Introducing G2.ai, the future of software buying.Try now

Best Data Loss Prevention (DLP) Software

Lauren Worth
LW
Researched and written by Lauren Worth

Data loss prevention (DLP) software, also known as data leak prevention software, is used to secure control and ensure compliance of sensitive business information. A key component of DLP solutions is distribution control, which ensures users do not send private information outside of corporate business networks. Security staff and network administrators set business rules that determine who can view, change, and share confidential data. DLP tools often control data on both the network and endpoint level to ensure policies remain consistent across the company. These tools are used to ensure the protection of data and prevent leaks by internal sources.

There are overlaps between DLP tools and some governance, risk & compliance (GRC) software, but these tools are specifically geared toward data control. DLP solutions are also used alongside backup software, but as a complement to the software rather than a replacement.

To qualify for inclusion in the Data Loss Prevention (DLP) category, a product must:

Monitor data storage and sharing for compliance
Allow administrative control over data governance
Detect data leaks or misuse
Facilitate data identification and discovery
Show More
Show Less

Featured Data Loss Prevention (DLP) Software At A Glance

Free Plan Available:
ManageEngine DataSecurity Plus
Sponsored
Highest Performer:
Easiest to Use:
Show LessShow More
Highest Performer:
Easiest to Use:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
138 Listings in Data Loss Prevention (DLP) Available
(568)4.5 out of 5
7th Easiest To Use in Data Loss Prevention (DLP) software
View top Consulting Services for Check Point Next Generation Firewalls (NGFWs)
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Strengthen Your Security with Check Point Gateways and Firewalls Check Point Hybrid Mesh Network Security is a comprehensive cybersecurity solution designed to protect networks from sophisticated

    Users
    • Network Security Engineer
    • Network Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 43% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Check Point Next Generation Firewall is a network security tool that provides threat prevention, visibility from logs and dashboards, and centralized policy management.
    • Users like the AI-powered threat detection, the ability to manage policies centrally, and the stable and dependable day-to-day protection that Check Point Next Generation Firewall offers.
    • Users experienced complexity in setup and ongoing management, particularly with licensing and enabling features, and some tasks can take longer than expected due to the interface and workflow learning curve.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Next Generation Firewalls (NGFWs) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    93
    Features
    82
    Threat Detection
    78
    Network Security
    70
    Centralized Management
    62
    Cons
    Expensive
    69
    Complexity
    49
    Slow Performance
    44
    Complex Setup
    42
    Learning Curve
    36
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Next Generation Firewalls (NGFWs) features and usability ratings that predict user satisfaction
    8.6
    Ease of Use
    Average: 8.9
    8.8
    Access Control
    Average: 8.6
    8.8
    Compliance
    Average: 9.0
    8.6
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,962 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,356 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Strengthen Your Security with Check Point Gateways and Firewalls Check Point Hybrid Mesh Network Security is a comprehensive cybersecurity solution designed to protect networks from sophisticated

Users
  • Network Security Engineer
  • Network Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 43% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Check Point Next Generation Firewall is a network security tool that provides threat prevention, visibility from logs and dashboards, and centralized policy management.
  • Users like the AI-powered threat detection, the ability to manage policies centrally, and the stable and dependable day-to-day protection that Check Point Next Generation Firewall offers.
  • Users experienced complexity in setup and ongoing management, particularly with licensing and enabling features, and some tasks can take longer than expected due to the interface and workflow learning curve.
Check Point Next Generation Firewalls (NGFWs) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
93
Features
82
Threat Detection
78
Network Security
70
Centralized Management
62
Cons
Expensive
69
Complexity
49
Slow Performance
44
Complex Setup
42
Learning Curve
36
Check Point Next Generation Firewalls (NGFWs) features and usability ratings that predict user satisfaction
8.6
Ease of Use
Average: 8.9
8.8
Access Control
Average: 8.6
8.8
Compliance
Average: 9.0
8.6
Data Visibility
Average: 8.8
Seller Details
Company Website
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,962 Twitter followers
LinkedIn® Page
www.linkedin.com
8,356 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Harmony Email & Collaboration, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.

