Best Enterprise Data Loss Prevention (DLP) Software

Lauren Worth
LW
Researched and written by Lauren Worth

Products classified in the overall Data Loss Prevention (DLP) category are similar in many regards and help companies of all sizes solve their business problems. However, enterprise business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Enterprise Business Data Loss Prevention (DLP) to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2's buying advisors to find the right solutions within the Enterprise Business Data Loss Prevention (DLP) category.

In addition to qualifying for inclusion in the Data Loss Prevention (DLP) Software category, to qualify for inclusion in the Enterprise Business Data Loss Prevention (DLP) Software category, a product must have at least 10 reviews left by a reviewer from an enterprise business.

Show More
Show Less

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

1 filter applied
Clear All

16 Listings in Enterprise Data Loss Prevention (DLP) Software Available

  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proo

    Users
    No information available
    Industries
    • Retail
    • Financial Services
    Market Segment
    • 73% Enterprise
    • 25% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Proofpoint DLP is a tool designed to protect email and data loss, with a focus on preventing sensitive data from being shared externally and customizing policies to suit specific needs.
    • Users frequently mention the user-friendly interface, the centralized platform, the ability to work across multiple applications, and the effectiveness of the policies in preventing sensitive data from leaving the company.
    • Reviewers experienced a number of false positives, a steep learning curve for understanding the policies, a need for a skilled security team and strong infrastructure to fully leverage it, and a challenging initial setup process.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Proofpoint Enterprise Data Loss Prevention (DLP) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    10
    Data Protection
    8
    Email Security
    7
    Integrations
    6
    Security
    5
    Cons
    False Positives
    5
    Difficult Setup
    4
    Learning Difficulty
    4
    Complex Configuration
    3
    Complexity
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Enterprise Data Loss Prevention (DLP) features and usability ratings that predict user satisfaction
    8.6
    Ease of Use
    Average: 8.9
    8.3
    Access Control
    Average: 8.6
    8.4
    Compliance
    Average: 9.0
    8.9
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    31,106 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,020 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proo

Users
No information available
Industries
  • Retail
  • Financial Services
Market Segment
  • 73% Enterprise
  • 25% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Proofpoint DLP is a tool designed to protect email and data loss, with a focus on preventing sensitive data from being shared externally and customizing policies to suit specific needs.
  • Users frequently mention the user-friendly interface, the centralized platform, the ability to work across multiple applications, and the effectiveness of the policies in preventing sensitive data from leaving the company.
  • Reviewers experienced a number of false positives, a steep learning curve for understanding the policies, a need for a skilled security team and strong infrastructure to fully leverage it, and a challenging initial setup process.
Proofpoint Enterprise Data Loss Prevention (DLP) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
10
Data Protection
8
Email Security
7
Integrations
6
Security
5
Cons
False Positives
5
Difficult Setup
4
Learning Difficulty
4
Complex Configuration
3
Complexity
2
Proofpoint Enterprise Data Loss Prevention (DLP) features and usability ratings that predict user satisfaction
8.6
Ease of Use
Average: 8.9
8.3
Access Control
Average: 8.6
8.4
Compliance
Average: 9.0
8.9
Data Visibility
Average: 8.8
Seller Details
Company Website
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
31,106 Twitter followers
LinkedIn® Page
www.linkedin.com
5,020 employees on LinkedIn®
(577)4.5 out of 5
9th Easiest To Use in Data Loss Prevention (DLP) software
View top Consulting Services for Check Point Next Generation Firewalls (NGFWs)
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Strengthen Your Security with Check Point Gateways and Firewalls Check Point Hybrid Mesh Network Security is a comprehensive cybersecurity solution designed to protect networks from sophisticated

