Best Data Loss Prevention (DLP) Software

LW
Researched and written by Lauren Worth

Data loss prevention (DLP) software, also known as data leak prevention software, is used to secure control and ensure compliance of sensitive business information. A key component of DLP solutions is distribution control, which ensures users do not send private information outside of corporate business networks. Security staff and network administrators set business rules that determine who can view, change, and share confidential data. DLP tools often control data on both the network and endpoint level to ensure policies remain consistent across the company. These tools are used to ensure the protection of data and prevent leaks by internal sources.

There are overlaps between DLP tools and some governance, risk & compliance (GRC) software, but these tools are specifically geared toward data control. DLP solutions are also used alongside backup software, but as a complement to the software rather than a replacement.

To qualify for inclusion in the Data Loss Prevention (DLP) category, a product must:

Monitor data storage and sharing for compliance
Allow administrative control over data governance
Detect data leaks or misuse
Facilitate data identification and discovery

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
120 Listings in Data Loss Prevention (DLP) Available
(153)4.5 out of 5
3rd Easiest To Use in Data Loss Prevention (DLP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Netwrix Endpoint Protector is a leading multi-OS endpoint DLP solution, delivering real-time data protection across Windows, macOS, and Linux endpoints, even when they’re offline. Recognized as a

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 57% Mid-Market
    • 24% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Netwrix Endpoint Protector Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    29
    Implementation Ease
    22
    Ease of Use
    20
    Integrations
    19
    Features
    14
    Cons
    Slow Performance
    9
    Limitations
    4
    Policy Limitations
    4
    Lack of Linux Support
    3
    Access Control
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Netwrix Endpoint Protector features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 8.9
    7.7
    Access Control
    Average: 8.6
    9.1
    Compliance
    Average: 9.0
    9.0
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Netwrix
    Company Website
    HQ Location
    Irvine, CA
    Twitter
    @Netwrix
    2,865 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    822 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Netwrix Endpoint Protector is a leading multi-OS endpoint DLP solution, delivering real-time data protection across Windows, macOS, and Linux endpoints, even when they’re offline. Recognized as a

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 57% Mid-Market
  • 24% Enterprise
Netwrix Endpoint Protector Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
29
Implementation Ease
22
Ease of Use
20
Integrations
19
Features
14
Cons
Slow Performance
9
Limitations
4
Policy Limitations
4
Lack of Linux Support
3
Access Control
2
Netwrix Endpoint Protector features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 8.9
7.7
Access Control
Average: 8.6
9.1
Compliance
Average: 9.0
9.0
Data Visibility
Average: 8.8
Seller Details
Seller
Netwrix
Company Website
HQ Location
Irvine, CA
Twitter
@Netwrix
2,865 Twitter followers
LinkedIn® Page
www.linkedin.com
822 employees on LinkedIn®
(153)4.6 out of 5
Optimized for quick response
1st Easiest To Use in Data Loss Prevention (DLP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Safetica Intelligent Data Security protects sensitive enterprise data wherever your team uses it. With advanced data discovery, context-aware classification, proactive threat prevention and adapti

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 59% Mid-Market
    • 37% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Safetica is a comprehensive DLP solution that helps protect sensitive data, monitor user activities, and prevent data leaks effectively.
    • Reviewers appreciate Safetica's intuitive interface, wide range of functions, effective protection against data leakage, user behavior monitoring, immediate response to dangerous incidents, and very readable reports.
    • Reviewers mentioned that configuring the policies related to content filtering is difficult, it does not have integration with G-suites for email, it does not support Linux, and it cannot yet be implemented in the Cloud as SaaS.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Safetica Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    26
    Security
    22
    Data Protection
    20
    Features
    18
    Implementation Ease
    13
    Cons
    Lack of Linux Support
    10
    Limited Compatibility
    9
    Limited Features
    8
    Limited OS Support
    7
    Compatibility Issues
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Safetica features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 8.9
    9.1
    Access Control
    Average: 8.6
    9.1
    Compliance
    Average: 9.0
    9.2
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Safetica
    Company Website
    Year Founded
    2007
    HQ Location
    San Jose, California, United States
    Twitter
    @Safetica
    668 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    90 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Safetica Intelligent Data Security protects sensitive enterprise data wherever your team uses it. With advanced data discovery, context-aware classification, proactive threat prevention and adapti

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 59% Mid-Market
  • 37% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Safetica is a comprehensive DLP solution that helps protect sensitive data, monitor user activities, and prevent data leaks effectively.
  • Reviewers appreciate Safetica's intuitive interface, wide range of functions, effective protection against data leakage, user behavior monitoring, immediate response to dangerous incidents, and very readable reports.
  • Reviewers mentioned that configuring the policies related to content filtering is difficult, it does not have integration with G-suites for email, it does not support Linux, and it cannot yet be implemented in the Cloud as SaaS.
Safetica Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
26
Security
22
Data Protection
20
Features
18
Implementation Ease
13
Cons
Lack of Linux Support
10
Limited Compatibility
9
Limited Features
8
Limited OS Support
7
Compatibility Issues
6
Safetica features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 8.9
9.1
Access Control
Average: 8.6
9.1
Compliance
Average: 9.0
9.2
Data Visibility
Average: 8.8
Seller Details
Seller
Safetica
Company Website
Year Founded
2007
HQ Location
San Jose, California, United States
Twitter
@Safetica
668 Twitter followers
LinkedIn® Page
www.linkedin.com
90 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proo