    Users
    • IT Manager
    • Systems Administrator
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 59% Mid-Market
    • 24% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Check Point Harmony Email & Collaboration is a security solution that filters out spam and malicious emails, integrates with platforms like Microsoft 365, and provides visibility into all SAAS applications.
    • Users like the seamless communication, real-time threat prevention, clear reporting, and the fact that it catches phishing attempts, fake links, and unwanted spam very accurately.
    • Users mentioned the limited range of supported email platforms, deployment models, and flexibility in customization, as well as the occasional flagging of secure emails as suspicious.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Harmony Email & Collaboration Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Email Security
    98
    Security
    85
    Protection
    77
    Ease of Use
    49
    Phishing Protection
    49
    Cons
    False Positives
    30
    Complexity
    28
    Complex Setup
    23
    Configuration Difficulties
    18
    Limited Features
    18
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Harmony Email & Collaboration features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 8.9
    9.0
    Access Control
    Average: 8.6
    9.2
    Compliance
    Average: 9.0
    9.1
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,962 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,356 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Harmony Email & Collaboration, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.

Users
  • IT Manager
  • Systems Administrator
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 59% Mid-Market
  • 24% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Check Point Harmony Email & Collaboration is a security solution that filters out spam and malicious emails, integrates with platforms like Microsoft 365, and provides visibility into all SAAS applications.
  • Users like the seamless communication, real-time threat prevention, clear reporting, and the fact that it catches phishing attempts, fake links, and unwanted spam very accurately.
  • Users mentioned the limited range of supported email platforms, deployment models, and flexibility in customization, as well as the occasional flagging of secure emails as suspicious.
Check Point Harmony Email & Collaboration Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Email Security
98
Security
85
Protection
77
Ease of Use
49
Phishing Protection
49
Cons
False Positives
30
Complexity
28
Complex Setup
23
Configuration Difficulties
18
Limited Features
18
Check Point Harmony Email & Collaboration features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 8.9
9.0
Access Control
Average: 8.6
9.2
Compliance
Average: 9.0
9.1
Data Visibility
Average: 8.8
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,962 Twitter followers
LinkedIn® Page
www.linkedin.com
8,356 employees on LinkedIn®
Ownership
NASDAQ:CHKP
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
(194)4.5 out of 5
Optimized for quick response
1st Easiest To Use in Data Loss Prevention (DLP) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Safetica’s Intelligent Data Security protects sensitive data where teams work, using powerful AI to deliver contextual awareness, reduce false positives, and stop real threats without disrupting produ

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 58% Mid-Market
    • 38% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Safetica is a data loss prevention solution that provides comprehensive employee monitoring and seamless integration with Data Loss Prevention (DLP) solutions, allowing users to restrict access to dangerous websites and trace data breaches.
    • Reviewers like Safetica's strong security, overall system performance, easy-to-use interface, detailed reporting, customizable policies, and its ability to provide clear visibility into how sensitive information is used across the organization.
    • Reviewers mentioned issues with updates, weak support for Linux, complex advanced configurations, tedious initial alert setup process, excessive notifications if filters aren't adjusted correctly, and occasional performance degradation during intensive monitoring.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Safetica Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    26
    Features
    20
    Security
    20
    Data Protection
    19
    Implementation Ease
    15
    Cons
    Slow Performance
    10
    Performance Issues
    8
    Integration Issues
    7
    Limited Features
    6
    Access Limitations
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Safetica features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 8.9
    9.0
    Access Control
    Average: 8.6
    9.1
    Compliance
    Average: 9.0
    9.1
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Safetica
    Company Website
    Year Founded
    2011
    HQ Location
    San Jose, California, United States
    Twitter
    @Safetica
    668 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    134 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Safetica’s Intelligent Data Security protects sensitive data where teams work, using powerful AI to deliver contextual awareness, reduce false positives, and stop real threats without disrupting produ