    Users
    • Network Security Engineer
    • Network Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 42% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Check Point Next Generation Firewalls (NGFWs) is a network security solution that combines advanced threat prevention, application control, and deep packet inspection in a single, unified platform.
    • Users frequently mention the product's robust security features, high performance, and the convenience of its centralized management console, SmartConsole, which simplifies policy configuration and monitoring.
    • Reviewers mentioned the high initial cost, complexity of the licensing model, steep learning curve for new administrators, and occasional slow performance in the management console as drawbacks.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Next Generation Firewalls (NGFWs) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    101
    Threat Detection
    86
    Features
    80
    Network Security
    76
    Centralized Management
    66
    Cons
    Expensive
    71
    Complexity
    56
    Complex Setup
    49
    Slow Performance
    45
    Difficult Learning Curve
    43
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Next Generation Firewalls (NGFWs) features and usability ratings that predict user satisfaction
    8.5
    Ease of Use
    Average: 8.9
    8.8
    Access Control
    Average: 8.6
    8.8
    Compliance
    Average: 9.0
    8.6
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,026 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,356 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Strengthen Your Security with Check Point Gateways and Firewalls Check Point Hybrid Mesh Network Security is a comprehensive cybersecurity solution designed to protect networks from sophisticated

Users
  • Network Security Engineer
  • Network Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 42% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Check Point Next Generation Firewalls (NGFWs) is a network security solution that combines advanced threat prevention, application control, and deep packet inspection in a single, unified platform.
  • Users frequently mention the product's robust security features, high performance, and the convenience of its centralized management console, SmartConsole, which simplifies policy configuration and monitoring.
  • Reviewers mentioned the high initial cost, complexity of the licensing model, steep learning curve for new administrators, and occasional slow performance in the management console as drawbacks.
Check Point Next Generation Firewalls (NGFWs) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
101
Threat Detection
86
Features
80
Network Security
76
Centralized Management
66
Cons
Expensive
71
Complexity
56
Complex Setup
49
Slow Performance
45
Difficult Learning Curve
43
Check Point Next Generation Firewalls (NGFWs) features and usability ratings that predict user satisfaction
8.5
Ease of Use
Average: 8.9
8.8
Access Control
Average: 8.6
8.8
Compliance
Average: 9.0
8.6
Data Visibility
Average: 8.8
Seller Details
Company Website
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,026 Twitter followers
LinkedIn® Page
www.linkedin.com
8,356 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Netskope is the leader in cloud security — we help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our Cloud XD™ technology targets and controls activit

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 59% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Netskope One Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Security
    6
    Visibility
    5
    Easy Integrations
    4
    Efficiency
    4
    Cons
    Complex Configuration
    5
    Complex Implementation
    4
    Complexity
    3
    Difficult Learning
    3
    Difficult Learning Curve
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Netskope One Platform features and usability ratings that predict user satisfaction
    8.5
    Ease of Use
    Average: 8.9
    8.3
    Access Control
    Average: 8.6
    8.0
    Compliance
    Average: 9.0
    8.7
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Netskope
    Year Founded
    2012
    HQ Location
    Santa Clara, CA
    Twitter
    @Netskope
    11,283 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,131 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Netskope is the leader in cloud security — we help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our Cloud XD™ technology targets and controls activit

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 59% Enterprise
  • 32% Mid-Market
Netskope One Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Security
6
Visibility
5
Easy Integrations
4
Efficiency
4
Cons
Complex Configuration
5
Complex Implementation
4
Complexity
3
Difficult Learning
3
Difficult Learning Curve
3
Netskope One Platform features and usability ratings that predict user satisfaction
8.5
Ease of Use
Average: 8.9
8.3
Access Control
Average: 8.6
8.0
Compliance
Average: 9.0
8.7
Data Visibility
Average: 8.8
Seller Details
Seller
Netskope
Year Founded
2012
HQ Location
Santa Clara, CA
Twitter
@Netskope
11,283 Twitter followers
LinkedIn® Page
www.linkedin.com
3,131 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Varonis is fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and de