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 73% Enterprise
    • 24% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Proofpoint’s Data Loss Prevention (DLP) solution is a data protection tool with a focus on email security, using machine learning to identify sensitive data and prevent leaks across email, cloud, and endpoint environments.
    • Reviewers like the intuitive interface, detailed reporting, strong data protection capabilities, and the ability to establish a presence of security via all avenues, including the granular rules and policy writing, and the range of features such as content inspection, policy enforcement, and incident response capabilities.
    • Reviewers experienced issues with the initial setup and configuration being complex, ongoing management requiring dedicated resources, the platform being locked into a GUI-based filtering setup, and the endpoint agent rollout being convoluted and cumbersome.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Proofpoint Enterprise Data Loss Prevention (DLP) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    17
    Email Security
    9
    Customer Support
    7
    Data Protection
    7
    Integrations
    6
    Cons
    Complex Configuration
    6
    Difficult Setup
    4
    False Positives
    4
    Learning Difficulty
    4
    Limited Features
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Enterprise Data Loss Prevention (DLP) features and usability ratings that predict user satisfaction
    8.8
    Ease of Use
    Average: 8.9
    8.6
    Access Control
    Average: 8.6
    8.3
    Compliance
    Average: 9.0
    8.6
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    30,922 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,697 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proo

Users
No information available
Industries
  • Financial Services
Market Segment
  • 73% Enterprise
  • 24% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Proofpoint’s Data Loss Prevention (DLP) solution is a data protection tool with a focus on email security, using machine learning to identify sensitive data and prevent leaks across email, cloud, and endpoint environments.
  • Reviewers like the intuitive interface, detailed reporting, strong data protection capabilities, and the ability to establish a presence of security via all avenues, including the granular rules and policy writing, and the range of features such as content inspection, policy enforcement, and incident response capabilities.
  • Reviewers experienced issues with the initial setup and configuration being complex, ongoing management requiring dedicated resources, the platform being locked into a GUI-based filtering setup, and the endpoint agent rollout being convoluted and cumbersome.
Proofpoint Enterprise Data Loss Prevention (DLP) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
17
Email Security
9
Customer Support
7
Data Protection
7
Integrations
6
Cons
Complex Configuration
6
Difficult Setup
4
False Positives
4
Learning Difficulty
4
Limited Features
4
Proofpoint Enterprise Data Loss Prevention (DLP) features and usability ratings that predict user satisfaction
8.8
Ease of Use
Average: 8.9
8.6
Access Control
Average: 8.6
8.3
Compliance
Average: 9.0
8.6
Data Visibility
Average: 8.8
Seller Details
Company Website
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
30,922 Twitter followers
LinkedIn® Page
www.linkedin.com
4,697 employees on LinkedIn®
(210)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Data Loss Prevention (DLP) software
Save to My Lists
Entry Level Price:Starting at $6.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Coro, the leading cybersecurity platform for small and midsize businesses, revolutionized cybersecurity with the introduction of the world’s first modular cybersecurity platform. Coro’s platform e

    Users
    • IT Manager
    • IT Director
    Industries
    • Non-Profit Organization Management
    • Financial Services
    Market Segment
    • 58% Mid-Market
    • 37% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Coro is a cybersecurity solution that integrates with existing systems to provide threat detection capabilities.
    • Users frequently mention the peace of mind Coro brings, its user-friendly technology, the responsiveness of the support team, and the comprehensiveness of the platform.
    • Users mentioned initial hiccups when getting used to the new technology, false alerts triggered by access permission violations, and a desire for more features such as email search and website content filtering.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Coro Cybersecurity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    95
    Security
    62
    Customer Support
    60
    Protection
    47
    Easy Setup
    41
    Cons
    Performance Issues
    30
    Improvements Needed
    19
    False Positives
    15
    Missing Features
    14
    Limited Features
    13
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Coro Cybersecurity features and usability ratings that predict user satisfaction
    9.5
    Ease of Use
    Average: 8.9
    8.6
    Access Control
    Average: 8.6
    9.2
    Compliance
    Average: 9.0
    9.1
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Coronet
    Company Website
    Year Founded
    2014
    HQ Location
    Chicago, IL
    Twitter
    @coro_cyber
    1,936 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    407 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Coro, the leading cybersecurity platform for small and midsize businesses, revolutionized cybersecurity with the introduction of the world’s first modular cybersecurity platform. Coro’s platform e

