App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Data Loss Prevention Software - Page 3

100 software options

Sponsored

Filter results

Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

EDpCloud logo

EDpCloud

5.0
(5)

Real-Time Cross-Platform Replication and Synchronisation.

learn more
Real-time cross-platform file replication, data distribution, and file synchronization between different operating systems, different cloud providers, and different geographic sites.

Read more about EDpCloud

Users also considered
SpectralOps logo

SpectralOps

4.6
(7)

Code security software for code and cloud

learn more
Spectral is a cloud-based software that enables teams to ship & build software while avoiding security mistakes, misconfigurations, credential leakage and data breaches without agents, across the entire software development lifecycle.

Read more about SpectralOps

Users also considered
Acronis Cyber Protect logo

Acronis Cyber Protect

4.7
(6)

Cloud-based threat monitoring and cybersecurity software

learn more
Acronis Cyber Protect presents a groundbreaking strategy for safeguarding against cyber threats by merging data protection and cybersecurity.

Read more about Acronis Cyber Protect

Users also considered
Beyond DLP logo

Beyond DLP

4.8
(5)

Product Data Protection Beyond Boundaries

learn more
Beyond DLP is a data protection platform to track and protect scattered data. ITsMine's software brings data protection to enterprises in a clear API-based solution.

Read more about Beyond DLP

Users also considered
DATPROF logo

DATPROF

4.6
(5)

Test Data Simplified

learn more
DATPROF simplifies getting the right test data in the right place at the right time by building software that delivers masked and subsetted test data automatically (API or Portal).

Read more about DATPROF

Users also considered
Metallic SaaS Backup & Recovery logo

Metallic SaaS Backup & Recovery

4.0
(8)

Simple, smart, secure data protection as a service

learn more
No matter where your data lives — on premise, cloud, hybrid, or SaaS — Metallic combines unmatched flexibility with proven security and industry-leading Commvault technology.

Read more about Metallic SaaS Backup & Recovery

Users also considered
MVISION Cloud logo

MVISION Cloud

4.8
(4)

Cloud security & enablement

learn more
MVISION Cloud, formerly known as McAfee Skyhigh Security Cloud, is a cloud security software that gives companies more visibility into their cloud usage while ensuring data privacy & enforcing compliance policies.

Read more about MVISION Cloud

Users also considered
Exabeam logo

Exabeam

5.0
(3)

Analytics and Automation for Accelerated Threat Detection

learn more
Exabeam is an analytics and automation solution for accelerated threat detection. It helps security teams add intelligence to their existing security tools – including SIEMs, XDRs, cloud data lakes, and hundreds of other business and security products.

Read more about Exabeam

Users also considered
CleanCloud by SEK logo

CleanCloud by SEK

5.0
(3)

A cloud computing management tool

learn more
CleanCloud is a cloud computing management tool that offers integration with Azure, AWS, and Google Cloud. It provides an overview of vulnerable items, analyzes all cloud resources, monitors critical assets, and performs audits that detail each identified event. Available in Portuguese and English.

Read more about CleanCloud by SEK

Users also considered
Inky logo

Inky

4.2
(5)

The most effective solution when fighting phishing attacks.

learn more
INKY is an endpoint protection tool that helps businesses leverage artificial intelligence (AI) technology and machine learning capabilities to identify and prevent phishing attacks. INKY can be integrated with Microsoft Exchange, Google Workspace and other applications.

Read more about Inky

Users also considered
Access Rights Manager logo

Access Rights Manager

4.7
(3)

Audit management for access rights

learn more
SolarWinds Access Rights Manager (ARM) is an access governance solution that manages and audit access rights across any IT infrastructure to mitigate insider threats and data loss.

Read more about Access Rights Manager

Users also considered
SafeGuard Cyber logo

SafeGuard Cyber

5.0
(2)

Online communication channel cybersecurity software.

learn more
SafeGuard is a cybersecurity software for business communication channels.

Read more about SafeGuard Cyber

Users also considered
iBoysoft Data Recovery for Mac  logo

iBoysoft Data Recovery for Mac

4.5
(2)

A versatile Mac data recovery tool to retrieve data

learn more
iBoysoft Data Recover for Mac is an all-in-one data recovery program released to recover video files, audio files, image files, Word documents, and more from an HDD, SSD, SD card, USB flash drive, and the like.