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 58% Mid-Market
  • 38% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Safetica is a data loss prevention solution that provides comprehensive employee monitoring and seamless integration with Data Loss Prevention (DLP) solutions, allowing users to restrict access to dangerous websites and trace data breaches.
  • Reviewers like Safetica's strong security, overall system performance, easy-to-use interface, detailed reporting, customizable policies, and its ability to provide clear visibility into how sensitive information is used across the organization.
  • Reviewers mentioned issues with updates, weak support for Linux, complex advanced configurations, tedious initial alert setup process, excessive notifications if filters aren't adjusted correctly, and occasional performance degradation during intensive monitoring.
Safetica Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
26
Features
20
Security
20
Data Protection
19
Implementation Ease
15
Cons
Slow Performance
10
Performance Issues
8
Integration Issues
7
Limited Features
6
Access Limitations
5
Safetica features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 8.9
9.0
Access Control
Average: 8.6
9.1
Compliance
Average: 9.0
9.1
Data Visibility
Average: 8.8
Seller Details
Seller
Safetica
Company Website
Year Founded
2011
HQ Location
San Jose, California, United States
Twitter
@Safetica
668 Twitter followers
LinkedIn® Page
www.linkedin.com
134 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proo

    Users
    No information available
    Industries
    • Retail
    • Financial Services
    Market Segment
    • 75% Enterprise
    • 24% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Proofpoint DLP is a tool designed to protect email and data loss, with a focus on preventing sensitive data from being shared externally and customizing policies to suit specific needs.
    • Reviewers frequently mention the user-friendly interface, the centralized platform, the ability to work across multiple applications, and the effectiveness of the policies in preventing sensitive data from leaving the company.
    • Reviewers mentioned the steep learning curve for understanding the policies, the need for a skilled security team and strong infrastructure to fully leverage it, and the generation of false positives.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Proofpoint Enterprise Data Loss Prevention (DLP) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    17
    Data Protection
    10
    Email Security
    9
    Integrations
    8
    Customer Support
    7
    Cons
    False Positives
    6
    Complex Configuration
    5
    Learning Difficulty
    5
    Difficult Setup
    4
    Limited Features
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Enterprise Data Loss Prevention (DLP) features and usability ratings that predict user satisfaction
    8.6
    Ease of Use
    Average: 8.9
    8.3
    Access Control
    Average: 8.6
    8.4
    Compliance
    Average: 9.0
    8.9
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    31,074 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,020 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proo

Users
No information available
Industries
  • Retail
  • Financial Services
Market Segment
  • 75% Enterprise
  • 24% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Proofpoint DLP is a tool designed to protect email and data loss, with a focus on preventing sensitive data from being shared externally and customizing policies to suit specific needs.
  • Reviewers frequently mention the user-friendly interface, the centralized platform, the ability to work across multiple applications, and the effectiveness of the policies in preventing sensitive data from leaving the company.
  • Reviewers mentioned the steep learning curve for understanding the policies, the need for a skilled security team and strong infrastructure to fully leverage it, and the generation of false positives.
Proofpoint Enterprise Data Loss Prevention (DLP) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
17
Data Protection
10
Email Security
9
Integrations
8
Customer Support
7
Cons
False Positives
6
Complex Configuration
5
Learning Difficulty
5
Difficult Setup
4
Limited Features
4
Proofpoint Enterprise Data Loss Prevention (DLP) features and usability ratings that predict user satisfaction
8.6
Ease of Use
Average: 8.9
8.3
Access Control
Average: 8.6
8.4
Compliance
Average: 9.0
8.9
Data Visibility
Average: 8.8
Seller Details
Company Website
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
31,074 Twitter followers
LinkedIn® Page
www.linkedin.com
5,020 employees on LinkedIn®
(159)4.5 out of 5
10th Easiest To Use in Data Loss Prevention (DLP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Netwrix Endpoint Protector is a sophisticated multi-OS endpoint Data Loss Prevention (DLP) solution designed to provide comprehensive real-time data protection across various operating systems, includ