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 65% Enterprise
    • 30% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Varonis Data Security Platform is a solution that provides visibility into data access and user behavior across file shares, cloud storage, and sensitive repositories.
    • Reviewers like the platform's ability to identify overexposed data, excessive permissions, and abnormal access patterns, and appreciate its alerting, audit trails, and behavioral analytics that improve incident response time and help investigate insider risk, ransomware activity, and data exfiltration attempts.
    • Users mentioned that initial deployment and tuning can be resource intensive, especially in large or complex environments, and that some alerts require careful baselining to reduce noise, with reporting customization taking time to master.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Varonis Data Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    22
    Data Protection
    21
    Detailed Analysis
    19
    Features
    19
    Ease of Use
    18
    Cons
    Complexity
    18
    Learning Curve
    10
    Learning Difficulty
    10
    Expensive
    8
    Setup Difficulty
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Varonis Data Security Platform features and usability ratings that predict user satisfaction
    8.2
    Ease of Use
    Average: 8.9
    9.1
    Access Control
    Average: 8.6
    9.0
    Compliance
    Average: 9.0
    8.8
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Varonis
    Company Website
    Year Founded
    2005
    HQ Location
    New York, US
    Twitter
    @varonis
    6,378 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,729 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Varonis is fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and de

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 65% Enterprise
  • 30% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Varonis Data Security Platform is a solution that provides visibility into data access and user behavior across file shares, cloud storage, and sensitive repositories.
  • Reviewers like the platform's ability to identify overexposed data, excessive permissions, and abnormal access patterns, and appreciate its alerting, audit trails, and behavioral analytics that improve incident response time and help investigate insider risk, ransomware activity, and data exfiltration attempts.
  • Users mentioned that initial deployment and tuning can be resource intensive, especially in large or complex environments, and that some alerts require careful baselining to reduce noise, with reporting customization taking time to master.
Varonis Data Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
22
Data Protection
21
Detailed Analysis
19
Features
19
Ease of Use
18
Cons
Complexity
18
Learning Curve
10
Learning Difficulty
10
Expensive
8
Setup Difficulty
8
Varonis Data Security Platform features and usability ratings that predict user satisfaction
8.2
Ease of Use
Average: 8.9
9.1
Access Control
Average: 8.6
9.0
Compliance
Average: 9.0
8.8
Data Visibility
Average: 8.8
Seller Details
Seller
Varonis
Company Website
Year Founded
2005
HQ Location
New York, US
Twitter
@varonis
6,378 Twitter followers
LinkedIn® Page
www.linkedin.com
2,729 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Harmony Email & Collaboration, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.

    Users
    • IT Manager
    • Systems Administrator
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 59% Mid-Market
    • 24% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Check Point Anti-Spam & Email Security is a tool designed for the detection and prevention of spam and phishing attacks, integrating with platforms like Microsoft 365 and providing real-time threat prevention.
    • Reviewers frequently mention the product's seamless integration with platforms like Microsoft 365, its user-friendly interface, and its effective blocking of spam, phishing, and malicious emails, which enhances productivity and reduces IT overhead.
    • Reviewers mentioned issues such as the limited range of supported email platforms, the need for more granular control over policies and rules, and the occasional flagging of secure emails as suspicious, which can slow down workflows and require manual review.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Harmony Email & Collaboration Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Email Security
    94
    Security
    83
    Protection
    74
    Ease of Use
    50
    Phishing Protection
    45
    Cons
    False Positives
    29
    Complexity
    23
    Complex Setup
    22
    Limited Features
    18
    Configuration Difficulties
    17
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Harmony Email & Collaboration features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 8.9
    9.0
    Access Control
    Average: 8.6
    9.2
    Compliance
    Average: 9.0
    9.1
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,026 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,356 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Harmony Email & Collaboration, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.