Users
  • IT Manager
  • IT Director
Industries
  • Non-Profit Organization Management
  • Financial Services
Market Segment
  • 58% Mid-Market
  • 37% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Coro is a cybersecurity solution that integrates with existing systems to provide threat detection capabilities.
  • Users frequently mention the peace of mind Coro brings, its user-friendly technology, the responsiveness of the support team, and the comprehensiveness of the platform.
  • Users mentioned initial hiccups when getting used to the new technology, false alerts triggered by access permission violations, and a desire for more features such as email search and website content filtering.
Coro Cybersecurity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
95
Security
62
Customer Support
60
Protection
47
Easy Setup
41
Cons
Performance Issues
30
Improvements Needed
19
False Positives
15
Missing Features
14
Limited Features
13
Coro Cybersecurity features and usability ratings that predict user satisfaction
9.5
Ease of Use
Average: 8.9
8.6
Access Control
Average: 8.6
9.2
Compliance
Average: 9.0
9.1
Data Visibility
Average: 8.8
Seller Details
Seller
Coronet
Company Website
Year Founded
2014
HQ Location
Chicago, IL
Twitter
@coro_cyber
1,936 Twitter followers
LinkedIn® Page
www.linkedin.com
407 employees on LinkedIn®
(76)4.8 out of 5
Optimized for quick response
4th Easiest To Use in Data Loss Prevention (DLP) software
Save to My Lists
$500 Off
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SpinOne is an all-in-one, SaaS security platform that protects SaaS data for mission-critical SaaS applications, including Google Workplace, Microsoft 365, Salesforce and Slack, by delivering full vis

    Users
    • CEO
    Industries
    • Marketing and Advertising
    • Non-Profit Organization Management
    Market Segment
    • 49% Small-Business
    • 47% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • SpinOne is a platform that provides data backup and protection, with features such as real-time user monitoring and easy integration with Google Drive.
    • Reviewers appreciate the platform's straightforward use, the regular addition of new features, and the fast, professional technical support, including the deployment of requested features.
    • Users reported limitations in the knowledge base, primarily consisting of articles describing a few common use cases, and expressed a need for a more robust help center.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SpinOne Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    34
    Customer Support
    29
    Backup Ease
    20
    Backup Features
    20
    Reliability
    20
    Cons
    Backup Issues
    9
    Expensive
    7
    Lack of Backup
    7
    Limited Storage
    6
    Access Limitations
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SpinOne features and usability ratings that predict user satisfaction
    9.2
    Ease of Use
    Average: 8.9
    9.1
    Access Control
    Average: 8.6
    9.1
    Compliance
    Average: 9.0
    8.9
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SpinAI
    Company Website
    Year Founded
    2017
    HQ Location
    Palo Alto, California
    Twitter
    @spintechinc
    776 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    90 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SpinOne is an all-in-one, SaaS security platform that protects SaaS data for mission-critical SaaS applications, including Google Workplace, Microsoft 365, Salesforce and Slack, by delivering full vis

Users
  • CEO
Industries
  • Marketing and Advertising
  • Non-Profit Organization Management
Market Segment
  • 49% Small-Business
  • 47% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • SpinOne is a platform that provides data backup and protection, with features such as real-time user monitoring and easy integration with Google Drive.
  • Reviewers appreciate the platform's straightforward use, the regular addition of new features, and the fast, professional technical support, including the deployment of requested features.
  • Users reported limitations in the knowledge base, primarily consisting of articles describing a few common use cases, and expressed a need for a more robust help center.
SpinOne Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
34
Customer Support
29
Backup Ease
20
Backup Features
20
Reliability
20
Cons
Backup Issues
9
Expensive
7
Lack of Backup
7
Limited Storage
6
Access Limitations
4
SpinOne features and usability ratings that predict user satisfaction
9.2
Ease of Use
Average: 8.9
9.1
Access Control
Average: 8.6
9.1
Compliance
Average: 9.0
8.9
Data Visibility
Average: 8.8
Seller Details
Seller
SpinAI
Company Website
Year Founded
2017
HQ Location
Palo Alto, California
Twitter
@spintechinc
776 Twitter followers
LinkedIn® Page
www.linkedin.com
90 employees on LinkedIn®
(118)4.4 out of 5
12th Easiest To Use in Data Loss Prevention (DLP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler Internet Access™ (ZIA) is the world’s leading secure web gateway (SWG), delivering cloud native, AI-powered cyberthreat protection and zero trust access to the internet and SaaS apps. Enter

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 54% Enterprise
    • 22% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Zscaler Internet Access is a cloud-based security tool that handles internet traffic, filters content, and provides secure access to company internal tools and data.
    • Reviewers frequently mention the ease of use, seamless integration with other security tools, real-time traffic monitoring, and supportive customer service as key benefits of Zscaler Internet Access.
    • Reviewers mentioned issues such as latency during high traffic times, complex configuration process, occasional connection issues, and high pricing as potential drawbacks of Zscaler Internet Access.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Internet Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    27
    Internet Security
    21
    Ease of Use
    18
    Protection
    16
    Security Protection
    11
    Cons
    Connection Issues
    12
    Internet Connectivity
    10
    Slow Performance
    8
    Connectivity Issues
    7
    Complex Configuration
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Internet Access features and usability ratings that predict user satisfaction
    8.9
    Ease of Use
    Average: 8.9
    9.3
    Access Control
    Average: 8.6
    9.3
    Compliance
    Average: 9.0
    9.1
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Company Website
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    16,446 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,427 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler Internet Access™ (ZIA) is the world’s leading secure web gateway (SWG), delivering cloud native, AI-powered cyberthreat protection and zero trust access to the internet and SaaS apps. Enter