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 55% Mid-Market
    • 23% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Netwrix Endpoint Protector is a data loss prevention solution that requires minimal third-party server support and provides functionalities such as USB enable/disable, data encryption, and device control across multiple operating systems.
    • Reviewers appreciate the software's ability to secure endpoint assets and cloud servers, its support for major operating systems, its effective customer support, and its smart rules that go beyond simple blocking.
    • Reviewers mentioned that the deep packet inspection feature can sometimes block all internet traffic, the user interface feels dated and is not very smooth to navigate, and the initial setup and policy implementation can be time-consuming and complex for beginners.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Netwrix Endpoint Protector Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    19
    Ease of Use
    18
    Data Protection
    14
    Implementation Ease
    14
    Integrations
    12
    Cons
    Slow Performance
    9
    Lack of Linux Support
    6
    False Positives
    4
    Inadequate Reporting
    3
    Inefficient Logging
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Netwrix Endpoint Protector features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 8.9
    7.7
    Access Control
    Average: 8.6
    9.1
    Compliance
    Average: 9.0
    9.0
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Netwrix
    HQ Location
    Irvine, CA
    Twitter
    @Netwrix
    2,926 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    755 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Netwrix Endpoint Protector is a sophisticated multi-OS endpoint Data Loss Prevention (DLP) solution designed to provide comprehensive real-time data protection across various operating systems, includ

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 55% Mid-Market
  • 23% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Netwrix Endpoint Protector is a data loss prevention solution that requires minimal third-party server support and provides functionalities such as USB enable/disable, data encryption, and device control across multiple operating systems.
  • Reviewers appreciate the software's ability to secure endpoint assets and cloud servers, its support for major operating systems, its effective customer support, and its smart rules that go beyond simple blocking.
  • Reviewers mentioned that the deep packet inspection feature can sometimes block all internet traffic, the user interface feels dated and is not very smooth to navigate, and the initial setup and policy implementation can be time-consuming and complex for beginners.
Netwrix Endpoint Protector Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
19
Ease of Use
18
Data Protection
14
Implementation Ease
14
Integrations
12
Cons
Slow Performance
9
Lack of Linux Support
6
False Positives
4
Inadequate Reporting
3
Inefficient Logging
3
Netwrix Endpoint Protector features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 8.9
7.7
Access Control
Average: 8.6
9.1
Compliance
Average: 9.0
9.0
Data Visibility
Average: 8.8
Seller Details
Seller
Netwrix
HQ Location
Irvine, CA
Twitter
@Netwrix
2,926 Twitter followers
LinkedIn® Page
www.linkedin.com
755 employees on LinkedIn®
(121)4.8 out of 5
Optimized for quick response
6th Easiest To Use in Data Loss Prevention (DLP) software
Save to My Lists
$500 Off
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SpinOne is an all-in-one SaaS security platform that protects your mission critical SaaS environments including Google Workplace, Microsoft 365, Salesforce, Slack – and now we've added 50+ more SaaS a

    Users
    • IT Director
    • CEO
    Industries
    • Non-Profit Organization Management
    • Marketing and Advertising
    Market Segment
    • 50% Mid-Market
    • 41% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • SpinOne is a SaaS solution that provides backup, restoration, and security services for data management.
    • Users frequently mention the user-friendly interface, broad selection of options for managing workloads, reliable backup services, and excellent customer support as key benefits of using SpinOne.
    • Users experienced issues such as costly per user license for large organizations, inability to do granular data retention based on user groups, long data refreshing times, lack of advanced backup management features, and limitations in backup and restore functionality between different platforms.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SpinOne Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    33
    Customer Support
    32
    Backup Ease
    25
    Reliability
    24
    Backup Features
    20
    Cons
    Backup Issues
    8
    Expensive
    8
    Poor Interface Design
    8
    Pricing Issues
    5
    Lack of Backup
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SpinOne features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 8.9
    9.0
    Access Control
    Average: 8.6
    9.1
    Compliance
    Average: 9.0
    9.0
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SpinAI
    Company Website
    Year Founded
    2017
    HQ Location
    Palo Alto, California
    Twitter
    @spintechinc
    765 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    90 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SpinOne is an all-in-one SaaS security platform that protects your mission critical SaaS environments including Google Workplace, Microsoft 365, Salesforce, Slack – and now we've added 50+ more SaaS a