Users
  • IT Manager
  • Systems Administrator
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 59% Mid-Market
  • 24% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Check Point Anti-Spam & Email Security is a tool designed for the detection and prevention of spam and phishing attacks, integrating with platforms like Microsoft 365 and providing real-time threat prevention.
  • Reviewers frequently mention the product's seamless integration with platforms like Microsoft 365, its user-friendly interface, and its effective blocking of spam, phishing, and malicious emails, which enhances productivity and reduces IT overhead.
  • Reviewers mentioned issues such as the limited range of supported email platforms, the need for more granular control over policies and rules, and the occasional flagging of secure emails as suspicious, which can slow down workflows and require manual review.
Check Point Harmony Email & Collaboration Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Email Security
94
Security
83
Protection
74
Ease of Use
50
Phishing Protection
45
Cons
False Positives
29
Complexity
23
Complex Setup
22
Limited Features
18
Configuration Difficulties
17
Check Point Harmony Email & Collaboration features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 8.9
9.0
Access Control
Average: 8.6
9.2
Compliance
Average: 9.0
9.1
Data Visibility
Average: 8.8
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,026 Twitter followers
LinkedIn® Page
www.linkedin.com
8,356 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler Internet Access™ (ZIA) is the world’s leading cloud-native secure access solution that protects users, devices, and data by securing all internet traffic, regardless of location. Leveragin

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 49% Enterprise
    • 26% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Zscaler Internet Access is a cloud-based security solution that provides users with secure internet access and helps protect against threats such as malware, ransomware, and phishing attempts.
    • Users like the cloud-native security model, zero-trust architecture, and the ability to access the internet securely from anywhere without relying on traditional on-premise hardware.
    • Users mentioned that the initial setup and policy configuration can be complex for new administrators, and there can be minor latency depending on user location and traffic routing.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Internet Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    48
    Internet Security
    47
    Protection
    41
    Cloud Services
    26
    Email Security
    26
    Cons
    Slow Performance
    27
    Complex Implementation
    24
    Complex Configuration
    22
    Connection Issues
    22
    Internet Connectivity
    18
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Internet Access features and usability ratings that predict user satisfaction
    8.7
    Ease of Use
    Average: 8.9
    9.3
    Access Control
    Average: 8.6
    9.2
    Compliance
    Average: 9.0
    9.2
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Company Website
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    17,394 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,540 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler Internet Access™ (ZIA) is the world’s leading cloud-native secure access solution that protects users, devices, and data by securing all internet traffic, regardless of location. Leveragin

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 49% Enterprise
  • 26% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Zscaler Internet Access is a cloud-based security solution that provides users with secure internet access and helps protect against threats such as malware, ransomware, and phishing attempts.
  • Users like the cloud-native security model, zero-trust architecture, and the ability to access the internet securely from anywhere without relying on traditional on-premise hardware.
  • Users mentioned that the initial setup and policy configuration can be complex for new administrators, and there can be minor latency depending on user location and traffic routing.
Zscaler Internet Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
48
Internet Security
47
Protection
41
Cloud Services
26
Email Security
26
Cons
Slow Performance
27
Complex Implementation
24
Complex Configuration
22
Connection Issues
22
Internet Connectivity
18
Zscaler Internet Access features and usability ratings that predict user satisfaction
8.7
Ease of Use
Average: 8.9
9.3
Access Control
Average: 8.6
9.2
Compliance
Average: 9.0
9.2
Data Visibility
Average: 8.8
Seller Details
Seller
Zscaler
Company Website
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
17,394 Twitter followers
LinkedIn® Page
www.linkedin.com
9,540 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trellix Data Security protects sensitive and proprietary information shared on endpoints, networks, email, the web, and within databases — as well as provides encryption protection for devices and dat

