Related Products
|
||||||
About
Check Point Data Loss Prevention (DLP) pre-emptively protects your business from unintentional loss of valuable and sensitive information. Monitor data movement and empower your employees to work with confidence, while staying compliant with regulations and industry standards. Tracks and controls any type or format of sensitive information in motion, such as e-mail, web browsing and file sharing services. Educates and alerts end-users on proper data handling without involving IT/security teams, and allows for real-time user remediation. Centrally managed across your entire IT infrastructure from a single console. Leverages out-of-the-box best practice policies.
|
About
The modern workforce is more mobile than ever, accessing the network from any place on any device, at any time. Endpoint antivirus and VPN technologies aren’t enough to stop advanced threats. By extending next-generation firewall capabilities through the GlobalProtect subscription, you can gain greater visibility into all traffic, users, devices, and applications. With GlobalProtect, organizations can extend consistent security policies to all users, while eliminating remote access blindspots and strengthening security. GlobalProtect safeguards your mobile workforce by using the capabilities of your Next-Generation Firewall to inspect all traffic—incoming and outgoing. Enable always-on IPsec/SSL VPN connection between a variety of endpoints and operating systems to deliver transparent access to sensitive data without risk. Quarantine compromised devices with immutable characteristics on internal and external networks.
|
About
Discover risks, educate employees, enforce policies and prevent data loss with Reveal. Your people, users and data are dynamic: constantly changing and moving. In the hybrid world of work people create, manipulate and share data dynamically, across endless channels. The opportunities for data leaks are infinite and your people are the main target— securing your organization starts with securing your people. Reveal Cloud is cloud-native, so it is simple to buy, install, and use. You get automated protection from day 1 with out-of-the-box policies and machine learning, with smart remediation that works even if computers are disconnected from the network. The lightweight agent makes sure your data and employees are protected at all times without slowing you down. Continuous monitoring provides visibility into user behavior, data access, and system use. Security operators can search on file, USB device, connection, browser, application events, and more.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
IT security teams
|
Audience
Remote workforces that need a secure VPN and endpoint protection solution
|
Audience
Companies that want to protect their data
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationCheck Point Software Technologies
Founded: 1993
Israel
www.checkpoint.com/products/data-loss-prevention/
|
Company InformationPalo Alto Networks
Founded: 2005
United States
www.paloaltonetworks.com/products/globalprotect
|
Company InformationNext DLP
Founded: 2016
United Kingdom
www.nextdlp.com/platform
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
|
|
||||
|
|
||||||
|
|
|
|||||
|
|
||||||
Categories |
Categories |
Categories |
||||
Data Loss Prevention Features
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
|
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Data Loss Prevention Features
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
Endpoint Detection and Response (EDR) Features
Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis
Endpoint Protection Features
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Vulnerability Management Features
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
|
|||||
Integrations
LoginTC
Palo Alto Networks Strata
SecureIdentity DLP
SecureIdentity IAM
SecureIdentity IRAD
SecureIdentity MFA
SecureIdentity PAM
Siberson Veriket Data Classification
|
Integrations
LoginTC
Palo Alto Networks Strata
SecureIdentity DLP
SecureIdentity IAM
SecureIdentity IRAD
SecureIdentity MFA
SecureIdentity PAM
Siberson Veriket Data Classification
|
Integrations
LoginTC
Palo Alto Networks Strata
SecureIdentity DLP
SecureIdentity IAM
SecureIdentity IRAD
SecureIdentity MFA
SecureIdentity PAM
Siberson Veriket Data Classification
|
||||
|
|
|
|