Users
  • IT Director
  • CEO
Industries
  • Non-Profit Organization Management
  • Marketing and Advertising
Market Segment
  • 50% Mid-Market
  • 41% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • SpinOne is a SaaS solution that provides backup, restoration, and security services for data management.
  • Users frequently mention the user-friendly interface, broad selection of options for managing workloads, reliable backup services, and excellent customer support as key benefits of using SpinOne.
  • Users experienced issues such as costly per user license for large organizations, inability to do granular data retention based on user groups, long data refreshing times, lack of advanced backup management features, and limitations in backup and restore functionality between different platforms.
SpinOne Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
33
Customer Support
32
Backup Ease
25
Reliability
24
Backup Features
20
Cons
Backup Issues
8
Expensive
8
Poor Interface Design
8
Pricing Issues
5
Lack of Backup
4
SpinOne features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 8.9
9.0
Access Control
Average: 8.6
9.1
Compliance
Average: 9.0
9.0
Data Visibility
Average: 8.8
Seller Details
Seller
SpinAI
Company Website
Year Founded
2017
HQ Location
Palo Alto, California
Twitter
@spintechinc
765 Twitter followers
LinkedIn® Page
www.linkedin.com
90 employees on LinkedIn®
(229)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Data Loss Prevention (DLP) software
Save to My Lists
Entry Level Price:Starting at $9.50
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Coro is the easy cybersecurity company. We designed an all-in-one platform that every lean IT team will master. While other solutions scare people into buying complicated, confusing products, we lead

    Users
    • IT Manager
    • IT Director
    Industries
    • Non-Profit Organization Management
    • Financial Services
    Market Segment
    • 57% Mid-Market
    • 36% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Coro is a cybersecurity product that provides protection for small businesses, with features such as flagging potential spam and phishing, and offering a dashboard for easy administration.
    • Reviewers appreciate the product's high success rate in capturing threats, its intuitive platform, and the responsive and helpful support team that makes the onboarding process easy.
    • Users experienced issues with the product being particular about the version of Outlook for the Coro add-in, the inability to interact directly with the Bitdefender agent on local machines, and unclear instructions on how to resolve errors.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Coro Cybersecurity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    88
    Customer Support
    63
    Security
    62
    Protection
    50
    Easy Setup
    45
    Cons
    Performance Issues
    31
    Improvements Needed
    19
    False Positives
    15
    Inaccuracy
    15
    Missing Features
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Coro Cybersecurity features and usability ratings that predict user satisfaction
    9.5
    Ease of Use
    Average: 8.9
    8.7
    Access Control
    Average: 8.6
    9.3
    Compliance
    Average: 9.0
    9.2
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Coronet
    Company Website
    Year Founded
    2014
    HQ Location
    Chicago, IL
    Twitter
    @coro_cyber
    1,909 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    324 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Coro is the easy cybersecurity company. We designed an all-in-one platform that every lean IT team will master. While other solutions scare people into buying complicated, confusing products, we lead

Users
  • IT Manager
  • IT Director
Industries
  • Non-Profit Organization Management
  • Financial Services
Market Segment
  • 57% Mid-Market
  • 36% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Coro is a cybersecurity product that provides protection for small businesses, with features such as flagging potential spam and phishing, and offering a dashboard for easy administration.
  • Reviewers appreciate the product's high success rate in capturing threats, its intuitive platform, and the responsive and helpful support team that makes the onboarding process easy.
  • Users experienced issues with the product being particular about the version of Outlook for the Coro add-in, the inability to interact directly with the Bitdefender agent on local machines, and unclear instructions on how to resolve errors.
Coro Cybersecurity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
88
Customer Support
63
Security
62
Protection
50
Easy Setup
45
Cons
Performance Issues
31
Improvements Needed
19
False Positives
15
Inaccuracy
15
Missing Features
14
Coro Cybersecurity features and usability ratings that predict user satisfaction
9.5
Ease of Use
Average: 8.9
8.7
Access Control
Average: 8.6
9.3
Compliance
Average: 9.0
9.2
Data Visibility
Average: 8.8
Seller Details
Seller
Coronet
Company Website
Year Founded
2014
HQ Location
Chicago, IL
Twitter
@coro_cyber
1,909 Twitter followers
LinkedIn® Page
www.linkedin.com
324 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler Internet Access™ (ZIA) is the world’s leading cloud-native secure access solution that protects users, devices, and data by securing all internet traffic, regardless of location. Leveragin