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 42% Small-Business
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trellix Data Loss Prevention Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    11
    Data Protection
    7
    Ease of Use
    4
    Integrations
    3
    Compliance Management
    2
    Cons
    Performance Issues
    6
    Complex Configuration
    2
    Expensive
    2
    Slow Data Transfer
    2
    Slow Performance
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Data Loss Prevention features and usability ratings that predict user satisfaction
    8.5
    Ease of Use
    Average: 8.9
    8.7
    Access Control
    Average: 8.6
    8.9
    Compliance
    Average: 9.0
    8.9
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    241,955 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    812 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trellix Data Security protects sensitive and proprietary information shared on endpoints, networks, email, the web, and within databases — as well as provides encryption protection for devices and dat

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 42% Small-Business
  • 31% Mid-Market
Trellix Data Loss Prevention Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
11
Data Protection
7
Ease of Use
4
Integrations
3
Compliance Management
2
Cons
Performance Issues
6
Complex Configuration
2
Expensive
2
Slow Data Transfer
2
Slow Performance
2
Trellix Data Loss Prevention features and usability ratings that predict user satisfaction
8.5
Ease of Use
Average: 8.9
8.7
Access Control
Average: 8.6
8.9
Compliance
Average: 9.0
8.9
Data Visibility
Average: 8.8
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
241,955 Twitter followers
LinkedIn® Page
www.linkedin.com
812 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BetterCloud is a comprehensive SaaS management platform designed to assist IT teams in effectively managing and optimizing their software-as-a-service (SaaS) applications. This solution focuses on aut

    Users
    • IT Manager
    • Systems Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 60% Mid-Market
    • 28% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BetterCloud is an automation tool for IT services, providing centralized visibility for SaaS processes and security features for data loss protection and policy enforcement.
    • Users frequently mention the powerful tools BetterCloud provides to automate and build workflows, manage Gmail signatures for Google Workspace, and alert users when something is shared externally, which is useful for protecting private information.
    • Users mentioned that BetterCloud has issues with integrations, particularly with platforms that don't have an integration with BetterCloud and some existing integrations lack full functionality.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BetterCloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    47
    Ease of Use
    42
    Onboarding
    31
    Time-saving
    27
    Offboarding Process
    25
    Cons
    Limited Features
    28
    Integration Issues
    21
    Missing Features
    19
    Access Limitations
    13
    Lacking Features
    13
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BetterCloud features and usability ratings that predict user satisfaction
    8.7
    Ease of Use
    Average: 8.9
    8.9
    Access Control
    Average: 8.6
    8.6
    Compliance
    Average: 9.0
    8.8
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    New York
    Twitter
    @BetterCloud
    11,112 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    146 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BetterCloud is a comprehensive SaaS management platform designed to assist IT teams in effectively managing and optimizing their software-as-a-service (SaaS) applications. This solution focuses on aut

Users
  • IT Manager
  • Systems Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 60% Mid-Market
  • 28% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BetterCloud is an automation tool for IT services, providing centralized visibility for SaaS processes and security features for data loss protection and policy enforcement.
  • Users frequently mention the powerful tools BetterCloud provides to automate and build workflows, manage Gmail signatures for Google Workspace, and alert users when something is shared externally, which is useful for protecting private information.
  • Users mentioned that BetterCloud has issues with integrations, particularly with platforms that don't have an integration with BetterCloud and some existing integrations lack full functionality.
BetterCloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
47
Ease of Use
42
Onboarding
31
Time-saving
27
Offboarding Process
25
Cons
Limited Features
28
Integration Issues
21
Missing Features
19
Access Limitations
13
Lacking Features
13
BetterCloud features and usability ratings that predict user satisfaction
8.7
Ease of Use
Average: 8.9
8.9
Access Control
Average: 8.6
8.6
Compliance
Average: 9.0
8.8
Data Visibility
Average: 8.8
Seller Details
Company Website
Year Founded
2011
HQ Location
New York
Twitter
@BetterCloud
11,112 Twitter followers
LinkedIn® Page
www.linkedin.com
146 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Netwrix Endpoint Protector is a sophisticated multi-OS endpoint Data Loss Prevention (DLP) solution designed to provide comprehensive real-time data protection across various operating systems, includ