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 54% Enterprise
  • 22% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Zscaler Internet Access is a cloud-based security tool that handles internet traffic, filters content, and provides secure access to company internal tools and data.
  • Reviewers frequently mention the ease of use, seamless integration with other security tools, real-time traffic monitoring, and supportive customer service as key benefits of Zscaler Internet Access.
  • Reviewers mentioned issues such as latency during high traffic times, complex configuration process, occasional connection issues, and high pricing as potential drawbacks of Zscaler Internet Access.
Zscaler Internet Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
27
Internet Security
21
Ease of Use
18
Protection
16
Security Protection
11
Cons
Connection Issues
12
Internet Connectivity
10
Slow Performance
8
Connectivity Issues
7
Complex Configuration
6
Zscaler Internet Access features and usability ratings that predict user satisfaction
8.9
Ease of Use
Average: 8.9
9.3
Access Control
Average: 8.6
9.3
Compliance
Average: 9.0
9.1
Data Visibility
Average: 8.8
Seller Details
Seller
Zscaler
Company Website
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
16,446 Twitter followers
LinkedIn® Page
www.linkedin.com
8,427 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trellix Data Security protects sensitive and proprietary information shared on endpoints, networks, email, the web, and within databases — as well as provides encryption protection for devices and dat

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 42% Small-Business
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trellix Data Loss Prevention Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    11
    Data Protection
    10
    Ease of Use
    7
    Protection
    4
    Customer Support
    3
    Cons
    Performance Issues
    6
    Slow Performance
    4
    Expensive
    3
    Complex Configuration
    2
    False Positives
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Data Loss Prevention features and usability ratings that predict user satisfaction
    8.5
    Ease of Use
    Average: 8.9
    8.6
    Access Control
    Average: 8.6
    8.9
    Compliance
    Average: 9.0
    8.8
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    252,814 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    836 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trellix Data Security protects sensitive and proprietary information shared on endpoints, networks, email, the web, and within databases — as well as provides encryption protection for devices and dat

Users
No information available
Industries
No information available
Market Segment
  • 42% Small-Business
  • 32% Mid-Market
Trellix Data Loss Prevention Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
11
Data Protection
10
Ease of Use
7
Protection
4
Customer Support
3
Cons
Performance Issues
6
Slow Performance
4
Expensive
3
Complex Configuration
2
False Positives
2
Trellix Data Loss Prevention features and usability ratings that predict user satisfaction
8.5
Ease of Use
Average: 8.9
8.6
Access Control
Average: 8.6
8.9
Compliance
Average: 9.0
8.8
Data Visibility
Average: 8.8
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
252,814 Twitter followers
LinkedIn® Page
www.linkedin.com
836 employees on LinkedIn®
(97)4.6 out of 5
5th Easiest To Use in Data Loss Prevention (DLP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Nightfall AI is the leader in cloud data loss prevention (DLP) for generative AI (GenAI) tools, SaaS apps, and custom apps. Download our Chrome browser plugin or integrate via APIs to protect PII, PHI

    Users
    • Security Engineer
    Industries
    • Financial Services
    • Hospital & Health Care
    Market Segment
    • 66% Mid-Market
    • 19% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Nightfall is a data loss prevention product that detects and remediates threats related to compliance requirements across various apps and platforms.
    • Reviewers appreciate the user-friendly interface, automated workflows, easy integration, and the product's ability to accurately detect sensitive information like PII and PHI.
    • Users mentioned that the customer support is slower than expected, the documentation is not always up-to-date, and the product lacks customization capabilities in the dashboard and reporting.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Nightfall AI Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Integrations
    11
    Easy Integrations
    9
    Easy Setup
    9
    Setup Ease
    8
    Cons
    Limited Features
    4
    Poor Customer Support
    3
    Unclear Guidance
    3
    Alert Issues
    2
    False Positives
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Nightfall AI features and usability ratings that predict user satisfaction
    9.2
    Ease of Use
    Average: 8.9
    7.4
    Access Control
    Average: 8.6
    9.2
    Compliance
    Average: 9.0
    8.9
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    San Francisco, CA
    Twitter
    @NightfallAI
    278 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    110 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Nightfall AI is the leader in cloud data loss prevention (DLP) for generative AI (GenAI) tools, SaaS apps, and custom apps. Download our Chrome browser plugin or integrate via APIs to protect PII, PHI

Users
  • Security Engineer
Industries
  • Financial Services
  • Hospital & Health Care
Market Segment
  • 66% Mid-Market
  • 19% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Nightfall is a data loss prevention product that detects and remediates threats related to compliance requirements across various apps and platforms.
  • Reviewers appreciate the user-friendly interface, automated workflows, easy integration, and the product's ability to accurately detect sensitive information like PII and PHI.
  • Users mentioned that the customer support is slower than expected, the documentation is not always up-to-date, and the product lacks customization capabilities in the dashboard and reporting.
Nightfall AI Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Integrations
11
Easy Integrations
9
Easy Setup
9
Setup Ease
8
Cons
Limited Features
4
Poor Customer Support
3
Unclear Guidance
3
Alert Issues
2
False Positives
2
Nightfall AI features and usability ratings that predict user satisfaction
9.2
Ease of Use
Average: 8.9
7.4
Access Control
Average: 8.6
9.2
Compliance
Average: 9.0
8.9
Data Visibility
Average: 8.8
Seller Details
Year Founded
2018
HQ Location
San Francisco, CA
Twitter
@NightfallAI
278 Twitter followers
LinkedIn® Page
www.linkedin.com
110 employees on LinkedIn®
(37)4.7 out of 5
Optimized for quick response
10th Easiest To Use in Data Loss Prevention (DLP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Nira is a Data Access Governance platform that helps companies protect their Google Workspace and Microsoft 365 documents from unauthorized access. The platform provides complete visibility into who

