Top Rated Check Point Data Loss Prevention (DLP) Alternatives
Video Reviews
19 Check Point Data Loss Prevention (DLP) Reviews
Overall Review Sentiment for Check Point Data Loss Prevention (DLP)
Log in to view review sentiment.

1- Administrative control over data governance.
2- Data leaks detection or misuse.
3- Monitor data storage and sharing for compliance
4- Facilate data identification and discovery. Review collected by and hosted on G2.com.
I think it was not a full DLP solution when I used it. It's just covering the network layer and when once the blade is active, the performance of the server goes up and slows down. Review collected by and hosted on G2.com.
You can enable it on the existing GW or dedicate HW. The existing GW option is very cheap; there's no additional HW investment. It's a pure networking DLP solution. Ftp, http-s, smtp passing through the firewall with DLP is analyzed based on the DLP policy. Initial policy and activation is straightforward. Soluion fits many enterprises with default policy covering several regulations. Usercheck client is very small and enhances the interation with clients. Portal is customizable. Smartevent enhances the visibility and reporting options. There are hundreds of already defined datatypes in the database. It also supports many countries datasets, you don't need to describe these presets. By the way, you have several options to describe and add the datatypes to the repository. Checkpoint DLP is unique in terms of approach, as it tries to educate the users as well as protecting the organization. First thing before staring and throughout the transition within the DLP is the user awareness. Checkpoint DLP is the only real DLP solution working as an add-on to the Firewall-NGTP GWs in the market. I've tested several companies DLP solution, these solutions cover only limited areas like credit card, file scan or predefined sets where you can not customize or tune to make it running. By using granular access control on the smartconsole , delegation of DLP to the compliance or infosec team. Review collected by and hosted on G2.com.
It's not a full DLP solution. It's just covering the network layer. It does not cover database or data sits on local or share. There may be need for additional DLP porducts to cove the gap. Checkpoint DLP needs Checkpoint environment up and running. You can not use the Checkpoint DLP solution with a 3rd party system. It needs SSL inspection (web site) and identity awareness/AD entegration on the GW. Template is straightforward you don't have the option to select a template with specific security weight. There's no option for sensitivity and weighted risk levels, this effect the usage. There's no auto learning option for the existing traffic. Data owners can be assigned on the policy, but there's no option for 3rd party integration for asset management or SCRM solution.
FP tuning is somehow complicated, end users should be involved for the learning process. Review collected by and hosted on G2.com.
the innovation and practical approach to prevent data breaches before they occur with easy deployment and activation for immediate data loss prevention in real-time Review collected by and hosted on G2.com.
One of the things that I dislike is that once this blade is active, the performance of the server goes up and slows down the server affecting the service and sometimes losing the connection to the ISP Review collected by and hosted on G2.com.
Automated alerts to users which also educates the users.
Reporting and logging feature that provides more visibility. Review collected by and hosted on G2.com.
Covers only the network layer.
Could be a bit simplistic and interactive GUI is required for users. Review collected by and hosted on G2.com.
Administrators can easily apply deployment and configuration. The predefined ruleset is enough for the initialization of the solution usage. Review collected by and hosted on G2.com.
Performance could be a problem caused by DLP processes. Review collected by and hosted on G2.com.
Check Point DLP (Data Loss Prevention) blade is very useful to protect our confidential information. We can create policy and enforce to all so that no one can send any personal confidential details or company confidential document over mail also no one can copy the data to other drive or online drive. It is very useful and unique features. Review collected by and hosted on G2.com.
as of now no any compain or mis-behave we found. Review collected by and hosted on G2.com.

1. Check Point UI - the configuration of the Data Loss Prevention is simple and understandable for the people without previous experience with such solutions
2. Reach set of the predifined types of content to analyze
3.Multiply languages for the analize are supported (we use both English and Russian)
4. The DLP blade is integrated in the Check Point Gateway software, so there's no need to deploy any additional components into your infrastructure
5. The contnet is analyzed on the Gateway side, so there's no need to install any software on the clients side (PC, laptops etc.)
6. If you have Check Point Smart Event enabled, the DLP balde alerts are automatically processed within it as well Review collected by and hosted on G2.com.
For Check Point Management Server version R80.10, the DLP configuraion is performed in the outdated Smart Dashbord instead of the unified Smart Console Review collected by and hosted on G2.com.

This is very good, as we DLP blage is integrated with CheckPoint gateway so no need to manage or install any additional software. If we have Check Point Smart Event enabled, the DLP balde alerts are automatically processed within it as well. Also no client need to install on user end. We have also encrypt the USB devices as well with password protection, Review collected by and hosted on G2.com.
As of now we couldnt find and disadvantage. Note: we are using R80.40 MGMT, but we would like to protect .jpg .gif .png files as well. Review collected by and hosted on G2.com.
What I like best about this software is that it helps you save stored data so that you can not loose any data. Review collected by and hosted on G2.com.
What I dislike is that you have to get the hang of it to actually understand how it works. Review collected by and hosted on G2.com.