Loading...
Data Loss Prevention (DLP) solutions for preventing unauthorized data exfiltration, detecting data breaches, and enforcing data security policies.
Browse 215 data loss prevention tools
AI-native DDR detecting data exfiltration via behavioral & semantic analysis.
Unified DLP platform with centralized policy control across cloud, SaaS & endpoints.
Real-time DLP that blocks sensitive data exfiltration via eBPF monitoring.
Cloud & SaaS data boundary enforcement to prevent data exfiltration.
Enterprise secure file sharing and VDR platform with IRM and access controls.
GDPR-compliant digital fax replacement with encrypted secure data transmission.
Encrypted file transfer & virtual data rooms for GDPR-compliant data exchange.
GDPR-compliant platform for securely sending/receiving large files up to 100 GB.
Browser-based virtual data room for GDPR-compliant secure file sharing.
Self-hosted enterprise file sync & share solution deployed on Oracle Cloud.
Self-hosted enterprise file sharing with DLP, DRM, compliance, and hybrid cloud.
On-prem EFSS solution for file sync, sharing & compliance on Windows.
On-premises file sync, share & compliance platform for Linux infrastructure.
Self-hosted file sharing server with remote access, sync, and security controls.
Enterprise cloud file storage with collaboration, DLP, and compliance tools.
Enterprise secure cloud storage with file sharing, DLP, and compliance tools.
EFSS platform enabling geographic data storage control for regulatory compliance.
Enterprise secure file transfer with E2E encryption and compliance tools.
Enterprise secure file storage & sharing with AES-256 encryption and DLP.
File sharing platform for data sovereignty, residency, and compliance.
Cryptographic post-authentication data use policy enforcement platform.
Enterprise file sharing platform with on-prem, cloud, and hybrid deployment.
Common questions about Data Loss Prevention tools including selection guides, pricing, and comparisons.
Data Loss Prevention (DLP) solutions for preventing unauthorized data exfiltration, detecting data breaches, and enforcing data security policies.
Get strategic cybersecurity insights in your inbox