    Users
    No information available
    Industries
    • Financial Services
    • Marketing and Advertising
    Market Segment
    • 86% Mid-Market
    • 8% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Nira Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    31
    Customer Support
    14
    Data Protection
    13
    Google Workspace Integration
    12
    Security
    12
    Cons
    Access Limitations
    8
    Poor Interface Design
    5
    User Difficulty
    5
    Access Control
    4
    Lack of Features
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Nira features and usability ratings that predict user satisfaction
    9.3
    Ease of Use
    Average: 8.9
    0.0
    No information available
    9.0
    Compliance
    Average: 9.0
    9.7
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Nira
    Company Website
    Year Founded
    2021
    HQ Location
    Redwood City, CA
    Twitter
    @niradotcom
    1,105 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Nira is a Data Access Governance platform that helps companies protect their Google Workspace and Microsoft 365 documents from unauthorized access. The platform provides complete visibility into who

Users
No information available
Industries
  • Financial Services
  • Marketing and Advertising
Market Segment
  • 86% Mid-Market
  • 8% Enterprise
Nira Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
31
Customer Support
14
Data Protection
13
Google Workspace Integration
12
Security
12
Cons
Access Limitations
8
Poor Interface Design
5
User Difficulty
5
Access Control
4
Lack of Features
4
Nira features and usability ratings that predict user satisfaction
9.3
Ease of Use
Average: 8.9
0.0
No information available
9.0
Compliance
Average: 9.0
9.7
Data Visibility
Average: 8.8
Seller Details
Seller
Nira
Company Website
Year Founded
2021
HQ Location
Redwood City, CA
Twitter
@niradotcom
1,105 Twitter followers
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At Forcepoint, we understand the transformation our customers currently face. A cloud-based security reality is a journey. And we’re thoroughly committed to helping our customers make it. Forcepoint

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forcepoint ONE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    4
    Ease of Use
    4
    Features
    4
    Security
    4
    Detailed Analysis
    3
    Cons
    Expensive
    3
    Complexity
    2
    Poor Customer Support
    2
    Alert Issues
    1
    Complex Configuration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forcepoint ONE features and usability ratings that predict user satisfaction
    8.6
    Ease of Use
    Average: 8.9
    8.3
    Access Control
    Average: 8.6
    8.3
    Compliance
    Average: 9.0
    8.1
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Austin, TX
    Twitter
    @Forcepointsec
    67,460 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,899 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At Forcepoint, we understand the transformation our customers currently face. A cloud-based security reality is a journey. And we’re thoroughly committed to helping our customers make it. Forcepoint

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Enterprise
  • 37% Mid-Market
Forcepoint ONE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
4
Ease of Use
4
Features
4
Security
4
Detailed Analysis
3
Cons
Expensive
3
Complexity
2
Poor Customer Support
2
Alert Issues
1
Complex Configuration
1
Forcepoint ONE features and usability ratings that predict user satisfaction
8.6
Ease of Use
Average: 8.9
8.3
Access Control
Average: 8.6
8.3
Compliance
Average: 9.0
8.1
Data Visibility
Average: 8.8
Seller Details
Year Founded
1994
HQ Location
Austin, TX
Twitter
@Forcepointsec
67,460 Twitter followers
LinkedIn® Page
www.linkedin.com
1,899 employees on LinkedIn®
(92)4.6 out of 5
View top Consulting Services for Cloudflare SSE & SASE Platform
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloudflare Area 1 is a cloud-native email security platform that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against spear phishing, Business Email C

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 37% Small-Business
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cloudflare SSE & SASE Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    12
    Ease of Use
    10
    Performance Speed
    8
    Protection
    8
    Reliability
    7
    Cons
    Needs Improvement
    4
    Difficult Learning
    3
    Difficult Learning Curve
    3
    Expensive
    3
    Learning Difficulty
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloudflare SSE & SASE Platform features and usability ratings that predict user satisfaction
    9.2
    Ease of Use
    Average: 8.9
    8.3
    Access Control
    Average: 8.6
    8.3
    Compliance
    Average: 9.0
    6.7
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @Cloudflare
    216,619 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,964 employees on LinkedIn®
    Ownership
    NYSE: NET
Product Description
How are these determined?Information
This description is provided by the seller.

Cloudflare Area 1 is a cloud-native email security platform that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against spear phishing, Business Email C

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 37% Small-Business
  • 34% Mid-Market
Cloudflare SSE & SASE Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
12
Ease of Use
10
Performance Speed
8
Protection
8
Reliability
7
Cons
Needs Improvement
4
Difficult Learning
3
Difficult Learning Curve
3
Expensive
3
Learning Difficulty
3
Cloudflare SSE & SASE Platform features and usability ratings that predict user satisfaction
9.2
Ease of Use
Average: 8.9
8.3
Access Control
Average: 8.6
8.3
Compliance
Average: 9.0
6.7
Data Visibility
Average: 8.8
Seller Details
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@Cloudflare
216,619 Twitter followers
LinkedIn® Page
www.linkedin.com
4,964 employees on LinkedIn®
Ownership
NYSE: NET
(138)4.6 out of 5
Optimized for quick response
11th Easiest To Use in Data Loss Prevention (DLP) software
Save to My Lists
Entry Level Price:$15.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Teramind is the leading global provider of insider threat management, data loss prevention, and productivity and process optimization solutions powered by user behavior analytics. Serving enterprise,

