Of all the safety methods aimed toward guaranteeing information safety and combating information breaches, information loss prevention instruments are far and away the most typical. DLP instruments consistently monitor and analyze information to determine potential violations of safety insurance policies and, if applicable, cease them from persevering with. DLP instruments run the gamut, from these specializing in a single a part of a company, equivalent to electronic mail providers or laptops, to ones specializing in information backup, archival and restoration.
Some DLP instruments embody the whole group — and these are the main target of this text. First, let’s talk about some must-have options and capabilities. Then, take an in depth take a look at seven enterprise DLP instruments for the data wanted when evaluating the most effective product to your firm’s wants.
Should-have DLP device options and capabilities
Enterprise DLP instruments comprise a variety of options and capabilities. The next are essentially the most important:
- The power to robotically uncover, stock and classify delicate information and its metadata. Information is consistently being created and adjusted, so a DLP device unable to maintain tempo with potential information leaks is all the time lacking issues.
- The power to investigate information within the following circumstances:
- In any state — in use, at relaxation or in transit.
- In any location, together with person endpoints, on-premises servers, networks and cloud providers.
- In any software, equivalent to electronic mail, net, messaging platforms, social media and file sharing.
- The power to make use of a number of kinds of analyses to precisely discover issues. All evaluation ought to consider the context of the communication as a result of exercise that is utterly regular in a single context could possibly be extremely suspicious in one other. Examples of research embody the next:
- Searching for suspicious values — e.g., “confidential.”
- Doing complicated pattern-matching — e.g., to search out bank card numbers.
- Discovering copies of recognized delicate information.
- Performing statistical evaluation of knowledge exercise.
- Finding out person habits.
- The power to behave in one in every of a number of methods when the DLP software program discovers a possible coverage violation. For instance, in a single state of affairs, you may want the device to log a potential violation and alert an administrator. In one other, you may want the device to cease an information switch, provoke an incident report by your SIEM system and instantly contain your incident response crew in dealing with the tried breach. Instruments may additionally have the ability to proactively repair primary coverage violations, equivalent to encrypting delicate saved information.
Now, let’s take a look at a number of fashionable enterprise DLP instruments marketed to safety groups. That is simply an outline of what is supplied immediately. Many different DLP instruments can be found, every with its personal distinctive mixture of options and capabilities.
The writer chosen these organization-wide DLP instruments based mostly on market analysis and prioritized choices which have sizable buyer bases; are beneath energetic growth; and have publicly out there person evaluations contributed by verified purchasers of DLP services. This record is organized alphabetically.
1. Digital Guardian DLP by Fortra
Datasheet
Key options
- SaaS DLP with automated information discovery and information classification capabilities for each recognized and unknown information sorts.
- Granular insurance policies out there to guard delicate information and prohibit its motion.
- APIs and integration with a number of main know-how distributors.
Professionals
- Helps managed providers.
- Presents wonderful buyer assist and on-demand coaching.
Cons
- Configuring and managing insurance policies could be difficult for some customers.
- Can reportedly trigger blue display points on some endpoints, in accordance with customers.
Modules
- Analytics & Reporting Cloud.
- Endpoint DLP.
- Community DLP.
- Administration Console.
2. Forcepoint DLP
Datasheet
Key options
- Performs a number of kinds of analyses, together with optical character recognition.
- Makes use of a single evaluation engine for information in movement, at relaxation and in use, guaranteeing consistency.
- Gives coverage templates for main safety and privateness rules all over the world.
Professionals
- Gives broad, extremely efficient monitoring and evaluation capabilities.
- Consumes minimal assets on endpoints.
Cons
- Based on customers, the training curve for deployment could be steep.
- Some customers have discovered assist missing.
Modules
- Forcepoint DLP Endpoint for person endpoints.
- Forcepoint One CASB (cloud entry safety dealer) for fashionable SaaS purposes.
- Forcepoint One SWG (safe net gateway) for net looking and downloads.
- Forcepoint One ZTNA (zero-trust community entry) for zero-trust distant entry.
- Forcepoint DLP — Uncover for delicate information discovery, stock and classification.
- Forcepoint DLP — Community for information being despatched over networks by electronic mail and net exercise.
- Forcepoint DLP for Cloud E-mail for information being despatched by outbound emails.
- Forcepoint DLP App Information Safety API for information in customized purposes and providers.
3. Palo Alto Networks Enterprise DLP
Datasheet
Key options
- Delivered by the cloud utilizing Palo Alto next-generation firewalls and administration console.