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 55% Mid-Market
    • 23% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Netwrix Endpoint Protector is a data loss prevention solution that requires minimal third-party server support and provides functionalities such as USB enable/disable, data encryption, and device control across multiple operating systems.
    • Reviewers appreciate the software's ability to secure endpoint assets and cloud servers, its support for major operating systems, its effective customer support, and its smart rules that go beyond simple blocking.
    • Reviewers mentioned that the deep packet inspection feature can sometimes block all internet traffic, the user interface feels dated and is not very smooth to navigate, and the initial setup and policy implementation can be time-consuming and complex for beginners.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Netwrix Endpoint Protector Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    19
    Ease of Use
    18
    Data Protection
    14
    Implementation Ease
    14
    Integrations
    12
    Cons
    Slow Performance
    9
    Lack of Linux Support
    6
    False Positives
    4
    Inadequate Reporting
    3
    Inefficient Logging
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Netwrix Endpoint Protector features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 8.9
    7.7
    Access Control
    Average: 8.6
    9.2
    Compliance
    Average: 9.0
    9.1
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Netwrix
    HQ Location
    Irvine, CA
    Twitter
    @Netwrix
    2,914 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    758 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Netwrix Endpoint Protector is a sophisticated multi-OS endpoint Data Loss Prevention (DLP) solution designed to provide comprehensive real-time data protection across various operating systems, includ

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 55% Mid-Market
  • 23% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Netwrix Endpoint Protector is a data loss prevention solution that requires minimal third-party server support and provides functionalities such as USB enable/disable, data encryption, and device control across multiple operating systems.
  • Reviewers appreciate the software's ability to secure endpoint assets and cloud servers, its support for major operating systems, its effective customer support, and its smart rules that go beyond simple blocking.
  • Reviewers mentioned that the deep packet inspection feature can sometimes block all internet traffic, the user interface feels dated and is not very smooth to navigate, and the initial setup and policy implementation can be time-consuming and complex for beginners.
Netwrix Endpoint Protector Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
19
Ease of Use
18
Data Protection
14
Implementation Ease
14
Integrations
12
Cons
Slow Performance
9
Lack of Linux Support
6
False Positives
4
Inadequate Reporting
3
Inefficient Logging
3
Netwrix Endpoint Protector features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 8.9
7.7
Access Control
Average: 8.6
9.2
Compliance
Average: 9.0
9.1
Data Visibility
Average: 8.8
Seller Details
Seller
Netwrix
HQ Location
Irvine, CA
Twitter
@Netwrix
2,914 Twitter followers
LinkedIn® Page
www.linkedin.com
758 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Symantec’s Data Loss Prevention (DLP) solution discovers, monitors, and protects sensitive data wherever it goes – across cloud apps, endpoints, networks and data centers. With DLP, businesses are abl

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 43% Mid-Market
    • 42% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Symantec Data Loss Prevention Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    1
    Ease of Use
    1
    Performance Speed
    1
    Policy Management
    1
    Protection
    1
    Cons
    Complex Configuration
    1
    False Positives
    1
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Data Loss Prevention features and usability ratings that predict user satisfaction
    8.4
    Ease of Use
    Average: 8.9
    8.8
    Access Control
    Average: 8.6
    9.1
    Compliance
    Average: 9.0
    9.3
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    62,787 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    55,707 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Symantec’s Data Loss Prevention (DLP) solution discovers, monitors, and protects sensitive data wherever it goes – across cloud apps, endpoints, networks and data centers. With DLP, businesses are abl

