App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Data Loss Prevention Software

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

2.2M+ verified reviews. Learn more

14+ years of expertise. Learn more

2M+ monthly users.

Filter 116 results

Features



Pricing model




User rating


Sort by
Metomic logo

DLP tool for SaaS applications

visit website
Reviews Sentiment
ic-pricetag

No reviews

Positive Reviews
ic-pricetag

No reviews

Functionality
Ease of Use

0

Features

0

Description

Metomic is a DLP tool that helps businesses discover and control sensitive data across SaaS applications. The platform integrates with third-party systems including Slack, Google Apps, Jira, and more to start scanning for confidential information such as PII and PHI.Read more about Metomic
Pros and Cons from Metomic users
No pros & cons found
Safetica logo

Data loss prevention and insider threat protection solution

visit website
Reviews Sentiment
 
 
3-4
5
Positive Reviews
Functionality
Ease of Use

4.5

Features

4.7

Description

Safetica protects your sensitive data against insider threats, and breaches by detecting security incidents.Read more about Safetica
Pros and Cons from Safetica users
avatar
avatar
avatar
+15
Endpoint Protector logo

Data loss prevention and endpoint protection tool

visit website
Reviews Sentiment
 
 
3-4
5
Positive Reviews
Functionality
Ease of Use

4

Features

4.3

Description

Endpoint Protector is a data loss prevention tool which assists businesses of all sizes with data encryption and file scanning. Key features of the platform include compliance management and reporting, policy management, device control, and sensitive data identification.Read more about Endpoint Protector
Pros and Cons from Endpoint Protector users
No pros & cons found
NinjaOne logo

NinjaOne

The Easiest-to-Use Unified IT Operations Solution

visit website
Reviews Sentiment
 
 
 
1-2
3-4
5
Positive Reviews
Functionality
Ease of Use

4.7

Features

4.6

Description

NinjaOne is the world's easiest-to-use unified IT operations platform. IT leaders use Ninja to maintain infrastructure, manage endpoints, and support end-users in a single, seamless solution that improves technician efficiency, enables automation, and improves end-user satisfaction.Read more about NinjaOne
Pros and Cons from NinjaOne users
avatar
avatar
avatar
+15
ManageEngine DataSecurity Plus logo

Software for managing data visibility and security

visit website
Reviews Sentiment
 
3-4
Positive Reviews
Functionality
Ease of Use

4.5

Features

4

Description

ManageEngine DataSecurity Plus is a comprehensive platform designed to provide organizations with unified data visibility and security to help businesses protect their sensitive data and mitigate risks effectively.Read more about ManageEngine DataSecurity Plus
Pros and Cons from ManageEngine DataSecurity Plus users
No pros & cons found
Cove Data Protection logo

Cloud-first data protection as a service

visit website
Reviews Sentiment
 
 
3-4
5
Positive Reviews
Functionality
Ease of Use

4.5

Features

4.5

Description

Cove Data Protection is a cloud-first backup and disaster recovery service for servers, workstations, and Microsoft 365™, all managed from a multitenant web-based dashboard. Read more about Cove Data Protection
Pros and Cons from Cove Data Protection users
avatar
avatar
+15
Malwarebytes for Business logo

Complete cybersecurity software for businesses

learn more
Reviews Sentiment
 
 
 
1-2
3-4
5
Positive Reviews
Functionality
Ease of Use

4.7

Features

4.6

Description

Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.Read more about Malwarebytes for Business
Pros and Cons from Malwarebytes for Business users
avatar
avatar
avatar
+15
Google Cloud logo

Modular platform for computing, hosting, storage & more

learn more
Reviews Sentiment
 
 
 
1-2
3-4
5
Positive Reviews
Functionality
Ease of Use

4.4

Features

4.6

Description

Google Cloud Platform is a modular-based platform providing multiple build and scale services to businesses of any size within any industry. It offers tools for document storage, data warehousing, security key enforcement, app creation, API management, AI and machine learning, live chat, and more.Read more about Google Cloud
Pros and Cons from Google Cloud users
avatar
avatar
avatar
+15
ESET Endpoint Security logo

Network security, network monitoring & endpoint protection

learn more
Reviews Sentiment
 
 
 
1-2
3-4
5
Positive Reviews
Functionality
Ease of Use

4.5

Features

4.6

Description

ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.Read more about ESET Endpoint Security
Pros and Cons from ESET Endpoint Security users
avatar
avatar
avatar
+15
NAKIVO Backup & Replication logo

