recover from your main drive. In situations where your hard drive is physically damaged and software cannot access the data, you will need a data recovery lab to have them physically recover the data. Our sister company The Data Rescue Center can provide you a free evaluation and diagnosis of your drive, select the option that best suits you and get started today.
    Starting Price: $19
  • 22
    Stellar Repair for Exchange

    Stellar Repair for Exchange

    Stellar Information Technology

    Stellar Repair for Exchange recovers dismounted and offline Exchange EDB files. This advanced software is recommended by MVPs & Admins worldwide to scan corrupt Exchange Database (EDB) files and recover all mailbox items, including emails, attachments, contacts, calendars, notes, tasks, journals, and public folders.
    Starting Price: $399
  • 23
    Snowplow Insights

    Snowplow Insights

    Snowplow Analytics

    Snowplow is a best-in-class data collection platform built for Data Teams. With Snowplow you can collect rich, high-quality event data from all your platforms and products. Your data is available in real-time and is delivered to your data warehouse of choice where it can easily be joined with other data sets and used to power BI tools, custom reports or machine learning models. The Snowplow pipeline runs in your cloud account (AWS and/or GCP), giving you complete ownership of your data. Snowplow frees you to ask and answer any questions relevant to your business and use case, using your preferred tools and technologies.
  • 24
    AxcessD

    AxcessD

    AxcessD

    Data privacy on social media, email and other web platforms. Access Control. You determine exactly who can view the data you post on social media, email or other web platforms. Privacy Your data is hidden during transmission and storage on the web. Authentication. Your data is signed. The end user can be sure it came from you and has not been altered or taken out of context. Why you need data privacy. Social Media, email and other web platforms have become the primary way we stay connected today. But did you know… You have No Real Control over your Data. And your data – social media posts, comments on bulletin boards or your friends posts and even what you write in your emails – is all Not Protected. Your data can be used to target ads. The government and corporations can collect data to use against you Criminals can use your data for any manner of nefarious objectives. We’ve even heard a lot in the news about how our data is being collected
    Starting Price: $3 per user, per month
  • 25
    ManageEngine Device Control Plus
    Device Control Plus is an enterprise software, specially designed for complete device control and file access management. It is equipped with an intuitive interface using which the admin can efficiently classify USB and other peripheral devices as trusted, blocked or allowed temporary access. It is also equipped with numerous data security capabilities including assigning read-only file access, restricting file copying or blocking unauthorized file transfers. Additionally for extensive visibility over device actions and forensic analysis of policy efficacy and network performance, file tracing and file shadowing reports will be automatically generated.
    Starting Price: $5.95 per user per year
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next