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 57% Small-Business
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Teramind Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    14
    Employee Monitoring
    13
    Ease of Use
    10
    Productivity Improvement
    10
    Productivity Management
    10
    Cons
    Software Issues
    6
    Software Malfunction
    4
    Complexity
    3
    Difficult Navigation
    3
    Poor Customer Support
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Teramind features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 8.9
    8.9
    Access Control
    Average: 8.6
    8.9
    Compliance
    Average: 9.0
    9.2
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Teramind
    Company Website
    Year Founded
    2014
    HQ Location
    Aventura, FL
    Twitter
    @teramindco
    818 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    142 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Teramind is the leading global provider of insider threat management, data loss prevention, and productivity and process optimization solutions powered by user behavior analytics. Serving enterprise,

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 57% Small-Business
  • 36% Mid-Market
Teramind Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
14
Employee Monitoring
13
Ease of Use
10
Productivity Improvement
10
Productivity Management
10
Cons
Software Issues
6
Software Malfunction
4
Complexity
3
Difficult Navigation
3
Poor Customer Support
3
Teramind features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 8.9
8.9
Access Control
Average: 8.6
8.9
Compliance
Average: 9.0
9.2
Data Visibility
Average: 8.8
Seller Details
Seller
Teramind
Company Website
Year Founded
2014
HQ Location
Aventura, FL
Twitter
@teramindco
818 Twitter followers
LinkedIn® Page
www.linkedin.com
142 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Varonis is fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and de

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 85% Enterprise
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Varonis Data Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detailed Analysis
    10
    Data Classification
    9
    Ease of Use
    9
    Data Discovery
    8
    Security
    8
    Cons
    Expensive
    4
    Limitations
    4
    Complexity
    3
    Inefficiency
    3
    Management Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Varonis Data Security Platform features and usability ratings that predict user satisfaction
    8.5
    Ease of Use
    Average: 8.9
    8.3
    Access Control
    Average: 8.6
    8.5
    Compliance
    Average: 9.0
    8.2
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Varonis
    Company Website
    Year Founded
    2005
    HQ Location
    New York, US
    Twitter
    @varonis
    6,288 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,435 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Varonis is fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and de

Users
No information available
Industries
  • Financial Services
Market Segment
  • 85% Enterprise
  • 27% Mid-Market
Varonis Data Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detailed Analysis
10
Data Classification
9
Ease of Use
9
Data Discovery
8
Security
8
Cons
Expensive
4
Limitations
4
Complexity
3
Inefficiency
3
Management Issues
3
Varonis Data Security Platform features and usability ratings that predict user satisfaction
8.5
Ease of Use
Average: 8.9
8.3
Access Control
Average: 8.6
8.5
Compliance
Average: 9.0
8.2
Data Visibility
Average: 8.8
Seller Details
Seller
Varonis
Company Website
Year Founded
2005
HQ Location
New York, US
Twitter
@varonis
6,288 Twitter followers
LinkedIn® Page
www.linkedin.com
2,435 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VIPRE SafeSend is a simple Microsoft Outlook add-on that is used to prevent misaddressed email or inadvertent autocomplete email mistakes by requiring the sender to confirm external recipients and fil

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 26% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • VIPRE SafeSend Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Email Security
    6
    Data Protection
    4
    Customer Support
    3
    Scanning
    3
    Cons
    Difficult Setup
    3
    Email Management Issues
    2
    Integration Issues
    2
    Learning Difficulty
    2
    Limited Features
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE SafeSend features and usability ratings that predict user satisfaction
    9.4
    Ease of Use
    Average: 8.9
    7.5
    Access Control
    Average: 8.6
    8.6
    Compliance
    Average: 9.0
    8.1
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,625 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    209 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VIPRE SafeSend is a simple Microsoft Outlook add-on that is used to prevent misaddressed email or inadvertent autocomplete email mistakes by requiring the sender to confirm external recipients and fil

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 26% Enterprise
VIPRE SafeSend Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Email Security
6
Data Protection
4
Customer Support
3
Scanning
3
Cons
Difficult Setup
3
Email Management Issues
2
Integration Issues
2
Learning Difficulty
2
Limited Features
2
VIPRE SafeSend features and usability ratings that predict user satisfaction
9.4
Ease of Use
Average: 8.9
7.5
Access Control
Average: 8.6
8.6
Compliance
Average: 9.0
8.1
Data Visibility
Average: 8.8
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,625 Twitter followers
LinkedIn® Page
www.linkedin.com
209 employees on LinkedIn®
(458)4.4 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BetterCloud is the market-leading SaaS management platform, enabling IT teams to eliminate up to 78% of SaaS management work. BetterCloud automates onboarding, offboarding & mid-lifecycle changes,