Fast, affordable and top-rated data protection.

learn more
Reviews Sentiment
 
 
3-4
5
Positive Reviews
Functionality
Ease of Use

4.8

Features

4.7

Description

Fast, affordable and top-rated data protection solution for virtual, physical, cloud and SaaS environments.Read more about NAKIVO Backup & Replication
Pros and Cons from NAKIVO Backup & Replication users
avatar
avatar
+15
Webroot Business Endpoint Protection logo

Smarter Cybersecurity Services & Solutions

learn more
Reviews Sentiment
 
 
 
1-2
3-4
5
Positive Reviews
Functionality
Ease of Use

4.6

Features

4.4

Description

Webroot SecureAnywhere Business Endpoint Protection secures users and devices across all the stages of a cyberattack.Read more about Webroot Business Endpoint Protection
Pros and Cons from Webroot Business Endpoint Protection users
avatar
avatar
+15
Backblaze B2 Cloud Storage logo

Always-hot cloud storage to store, manage, and protect data

learn more
Reviews Sentiment
 
 
 
1-2
3-4
5
Positive Reviews
Functionality
Ease of Use

4.7

Features

4.5

Description

A leading specialized cloud provider that makes it easy for businesses to store, use, and protect their data. Over 100K customers in 175 countries use B2 Cloud Storage to host content, build & run applications, manage media, back up & archive data, and protect and recover from ransomware attacks.Read more about Backblaze B2 Cloud Storage
Pros and Cons from Backblaze B2 Cloud Storage users
avatar
avatar
avatar
+15
NeoCertified logo

Secure email for confidential & sensitive documents

learn more
Reviews Sentiment
 
 
3-4
5
Positive Reviews
Functionality
Ease of Use

4.8

Features

4.8

Description

NeoCertified provides secure email encryption with Outlook integration for businesses of all industries, including healthcare, finance, legal & educationRead more about NeoCertified
Pros and Cons from NeoCertified users
+15
AccessPatrol logo

Device control software - secure data from illicit transfers

learn more
Reviews Sentiment
 
 
3-4
5
Positive Reviews
Functionality
Ease of Use

4.7

Features

4.5

Description

Device control software. Enforce the exclusive use of authorized peripheral devices. Block USB portable storage devices and restrict file transfers to protect sensitive data against theft.Read more about AccessPatrol
Pros and Cons from AccessPatrol users
avatar
avatar
avatar
+11
GoodAccess logo

Cloud VPN with identity-based access control in 10 minutes.

learn more
Reviews Sentiment
 
 
3-4
5
Positive Reviews
Functionality
Ease of Use

4.9

Features

4.8

Description

GoodAccess is a cloud VPN that helps remote teams to securely access business systems, cloud apps and other resources. In 10 minutes you create resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.Read more about GoodAccess
Pros and Cons from GoodAccess users
avatar
avatar
+15
Cypherdog Encryption logo

One click. Complete protection.

learn more
Reviews Sentiment
 
 
3-4
5
Positive Reviews
Functionality
Ease of Use

4.8

Features

4.8

Description

Cypherdog Encryption (CE) provides the ability to encrypt and decrypt e-mails with attachments with confirmation of the identity of the parties to the communication. No "trusted" third party, zero-knowledge security model, asymmetric encryption.Read more about Cypherdog Encryption
Pros and Cons from Cypherdog Encryption users
avatar
avatar
avatar
+15
Veeam Data Platform logo

Business continuity and backup management software

learn more
Reviews Sentiment
 
 
 
1-2
3-4
5
Positive Reviews
Functionality
Ease of Use

4.5

Features

4.7

Description

Veeam Backup & Replication is business continuity and backup management software that helps businesses manage data recovery, orchestrate disaster recovery strategies, handle storage processes, and more on a centralized platform. It allows staff members to reuse backup data to handle mining, testing, and DevOps operations.Read more about Veeam Data Platform
Pros and Cons from Veeam Data Platform users
avatar
avatar
avatar
+15
Iperius Backup logo

Backup solution for databases, servers and workstations

learn more
Reviews Sentiment
 
 
 
1-2
3-4
5
Positive Reviews
Functionality
Ease of Use

4.5

Features

4.4

Description

Iperius Backup is a data backup and recovery suite which helps small to large businesses with backups for image files and data restoration. Key features include hard drive cloning, data synchronization, scheduling, user authentication, backup verification, and file transfer.Read more about Iperius Backup
Pros and Cons from Iperius Backup users
avatar
+15