Here's our list of apps for Data Loss Prevention Software. Filters help you narrow down the results to find exactly what you’re looking for.
Filter by
Pricing model
Devices supported
Business size
Countries available
Countries where the product is available. Note: Customer support may not be accessible in that country.
Languages
Languages that the product is available in.
Sort by
87 Software options
Spectral is a cloud-based software that enables teams to ship & build software while avoiding security mistakes, misconfigurations, credential leakage and data breaches without agents, across the entire software development lifecycle.
Read more about SpectralOps
Nightfall DLP is a cloud-based data loss prevention software designed to help businesses discover, manage, classify, and protect sensitive data using machine learning technology.
Read more about Nightfall DLP
Safetica protects your sensitive data against insider threats, and breaches by detecting security incidents.
Read more about Safetica
Endpoint Protector is a data loss prevention tool which assists businesses of all sizes with data encryption and file scanning. Key features of the platform include compliance management and reporting, policy management, device control, and sensitive data identification.
Read more about Endpoint Protector
NinjaOne is the world's easiest-to-use unified IT operations platform. IT leaders use Ninja to maintain infrastructure, manage endpoints, and support end-users in a single, seamless solution that improves technician efficiency, enables automation, and improves end-user satisfaction.
Read more about NinjaOne
Acronis Cyber Protect Cloud is a unique integration of backup with comprehensive anti-malware protection and endpoint management tools. This synergy eliminates complexity, so service providers can protect customers better while keeping costs down.
Read more about Acronis Cyber Protect Cloud
Fast, secure data loss prevention software for businesses and IT providers.
Comet is a flexible, all-in-one backup platform available in 12 languages. You choose your backup environment and storage destinations.
Simple, profitable pricing. No contracts. 30-day FREE trial!
Read more about Comet Backup
Cove offers appliance-free direct-to-cloud backup for servers, workstations, and Microsoft 365 data.
Read more about Cove Data Protection
Acronis Cyber Protect is a cloud-based software that helps businesses leverage artificial intelligence (AI) technology to detect cybersecurity threats across IT assets and endpoint systems. Supervisors can perform vulnerability assessments, deploy security patches, and remotely prevent threats.
Read more about Acronis Cyber Protect
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.
Read more about Malwarebytes for Business
Google Cloud Platform is a modular-based platform providing multiple build and scale services to businesses of any size within any industry. It offers tools for document storage, data warehousing, security key enforcement, app creation, API management, AI and machine learning, live chat, and more.
Read more about Google Cloud
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.
Read more about ESET Endpoint Security
Top-rated, affordable and fast data protection solution for virtual, physical, cloud and SaaS environments.
Read more about NAKIVO Backup & Replication
Webroot SecureAnywhere Business Endpoint Protection secures users and devices across all the stages of a cyberattack.
Read more about Webroot Business Endpoint Protection
Cerebral (previously Veriato 360) allows businesses in various industries to to monitor, record & review computer, internet, and mobile phone activity.
Read more about Veriato Workforce Behavior Analytics
NeoCertified provides secure email encryption with Outlook integration for businesses of all industries, including healthcare, finance, legal & education
Read more about NeoCertified
Cypherdog Encryption (CE) provides the ability to encrypt and decrypt e-mails with attachments with confirmation of the identity of the parties to the communication.
No "trusted" third party, zero-knowledge security model, asymmetric encryption.
Read more about Cypherdog Encryption
Device control software. Enforce the exclusive use of authorized peripheral devices. Block USB portable storage devices and restrict file transfers to protect sensitive data against theft.
Read more about AccessPatrol
Teramind is an employee monitoring, insider threats detection and data loss prevention solution. Track all activity and productivity of employees, privileged users, remote workers to prevent IP and data leaks. Monitor your employees from your phone and tablet with Teramind Android App.
Read more about Teramind
Veeam Backup & Replication is business continuity and backup management software that helps businesses manage data recovery, orchestrate disaster recovery strategies, handle storage processes, and more on a centralized platform. It allows staff members to reuse backup data to handle mining, testing, and DevOps operations.
Read more about Veeam Backup & Replication
Delivery Trust is a user-friendly secure email solution to protect critical information.
Read more about Delivery Trust
Lookout is an integrated SASE solution that provides endpoint-to-cloud security, enabling remote teams to work from any location while protecting business data. It provides actionable insights that help businesses proactively identify potential threats such as ransomware, phishing attacks, and offensive web content. Lookout is designed to...
Read more about Lookout
GoodAccess is a cloud VPN that helps remote teams to securely access business systems, cloud apps and other resources. In 10 minutes you create resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.
Read more about GoodAccess
Keepit is a software company specialized in Cloud-to-Cloud data backup and recovery.
Read more about Keepit
Avanan catches the advanced attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as Office 365, G-Suite, and Slack. The platform deploys in one click via API.
Read more about Avanan
Zscaler is a cloud-based secure internet and web gateway designed to help businesses manage IT security across multiple devices, users, corporate infrastructure, and locations. Its ByteScan engine inspects each inbound and outbound byte, Secure Sockets Layer (SSL) traffic, and other inline content from within a unified platform.