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Enterprise
    • 26% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Zscaler Internet Access is a cloud-based security solution that allows users to safely access the internet from anywhere without needing a VPN, providing threat protection by blocking malware, ransomware, phishing attempts, and malicious websites in real time.
    • Users like the product's cloud-native security approach, its strong protection against threats, good performance, centralized management, and the ability to enforce consistent security policies across all users and devices.
    • Users reported that the initial setup and policy configuration can be complex, especially for new users, and occasional latency may be noticed when traffic is routed through the cloud, and licensing and pricing can be expensive for smaller organizations.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Internet Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Internet Security
    40
    Security
    40
    Protection
    33
    Ease of Use
    23
    Email Security
    22
    Cons
    Slow Performance
    22
    Complex Implementation
    19
    Connection Issues
    19
    Complex Configuration
    16
    Internet Connectivity
    16
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Internet Access features and usability ratings that predict user satisfaction
    8.7
    Ease of Use
    Average: 8.9
    9.3
    Access Control
    Average: 8.6
    9.2
    Compliance
    Average: 9.0
    9.2
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Company Website
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    17,196 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,540 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler Internet Access™ (ZIA) is the world’s leading cloud-native secure access solution that protects users, devices, and data by securing all internet traffic, regardless of location. Leveragin

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Enterprise
  • 26% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Zscaler Internet Access is a cloud-based security solution that allows users to safely access the internet from anywhere without needing a VPN, providing threat protection by blocking malware, ransomware, phishing attempts, and malicious websites in real time.
  • Users like the product's cloud-native security approach, its strong protection against threats, good performance, centralized management, and the ability to enforce consistent security policies across all users and devices.
  • Users reported that the initial setup and policy configuration can be complex, especially for new users, and occasional latency may be noticed when traffic is routed through the cloud, and licensing and pricing can be expensive for smaller organizations.
Zscaler Internet Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Internet Security
40
Security
40
Protection
33
Ease of Use
23
Email Security
22
Cons
Slow Performance
22
Complex Implementation
19
Connection Issues
19
Complex Configuration
16
Internet Connectivity
16
Zscaler Internet Access features and usability ratings that predict user satisfaction
8.7
Ease of Use
Average: 8.9
9.3
Access Control
Average: 8.6
9.2
Compliance
Average: 9.0
9.2
Data Visibility
Average: 8.8
Seller Details
Seller
Zscaler
Company Website
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
17,196 Twitter followers
LinkedIn® Page
www.linkedin.com
9,540 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AvePoint is the global leader in data security, governance, and resilience, going beyond traditional solutions to ensure a robust data foundation and enable organizations everywhere to collaborate wit

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 44% Mid-Market
    • 34% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • AvePoint Confidence Platform is a tool designed to manage and protect Microsoft 365 data, offering backup, governance, compliance, and data protection in a unified solution.
    • Reviewers frequently mention the platform's comprehensive data governance, ease of data recovery, and the ability to bring multiple aspects of data protection, governance, and compliance together in one place.
    • Reviewers mentioned that the platform's broad set of features and complexity can make the initial setup and learning curve steep, with some parts of the interface feeling less intuitive and advanced options adding to the overall cost.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AvePoint Confidence Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    41
    Cloud Backup
    26
    Backup Frequency
    22
    Cloud Computing
    18
    Cloud Services
    16
    Cons
    Expensive
    10
    Backup Issues
    6
    Learning Curve
    5
    Poor Customer Support
    5
    Slow Performance
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AvePoint Confidence Platform features and usability ratings that predict user satisfaction
    9.2
    Ease of Use
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AvePoint
    Company Website
    Year Founded
    2001
    HQ Location
    Jersey City, NJ
    Twitter
    @AvePoint
    9,803 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,382 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AvePoint is the global leader in data security, governance, and resilience, going beyond traditional solutions to ensure a robust data foundation and enable organizations everywhere to collaborate wit