- Single coverage engine for all DLP elements.
- Presents built-in insurance policies for compliance with quite a few legal guidelines and rules.
Professionals
- Designed to accommodate cell and hybrid workforces and SaaS software utilization.
- Customers report that setup is fast and simple.
Cons
- Assumes use of current Palo Alto Networks techniques.
- Some customers do not discover the documentation sufficiently detailed.
Modules
- Enterprise DLP modules for bodily and digital firewalls.
- Enterprise DLP module for SaaS purposes.
- Enterprise DLP modules in Palo Alto’s Prisma Cloud and Entry choices.
- E-mail DLP module for outbound electronic mail in Palo Alto’s CASB providing.
4. Proofpoint Enterprise DLP
Datasheet
Key options
- Helps integration with Proofpoint’s information discovery and classification answer to enhance Enterprise DLP’s effectivity.
- Takes a people-centric method to figuring out and stopping information loss, emphasizing context equivalent to content material, habits and threats.
- Can share personalized insurance policies and different configurations throughout Proofpoint DLP modules.
Professionals
- Extremely customizable guidelines and dictionaries.
- Comparatively straightforward to implement in comparison with different DLP merchandise, in accordance with many customers.
Cons
- Standalone electronic mail DLP requires separate dashboards for different DLP use circumstances, though Enterprise DLP provides a single, multichannel dashboard.
- Legacy UI in want of a refresh, in accordance with some customers.
Modules
- Enterprise DLP, which incorporates endpoint DLP, cloud DLP and electronic mail DLP capabilities.
- Endpoint DLP.
- E-mail DLP.
- Cloud DLP in Proofpoint’s CASB providing.
5. Symantec Information Loss Prevention by Broadcom
Datasheet
Key options
- Gives a single console for monitoring and managing all DLP elements.
- Makes use of a single coverage mechanism for all its detection and enforcement capabilities.
- Presents quite a lot of enforcement capabilities, together with integration with Microsoft Purview Data Safety.
Professionals
- Many customers discover the UI versatile and simple to make use of.
- Quick information discovery and powerful detection of coverage violations reported.
Cons
- Thought-about costlier than most different DLP instruments.
- Some customers have discovered technical assist missing. Additionally, integrations is likely to be difficult and require further assist or skilled providers.
Modules
- DLP Core Answer, a collection of 9 on-premises elements, together with DLP Endpoint Uncover, DLP Community Defend and DLP Delicate Picture Recognition.
- DLP Cloud Answer, a bundle of six cloud-based elements with two add-ons.
6. Trellix Information Safety (previously McAfee)
Datasheet
Key options
- Presents a number of strategies for shielding delicate data, together with choices to dam information from the next:
- Being saved to USB drives and different media.
- Being recorded by way of display captures.
- Being despatched to printers.
- Being posted to web sites.
- Presents integrations with third-party instruments for information classification, orchestration and incident response.
- Gives robust, versatile choices for information classification.
Professionals
- Many customers contemplate the info safety strategies extremely efficient.
- Customers just like the administration console’s UI.
Cons
- Some customers have reported configuration difficulties and a steep studying curve.
- Brokers generally run slowly or intrude with different purposes.
Modules
- Trellix DLP Uncover.
- Trellix DLP Community Forestall.
- Trellix DLP Community Monitor.
- Trellix DLP Endpoint Full.
- Trellix DLP Gadget Management.
7. Zscaler Information Safety
Datasheet
Key options
- A cloud-based safety service edge suite of services that features cloud, electronic mail and endpoint DLP.
- Gives safety and monitoring for endpoints whether or not or not they’re internet-connected.
- Doesn’t must route any person site visitors by on-premises networks for monitoring or enforcement functions.
Professionals
- Typically straightforward to deploy and handle, in accordance with customers.
- Requires no on-premises home equipment or different {hardware}; extremely scalable.
Cons
- Service largely relies on web connectivity, with lags reported.
- Some prospects discovered documentation on configurations underwhelming.
Modules
- Zscaler Precise Information Match for fingerprinting delicate information.
- Zscaler Index Doc Match for fingerprinting delicate paperwork.
- Zscaler Optical Character Recognition for classifying information in photos.
Karen Scarfone is principal marketing consultant at Scarfone Cybersecurity in Clifton, Va. She supplies cybersecurity publication consulting to organizations and was previously a senior pc scientist for NIST.