Read more about Zscaler
Data loss is detrimental to your business. Regain peace of mind with Unitrends, for all-in-one data loss prevention solutions. Features include pattern recognition, predictive analytics, email alerts, and data replication and deduplication.
Read more about Unitrends Backup
BLACKbox is a data protection service that provides complete data loss protection and breach detection across laptops, desktops, on-premises servers, data centers, public cloud environments and more.
Read more about BLACKbox
BetterCloud eliminates up to 78% of SaaS management work by automating onboarding, offboarding & mid-lifecycle changes, SaaS application access & entitlements, and security policies in a multi-SaaS environment.
Read more about BetterCloud
Kasm Workspace was developed for the US Government as a secure virtualized workspace for interacting with highly sensitive data that has built in security controls and access restrictions that prevent data loss/sharing.
Read more about Kasm Workspaces
Acronis True Image is a cybersecurity and threat detection platform for applications, files, and systems that provides real-time protection from cyber threats, ransomeware, and cryptojacking attacks. The system comes with vulnreability assessments that automatically provide safety recommendation updates as well as on-demand antivirus scans from...
Read more about Acronis Cyber Protect Home Office (formerly Acronis True Image)
Google Workspace Management, Email Signature, Contact Sharing, Drive Management and more.
Patronum takes the Google Workspace (G Suite) administrators wish list in order to create a set of must-have features to transform the way Google Workspace users, groups and resources are managed.
Read more about Patronum
Built to help simplify data protection on AWS, Clumio's secure isolated backup service enables organizations to meet strict compliance requirements, put a gap between data and bad actors, backup and restore data in minutes, and optimize cloud storage.
Read more about Clumio
Content-aware policies normally reserved for standalone enterprise technology help companies of all sizes guard against insider threats. SilverSky protects small and mid-sized businesses with solutions to prevent targeted attacks, social engineering attacks and data exfiltration.
Read more about SilverSky Email Protection Suite
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking.
Read more about DriveStrike
Forcepoint DLP is a cloud-based data loss prevention software, which helps businesses identify, investigate, and mitigate potential risks to critical assets and information. Features include policy enforcement, behavioral analytics, and data discovery and classification.
Read more about Forcepoint DLP
Instant data warehousing, replication, integration, and compliance for 100+ data sources. Relational Junction unifies all of your data to one place for robust reporting and analytics. And that's not all! Our patented technology allows for the fastest possible data movement.
Read more about Relational Junction
Protect Windows systems and Office 365 Data from cyberthreats, natural disaster, human error and sabotage. On-premise and cloud backup solutions that perform automatic, scheduled backups to a variety of backup devices.
Read more about BackupAssist
Veeam Backup for Microsoft Office 365 is designed to help businesses schedule backups and restore data for various Microsoft 365 applications such as SharePoint Online, OneDrive for Business, Exchange Online, and Microsoft Teams. The application enables employees to streamline data recovery, mining, testing, filtering, and storage operations via a...
Read more about Veeam Backup for Microsoft Office 365
Netskope is an application designed to help companies secure their complete cloud app infrastructure.
Read more about Netskope Active Platform
Chimpa UEM helps manage, monitor, and secure various Android and iOS-based devices like digital signage, interactive displays, service kiosks, single-purpose devices, and more. Users can protect devices from unauthorized access, data theft, and intrusion using role-based permissions.
Read more about Chimpa
No matter where your data lives — on premise, cloud, hybrid, or SaaS — Metallic combines unmatched flexibility with proven security and industry-leading Commvault technology.
Read more about Metallic SaaS Backup & Recovery
A platform for IT infrastructure called Nfina offers cyber resilience for business continuity. Edge, computer servers, HCI appliances, hybrid cloud, storage, IaaS, HaaS, STaaS, and DRaaS are just a few of our solutions and data security services.
Read more about Nfina Technologies
INKY is an endpoint protection tool that helps businesses leverage artificial intelligence (AI) technology and machine learning capabilities to identify and prevent phishing attacks. INKY can be integrated with Microsoft Exchange, Google Workspace and other applications.
Read more about Inky
Real-time cross-platform file replication, data distribution, and file synchronization between different operating systems, different cloud providers, and different geographic sites.
Read more about EDpCloud
We simplify getting the right test data in the right place at the right time by building software that delivers masked and subsetted test data automatically (API or Portal).
Read more about DATPROF
Beyond DLP is a data protection platform to track and protect scattered data. ITsMine's software brings data protection to enterprises in a clear API-based solution.
Read more about Beyond DLP
MVISION Cloud, formerly known as McAfee Skyhigh Security Cloud, is a cloud security software that gives companies more visibility into their cloud usage while ensuring data privacy & enforcing compliance policies.
Read more about MVISION Cloud
In 15 years, Mailtrap evolved into a fully-fledged email delivery platform. It’s a reliable end-to-end solution for businesses and individuals to test, send, and control emails.
Read more about Mailtrap
Aware is a data governance, data loss prevention, and intelligence application for businesses in all industry sectors. Key features include policy creation, metadata extractions, data captures & transfers, OCR, integrations, reporting & collaboration tools, search & filters, archiving, and more.
Read more about Aware