Data Loss Prevention Features

Read what people say are the most valuable features of the solutions they use.
Arun Subramaniam says in a Symantec Data Loss Prevention review
Cyber Security Engineer at a tech services company with 10,001+ employees
The data matching features are the most valuable due to the easy policy setup and implementation. View full review »
Mahmoud Hussein says in a Symantec Data Loss Prevention review
Private Security Consultant at a tech services company with 11-50 employees
The most valuable feature of this solution is endpoint security. The network discovery is very helpful. View full review »
Solution Consultant at Infodata Professional Services
The fingerprinting technology is the solution's most valuable feature. It's unique to Forcepoint. View full review »
Oliver Rodrigues says in a McAfee ePolicy Orchestrator review
Senior Network Security Planning at Ooredoo Kuwait
The most valuable features of this solution are the antivirus and the DLP. The interface, dashboard, and reporting are all very good. View full review »
JonathanChawatama says in a McAfee ePolicy Orchestrator review
IT Security Consultant at ZOL Zimbabwe
The most valuable feature of this solution is the ability to configure and deploy everything from a single, web-based interface. View full review »
Andrei Bigdan says in a GTB Technologies Inspector review
Executive Manager at B2B-Solutions LLC
The most valuable feature is the Endpoint Protector. It is the most lightweight in comparison to other competitors. The more documents fingerprinted - the bigger database storage is needed. It's OK for GTB Inspector itself. On the other hand Endpoint Protector has to load this database into memory and it could slow endpoint performance in case of low memory. To avoid such impact GTB applies on endpoints additional hash algorithm for database with fingerprints to make it smaller ten times and keep detection by fingerprints with high level. Another feature is that Endpoint Protector can stop everything, even if it's not connected to the management console. View full review »
Security Specialist at Perth Airport
Once you understand how to use it, it becomes easy to use. View full review »
‚ÄéHead: Group Legal at Optiflex
I'm able to track everyone who is trying to send information outside the environment and to know if they are not supposed to be sending it. I'm also able to see the people who are accessing or maybe try to access the information they are not supposed to be accessing based on their level of classification. It gives me overall control of who has got access to what and at what point and who can do what with specific information. View full review »
Owner at a tech services company with 11-50 employees
One of the features I find most valuable is that it is very easy to install. Secondly, it has a very deep reporting mechanism, so it can give you a very detailed report. Then, thirdly, it gives you protection, either at the endpoint, at the network level, and also at the server level. Which also includes the endpoint. It can also easily be integrated into the data cloud protection and be integrated with cloud protection software or application. This gives us wide visibility and control over our network, for both inbound and outbound data. Another valuable feature is that it provides integration to things like Cloud Access Security Broker, which provides security around cloud applications. It also gives integration with SIEM solution, which means that from a SIEM, you'll be able to actually see what is happening around your data. It has some very unique capabilities, such as optical character recognition and custom encryption identification. It has an out of the box library of templates, which enables you to easily set it up and deploy, making it possible for you to identify and stop data theft. You can even integrate it to your email if you want to extend it, where you can actually have DLP around the email and not just around the web and network. View full review »
Information Security Annalists at a consultancy with 10,001+ employees
The most valuable features of this solution are the micro DLP features. There are policies in place if I want to restrict the copying of records to, for example, a USB drive. View full review »
IT Security Engineer at a tech services company with 1-10 employees
The features I like most about this solution is the endpoint modules because it gives us the protection we need. View full review »
Ernesto Martinez says in a Digital Guardian review
Principal Consultant at a tech services company with 51-200 employees
What our customers find most valuable in Digital Guardian is the rule sets that they have for data classification. They are already set up to search for PII data, which is basically the personal identifying information for our customers. So you can quickly use their classification engine, or rule set, to set up inspection rules to determine whether data has PII, like social security numbers, date of birth, addresses and things like that. View full review »
informat758226 says in a McAfee ePolicy Orchestrator review
Information Security Analyst at a tech services company
We use McAfee Threat Prevention and McAfee Adaptive Threat Prevention for protection against viruses. There is also exploit-prevention support. The McAfee Web Control module is one of the best solutions to protect users from online threats. The features we use are: * DXL (Data Exchanger Layer) * Threat prevention * ATP (Adaptive Threat Protection) * Web Control * Firewall View full review »
IT Manager at a government with 10,001+ employees
The ease of configuration was probably one of its biggest selling points. I know that we took a long time to get it configured properly but it just takes a while. It's a big tool and it does a lot of work. View full review »
Murad Gurbanov says in a Digital Guardian review
Presales Specialist at bc solutions
Digital Guardian has cloud correlation servers which give you visibility. Works like EDR and the correlation servers are like a perfect instrument for security analysts. The agent is a powerful thing because it is powered on the kernel site. You can control applications and data flow. You can use it with EDR solutions. View full review »
Shayanthan Karunaharan says in a Symantec Data Loss Prevention review
Engineer - Information Security at a tech services company with 11-50 employees
They have a feature on the management side called the document indexer. If you have a unique document with many near-identical versions, which have one or several values that change, while the rest of the content stays the same. You can collect 50 of those documents and put them into this feature of the Symantec DLP system. It will compress them and create a profile specifically for that document. For example, if you are getting a daily performance report for your company, each report will be completely the same, except some of the numerical values may change. I can collect 50 documents from the last 50 days and put them into the system to compress the documents and create a profile. I can then put this in a policy that will monitor only those documents. If an employee tries to send those documents outside without authorization, the system will block the documents. I have found the data indexer in Symantec, but I didn't find it in McAfee. View full review »
The most valuable feature is the total network, end-to-end, malware protection. View full review »
I-Security Engineer at NHQ Distributions Ltd
We use several components in this solution, including Endpoint Discovery, CEIT technology, Network Discovery, and NT integration. The most valuable feature in this solution is the support for templates. View full review »
Technical Engineer at a tech vendor with 11-50 employees
We find the malware scanning and intrusion detection most valuable for our server management requirements. We can find out who is on our servers and what they have done. View full review »
VP Technology at RAH Infotech
We receive a lot of insights from this product. View full review »
Network Security Specialist at SEFISA
I was working with other customers with the integration of the solution of web protection with DLP and it allows the same agent to bring it and you can protect them and in some cases share web pages or emails. The other thing is that they already have a custom template so you don't have to compute that. View full review »
Principal Consultant at Design Consulting Inc
The synchronize application detection policies have been very good. We are able to use it with the cloud service connectors and manage it on the cloud. View full review »
IT Manager at Birla Century
We are able to check the log and keep records. View full review »
System Administrator at a tech services company with 1,001-5,000 employees
In DLP one of the most valuable features is that you can check attachments. In addition, it gives me the data such that, if someone is using a browser and email, I'm able to figure out who is sending the data. View full review »
Senior Technical Engineer at a tech consulting company with 201-500 employees
* The administration part is pretty simple. * Detection is pretty accurate. View full review »
Sign Up with Email