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 43% Mid-Market
  • 42% Enterprise
Symantec Data Loss Prevention Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
1
Ease of Use
1
Performance Speed
1
Policy Management
1
Protection
1
Cons
Complex Configuration
1
False Positives
1
Poor Customer Support
1
Symantec Data Loss Prevention features and usability ratings that predict user satisfaction
8.4
Ease of Use
Average: 8.9
8.8
Access Control
Average: 8.6
9.1
Compliance
Average: 9.0
9.3
Data Visibility
Average: 8.8
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
62,787 Twitter followers
LinkedIn® Page
www.linkedin.com
55,707 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Forcepoint Data Security Cloud delivers unified visibility, control, and protection for data across endpoints, web, SaaS, and private applications, powered by Forcepoint’s AI Mesh and Data Security Ev

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forcepoint Data Security Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    7
    Ease of Use
    6
    Security
    6
    Customer Support
    5
    Monitoring
    5
    Cons
    Complex Configuration
    4
    Expensive
    4
    Complexity
    3
    Complex Setup
    3
    Difficult Setup
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forcepoint Data Security Cloud features and usability ratings that predict user satisfaction
    8.6
    Ease of Use
    Average: 8.9
    8.1
    Access Control
    Average: 8.6
    8.5
    Compliance
    Average: 9.0
    8.6
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Austin, TX
    Twitter
    @Forcepointsec
    65,531 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,658 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Forcepoint Data Security Cloud delivers unified visibility, control, and protection for data across endpoints, web, SaaS, and private applications, powered by Forcepoint’s AI Mesh and Data Security Ev

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Enterprise
  • 38% Mid-Market
Forcepoint Data Security Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
7
Ease of Use
6
Security
6
Customer Support
5
Monitoring
5
Cons
Complex Configuration
4
Expensive
4
Complexity
3
Complex Setup
3
Difficult Setup
3
Forcepoint Data Security Cloud features and usability ratings that predict user satisfaction
8.6
Ease of Use
Average: 8.9
8.1
Access Control
Average: 8.6
8.5
Compliance
Average: 9.0
8.6
Data Visibility
Average: 8.8
Seller Details
Year Founded
1994
HQ Location
Austin, TX
Twitter
@Forcepointsec
65,531 Twitter followers
LinkedIn® Page
www.linkedin.com
1,658 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protect data. Simplify compliance. Accelerate security. Safeguard your organization’s most critical assets with Fortra’s market-leading Data Loss Prevention (DLP) solution. Delivered via SaaS for

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Computer & Network Security
    Market Segment
    • 45% Mid-Market
    • 41% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Fortra DLP (formerly Digital Guardian) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    2
    Deployment Ease
    1
    Email Security
    1
    Policy Management
    1
    Protection
    1
    Cons
    Slow Performance
    2
    Complex Configuration
    1
    Complexity
    1
    Expensive
    1
    False Positives
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortra DLP (formerly Digital Guardian) features and usability ratings that predict user satisfaction
    7.7
    Ease of Use
    Average: 8.9
    8.9
    Access Control
    Average: 8.6
    8.6
    Compliance
    Average: 9.0
    9.0
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Company Website
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,603 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,738 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protect data. Simplify compliance. Accelerate security. Safeguard your organization’s most critical assets with Fortra’s market-leading Data Loss Prevention (DLP) solution. Delivered via SaaS for

Users
No information available
Industries
  • Hospital & Health Care
  • Computer & Network Security
Market Segment
  • 45% Mid-Market
  • 41% Enterprise
Fortra DLP (formerly Digital Guardian) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
2
Deployment Ease
1
Email Security
1
Policy Management
1
Protection
1
Cons
Slow Performance
2
Complex Configuration
1
Complexity
1
Expensive
1
False Positives
1
Fortra DLP (formerly Digital Guardian) features and usability ratings that predict user satisfaction
7.7
Ease of Use
Average: 8.9
8.9
Access Control
Average: 8.6
8.6
Compliance
Average: 9.0
9.0
Data Visibility
Average: 8.8
Seller Details
Seller
Fortra
Company Website
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,603 Twitter followers
LinkedIn® Page
www.linkedin.com
1,738 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VIPRE SafeSend is a simple Microsoft Outlook add-on that is used to prevent misaddressed email or inadvertent autocomplete email mistakes by requiring the sender to confirm external recipients and fil