    Users
    • IT Manager
    • Systems Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 60% Mid-Market
    • 28% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BetterCloud is a software that offers automation and integration capabilities for various apps, with a focus on streamlining onboarding and offboarding procedures.
    • Users like BetterCloud's intuitive automation and extensive reporting capabilities, its ability to streamline end-user management, and its robust set of tools that IT admins can leverage in their day-to-day operations.
    • Users mentioned issues with BetterCloud's lack of full integration with certain apps like Visa Online or Sentilink, the time it takes to sync with Google, and the lack of options for customizing certain features like the self-service bot.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BetterCloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    27
    Ease of Use
    20
    Onboarding
    19
    Time-saving
    19
    Features
    18
    Cons
    Limited Features
    16
    Integration Issues
    12
    Missing Features
    9
    Limited Integrations
    7
    Workflow Limitations
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BetterCloud features and usability ratings that predict user satisfaction
    8.7
    Ease of Use
    Average: 8.9
    8.9
    Access Control
    Average: 8.6
    8.6
    Compliance
    Average: 9.0
    8.9
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    New York
    Twitter
    @BetterCloud
    11,342 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    199 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BetterCloud is the market-leading SaaS management platform, enabling IT teams to eliminate up to 78% of SaaS management work. BetterCloud automates onboarding, offboarding & mid-lifecycle changes,

Users
  • IT Manager
  • Systems Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 60% Mid-Market
  • 28% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BetterCloud is a software that offers automation and integration capabilities for various apps, with a focus on streamlining onboarding and offboarding procedures.
  • Users like BetterCloud's intuitive automation and extensive reporting capabilities, its ability to streamline end-user management, and its robust set of tools that IT admins can leverage in their day-to-day operations.
  • Users mentioned issues with BetterCloud's lack of full integration with certain apps like Visa Online or Sentilink, the time it takes to sync with Google, and the lack of options for customizing certain features like the self-service bot.
BetterCloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
27
Ease of Use
20
Onboarding
19
Time-saving
19
Features
18
Cons
Limited Features
16
Integration Issues
12
Missing Features
9
Limited Integrations
7
Workflow Limitations
7
BetterCloud features and usability ratings that predict user satisfaction
8.7
Ease of Use
Average: 8.9
8.9
Access Control
Average: 8.6
8.6
Compliance
Average: 9.0
8.9
Data Visibility
Average: 8.8
Seller Details
Company Website
Year Founded
2011
HQ Location
New York
Twitter
@BetterCloud
11,342 Twitter followers
LinkedIn® Page
www.linkedin.com
199 employees on LinkedIn®

Learn More About Data Loss Prevention (DLP) Software

What is Data Loss Prevention (DLP) Software?

Data loss prevention (DLP) software helps companies ensure their sensitive data is not leaked, lost, or stolen. Data loss prevention (DLP) software provides data security by enforcing company policies that determine who can view, change, or share sensitive data. DLP tools secure data by identifying sensitive data, classifying it, monitoring its usage, and then taking actions to stop data misuse by preventing user access and actions, alerting administrators, quarantining suspicious files, encrypting data, or taking other actions to remediate when necessary.

Data loss prevention (DLP) software protects data in three states—data in use, data in motion, and data at rest.

  • Data in use refers to data that is used on an endpoint such as a laptop, mobile device, or tablet. An example would be an employee attempting to copy and paste sensitive data using their laptop.
  • Data in motion refers to data moving over an internal or external network to a user’s endpoint. DLP software monitors when data is transmitted across networks and via email or other communication methods.
  • Data at rest refers to data stored in databases, cloud repositories, computers, mobile phones, or other similar devices. DLP software protects data at rest by restricting it’s access to approved users, encrypts it, or deletes it based on the organization’s retention policies.

Data loss prevention (DLP) software protects data using predefined policies to identify, classify, monitor, and protect data to meet business and regulatory compliance. For example, if an employee sends an email to a customer and attaches proprietary company information, the data loss prevention (DLP) software will prevent the email with protected data from being sent. In this example, the DLP software prevented data leakage. Another example would be preventing someone—whether an internal employee or a hacker who breached the company’s traditional perimeter security—from inflicting damage to the company by deleting data. Data protected by DLP software as defined by company policies would be blocked from deletion. In this example, the DLP software prevented data loss.

Key Benefits of Data Loss Prevention (DLP) Software

  • Identify, classify, monitor, and protect sensitive data including personally identifiable information (PII), protected health information (PHI), payment card information (PCI), intellectual property (IP), confidential corporate information, sensitive research, and other important data as defined by the company
  • Prevent data from being leaked, stolen, or lost by both internal and external actors
  • Alert administrators or remediate incidents
  • Help companies meet compliance requirements such as privacy, payments, health, or other global data protection regulations

Why Use Data Loss Prevention (DLP) Software?

Companies use DLP software to protect their sensitive data. Today’s workforce is increasingly mobile. Employees use devices, such as mobile phones and laptops, to access both on-premises and cloud-based company applications. Because of this ability to access company data while not physically in the office, organizations’ data security strategies must evolve. Companies use DLP software to help them employ a data-centric security strategy which secures the data itself, in addition to traditional network-centric security strategies which secure the perimeter, such as a network. This is particularly helpful for companies that allow employees to bring their own device to use for work.

In the event of a data breach, companies that have employed DLP software can reduce the expense of recovery, especially if the breached data was not sensitive data or was encrypted, rendering it useless to other parties without the encryption keys. Companies may also be able to reduce their cyber liability insurance premiums by using data security software such as DLP software.