Read more about iBoysoft Data Recovery for Mac

Users also considered
Aware logo

Aware

3.5
(4)

Enterprise Collaboration Security, Compliance, and Insights

learn more
Aware is a data governance, data loss prevention, and intelligence application for businesses in all industry sectors. Key features include policy creation, metadata extractions, data captures & transfers, OCR, integrations, reporting & collaboration tools, search & filters, archiving, and more.

Read more about Aware

Users also considered
Tiger Data Recovery logo

Tiger Data Recovery

5.0
(1)

Data recovery software.

learn more
Tiger Data Recovery is a software that can run on both mac OS and Windows platforms, and was specifically created to help users recover data on iOS devices.

Read more about Tiger Data Recovery

Users also considered
SOS Click logo

SOS Click

5.0
(1)

Microsoft Office add-on backup software

learn more
Save your work easily in multiple places using SOS Click for Microsoft Office. This Microsoft Office companion will make sure your work is always with you both locally and remotely so you never lose it. With one click, your work is saved everywhere ensuring peace of mind.

Read more about SOS Click

Users also considered
Elastio Cyber Recovery logo

Elastio Cyber Recovery

5.0
(1)

Data Protection and Cyber Recovery as a Service

learn more
Elastio Cyber Recovery is agentless, leverages AWS snapshots, and can ingest and secure existing snapshots. It provides real-time visibility into the recovery health of applications and enables teams to manage service-level objectives confidently. Teams are notified instantly of risks to application recovery health. It deeply inspects each backup for ransomware and malware in addition to air-gapped and immutable backups.

Read more about Elastio Cyber Recovery

Users also considered
Secure Remote Worker logo

Secure Remote Worker

5.0
(1)

Secure Endpoints for Remote & In-Office Environments

learn more
Secure Remote Worker addresses the challenges faced by BPOs & Contact Centers enabling them to create a secure and compliant remote working environment that allows them to scale faster.

Read more about Secure Remote Worker

Users also considered
Appaegis Isolation Access Cloud logo

Appaegis Isolation Access Cloud

(0)

Data Centric Zero Trust

learn more
Appaegis extends zero trust from application access to data access governance to reduce risk, apply real-time control to access, and provide granular visibility to access and availability of critical assets.

Read more about Appaegis Isolation Access Cloud

Users also considered
Fasoo Data Radar logo

Fasoo Data Radar

(0)

Data discovery and classification platform

learn more
Organizations can strengthen and expand their security and privacy infrastructure for unstructured data by identifying, categorizing, and regulating sensitive data without complicated business rules.

Read more about Fasoo Data Radar

Users also considered
iManage Threat Manager logo

iManage Threat Manager

(0)

Advanced threat detection and monitoring

learn more
iManage Threat Manager helps organizations protect sensitive information from internal and external threats using innovative technology to continuously monitor, alert and secure critical knowledge work. It provides sophisticated threat detection, intervention, analytics, and data governance functionalities to protect sensitive content with compliance monitoring.

Read more about iManage Threat Manager

Users also considered
iQ.Suite aaS logo

iQ.Suite aaS

(0)

Enterprise email management & security solution for M365

learn more
iQ.Suite aaS is a cloud-based enterprise email management and security solution for companies using Microsoft 365. It offers a comprehensive set of features including content-driven encryption, insider threat detection, wrong recipient protection, and more. iQ.Suite aaS offers malware and spam detection to minimize risk and secure emails from unauthorized access. Additionally, to ensure company policies are met, this solution can be used to apply business policies to email communications.

Read more about iQ.Suite aaS

Users also considered
CipherTrust Data Security Platform logo

CipherTrust Data Security Platform

(0)

Data security solution

learn more
CipherTrust Data Security Platform is a comprehensive data security solution that is deployed in the cloud. It provides protection for sensitive data and software and offers a variety of features that can be tailored to the specific needs of businesses.

Read more about CipherTrust Data Security Platform

Users also considered
Symantec Cloud Secure Web logo

Symantec Cloud Secure Web

(0)

Cloud-based web security service solution

learn more
Symantec Cloud Secure Web is a cloud-based web security service that provides comprehensive internet security and information protection processes for companies worldwide. WSS is available in English, Japanese, and Chinese and enforces security policies for every user, regardless of their location or device, ensuring that business data is always protected.

Read more about Symantec Cloud Secure Web

Users also considered
euBackups logo

euBackups

(0)

Cloud-based backup and data loss prevention software

learn more
euBackups is a cloud-based software designed to help organizations backup data stored across laptops, virtual machines and datacenters to recover lost data. It enables IT professionals to monitor backup processes for multiple devices from a unified control panel and restore corrupted data.

Read more about euBackups

Users also considered