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 26% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE SafeSend features and usability ratings that predict user satisfaction
    9.4
    Ease of Use
    Average: 8.9
    7.5
    Access Control
    Average: 8.6
    8.6
    Compliance
    Average: 9.0
    8.1
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,308 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    228 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VIPRE SafeSend is a simple Microsoft Outlook add-on that is used to prevent misaddressed email or inadvertent autocomplete email mistakes by requiring the sender to confirm external recipients and fil

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 26% Enterprise
VIPRE SafeSend features and usability ratings that predict user satisfaction
9.4
Ease of Use
Average: 8.9
7.5
Access Control
Average: 8.6
8.6
Compliance
Average: 9.0
8.1
Data Visibility
Average: 8.8
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,308 Twitter followers
LinkedIn® Page
www.linkedin.com
228 employees on LinkedIn®
(40)4.2 out of 5
Optimized for quick response
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Code42 insider risk detection and response for the collaborative and remote enterprise. Code42 speeds the time it takes to detect and respond to data risk from insider threats. We help to stop insi

    Users
    No information available
    Industries
    • Computer Software
    • Higher Education
    Market Segment
    • 43% Enterprise
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Incydr Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Features
    1
    Monitoring
    1
    Cons
    Difficult Setup
    2
    Setup Difficulties
    2
    Complex Configuration
    1
    Expensive
    1
    Pricing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Incydr features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 8.9
    8.3
    Access Control
    Average: 8.6
    10.0
    Compliance
    Average: 9.0
    10.0
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mimecast
    Company Website
    Year Founded
    2003
    HQ Location
    London
    Twitter
    @Mimecast
    18,070 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,467 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Code42 insider risk detection and response for the collaborative and remote enterprise. Code42 speeds the time it takes to detect and respond to data risk from insider threats. We help to stop insi

Users
No information available
Industries
  • Computer Software
  • Higher Education
Market Segment
  • 43% Enterprise
  • 38% Small-Business
Incydr Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Features
1
Monitoring
1
Cons
Difficult Setup
2
Setup Difficulties
2
Complex Configuration
1
Expensive
1
Pricing Issues
1
Incydr features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 8.9
8.3
Access Control
Average: 8.6
10.0
Compliance
Average: 9.0
10.0
Data Visibility
Average: 8.8
Seller Details
Seller
Mimecast
Company Website
Year Founded
2003
HQ Location
London
Twitter
@Mimecast
18,070 Twitter followers
LinkedIn® Page
www.linkedin.com
2,467 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Data is the fuel that powers your business—protecting it is critical. But traditional data protection oversteps where it isn't needed and impedes your team’s productivity. In today’s remote culture, b

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 59% Enterprise
    • 26% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forcepoint Data Loss Prevention (DLP) features and usability ratings that predict user satisfaction
    8.7
    Ease of Use
    Average: 8.9
    8.7
    Access Control
    Average: 8.6
    8.5
    Compliance
    Average: 9.0
    9.0
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Austin, TX
    Twitter
    @Forcepointsec
    65,531 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,658 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Data is the fuel that powers your business—protecting it is critical. But traditional data protection oversteps where it isn't needed and impedes your team’s productivity. In today’s remote culture, b

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 59% Enterprise
  • 26% Mid-Market
Forcepoint Data Loss Prevention (DLP) features and usability ratings that predict user satisfaction
8.7
Ease of Use
Average: 8.9
8.7
Access Control
Average: 8.6
8.5
Compliance
Average: 9.0
9.0
Data Visibility
Average: 8.8
Seller Details
Year Founded
1994
HQ Location
Austin, TX
Twitter
@Forcepointsec
65,531 Twitter followers
LinkedIn® Page
www.linkedin.com
1,658 employees on LinkedIn®