To use an analogy on protecting the data itself, imagine a burglar robs a jewelry store by smashing in the front door and then the jewelry cases. What did the burglar take? They likely took gold, silver, and diamond jewelry, among other precious gems. Did they take the jewelry stands or any empty jewelry gift boxes laying around? No, because those have low value. Similarly, not all data is valuable; hackers are typically after sensitive data (gems). Hackers will break through network security (the doors and jewelry cases) to get to sensitive data (jewelry). But what if the data itself was protected and thus hard to steal? In the jewelry robbery example, imagine if the jewelry was bolted down in the cases, had explosive ink tags attached to it, or was locked in an overnight safe instead of left out. What then? The concept of protecting data using DLP software is similar.

The main reasons companies use data loss prevention (DLP) software include:

Protect sensitive data — Sensitive data is valuable to companies and therefore it is also valuable to bad actors and hackers. Companies protect their sensitive data, such as personally identifiable information (PII) like social security numbers, intellectual property (IP) such as source codes or product development maps, and other sensitive data like financial data or customer data.

Enable secure data use on mobile devices — Today’s workforce increasingly brings their down devices to work or works remotely with a variety of endpoints. Companies can take more steps to secure their data by using DLP software.

Prevent data leaks — DLP software prevents accidental or willful data leaks caused by employees or insider threats.

Prevent data loss — DLP software prevents data loss by preventing users from deleting files they do not have permission to.

Detect data breaches — DLP software can alert administrators to suspicious activity and stop data exfiltration attempts or data breaches currently in progress.

Understand data usage — Sensitive data is stored in multiple databases, both on-premises and in the cloud, applications, other systems, networks, and on endpoints. DLP software discovers sensitive data, classifies it, and monitors it; this reporting gives organizations visibility into how their data is used. This information can provide key insights on a business’s data strategy.

Maintain customer trust — Due to major data breaches becoming so commonplace, end users have become wary about how their data is used and want to know their data is protected by companies who store it. Using DLP tools helps companies protect customer data and ultimately protect their brands while gaining their customers’ trust.

Meet business partner compliance — Not only are end users demanding better data protection from providers, but increasingly so are business partners. Many business partners contractually obligate companies to protect sensitive data or pay financial penalties. Many business partners audit the companies they do business with to ensure they have adequate data security to protect sensitive data.

Comply with governmental regulations — In some jurisdictions, data protection policies are codified into law. Regulatory bodies enforcing data protection laws such as the General Data Protection Regulation (GDPR) require reports from companies proving compliance with the law. If a company is found non-compliant, they can face steep fines.

Who Uses Data Loss Prevention (DLP) Software?

All organizations can benefit from using DLP software, however, enterprise-level companies in highly-regulated industries such as health care, finance, manufacturing, energy, and government are the most likely to use DLP software. With the adoption of more privacy regulations codifying data security into law, such as GDPR and the California Consumer Privacy Act (CCPA),more mid-level and small companies can benefit from DLP software.

Employees within a company that may use DLP software, include:

CISOs and InfoSec teams — InfoSecurity teams use DLP software to secure the business and its data.

IT teams — Some IT teams may be responsible for administering DLP software.

C-suite — C-level executives like CEOs and CMOs use DLP software to protect intellectual property (IP) and protect the value of the brand by securing customers’ personally identifiable information or other sensitive data.

Everyday employees — Everyday employees may encounter DLP software if they try to take an action, such as sharing sensitive data, which is not allowed by their company’s policy.

Kinds of Data Loss Prevention (DLP) Software

There are generally four kinds of DLP software companies use.

On-premise storage DLP — On-premise storage DLP identifies and protects sensitive data in databases, servers, and file shares.

Cloud DLP — Cloud DLP is similar to on-premise storage DLP, but focuses on finding sensitive data in cloud storage. The connection to cloud storage is achieved through application programming interfaces (APIs).

Network DLP — Network DLP monitors sensitive data across a company’s network. This includes scanning email, web, social media, and other communication methods to ensure compliance with the company’s sensitive data policy. This monitoring function is achieved by using a physical appliance or by passing network traffic through a dedicated virtual machine.

Endpoint DLP — Endpoint DLP protects sensitive data on laptops, mobile phones, and other endpoints through software installed on the device. Endpoint DLP also allows companies to block certain activities, such as preventing specific file types from being loaded onto mobile devices.

Data Loss Prevention (DLP) Software Features

Central policy management — DLP software uses a specific company’s policies to protect sensitive data and meet specific compliance regulations. DLP software is a central place to create, enforce, and manage policies on a user-friendly dashboard.

Incident detection and management — DLP software informs administrators of policy violations in real time, and offers incident management functions that allow administrators to manage these events.

Data identification — For DLP software to protect data, it needs to know where the data is. DLP solutions offer both content analysis and context analysis.

Data classification — DLP tools categorize data based on their sensitivity and apply policies such as who should have access to it and or what actions they can take with the data.

Integrations — DLP software should include pre-built integrations with major platforms, directories, email providers, applications, and other areas where company data is stored.

Reporting — DLP software includes reporting tools, such as pre-built templates and customizable reports, which are useful for showing compliance to regulators, auditors, forensic teams, incident response teams, and other parties.