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 44% Mid-Market
  • 34% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • AvePoint Confidence Platform is a tool designed to manage and protect Microsoft 365 data, offering backup, governance, compliance, and data protection in a unified solution.
  • Reviewers frequently mention the platform's comprehensive data governance, ease of data recovery, and the ability to bring multiple aspects of data protection, governance, and compliance together in one place.
  • Reviewers mentioned that the platform's broad set of features and complexity can make the initial setup and learning curve steep, with some parts of the interface feeling less intuitive and advanced options adding to the overall cost.
AvePoint Confidence Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
41
Cloud Backup
26
Backup Frequency
22
Cloud Computing
18
Cloud Services
16
Cons
Expensive
10
Backup Issues
6
Learning Curve
5
Poor Customer Support
5
Slow Performance
5
AvePoint Confidence Platform features and usability ratings that predict user satisfaction
9.2
Ease of Use
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
AvePoint
Company Website
Year Founded
2001
HQ Location
Jersey City, NJ
Twitter
@AvePoint
9,803 Twitter followers
LinkedIn® Page
www.linkedin.com
2,382 employees on LinkedIn®
(21)4.5 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    MetaDefender Platform is an advanced threat prevention solution that lets organizations embed multi-layer file security into existing applications and security architectures, especially to protect com

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 43% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • MetaDefender is a tool that scans files from external sources and integrates into existing security workflows.
    • Users frequently mention the tool's ability to deliver clear scan results, its consistent performance even during high volumes, and its easy integration into existing systems.
    • Reviewers noted that the tool requires initial setup and policy tuning, especially for uncommon file types, and careful testing to avoid unnecessary blocking.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • MetaDefender Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    6
    Ease of Use
    5
    Security
    5
    Customer Support
    4
    Integrations
    4
    Cons
    Lack of Features
    2
    Limited Features
    2
    Compatibility Issues
    1
    Inadequate Protection
    1
    Limited OS Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MetaDefender features and usability ratings that predict user satisfaction
    9.2
    Ease of Use
    Average: 8.9
    10.0
    Access Control
    Average: 8.6
    10.0
    Compliance
    Average: 9.0
    8.3
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OPSWAT
    Company Website
    Year Founded
    2002
    HQ Location
    Tampa, Florida
    Twitter
    @OPSWAT
    7,228 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,124 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

MetaDefender Platform is an advanced threat prevention solution that lets organizations embed multi-layer file security into existing applications and security architectures, especially to protect com

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 43% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • MetaDefender is a tool that scans files from external sources and integrates into existing security workflows.
  • Users frequently mention the tool's ability to deliver clear scan results, its consistent performance even during high volumes, and its easy integration into existing systems.
  • Reviewers noted that the tool requires initial setup and policy tuning, especially for uncommon file types, and careful testing to avoid unnecessary blocking.
MetaDefender Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
6
Ease of Use
5
Security
5
Customer Support
4
Integrations
4
Cons
Lack of Features
2
Limited Features
2
Compatibility Issues
1
Inadequate Protection
1
Limited OS Support
1
MetaDefender features and usability ratings that predict user satisfaction
9.2
Ease of Use
Average: 8.9
10.0
Access Control
Average: 8.6
10.0
Compliance
Average: 9.0
8.3
Data Visibility
Average: 8.8
Seller Details
Seller
OPSWAT
Company Website
Year Founded
2002
HQ Location
Tampa, Florida
Twitter
@OPSWAT
7,228 Twitter followers
LinkedIn® Page
www.linkedin.com
1,124 employees on LinkedIn®
(30)4.9 out of 5
3rd Easiest To Use in Data Loss Prevention (DLP) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 63% Small-Business
    • 27% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BlackFog is a software that quietly operates to prevent data exfiltration with minimal interruption to the end user and a minimal install footprint.
    • Reviewers appreciate the ADX Vision feature for understanding the use of Shadow AI across their user base, the easy initial setup, the outstanding customer service, and the protection it provides against digital threats.
    • Reviewers noted the lack of ability to schedule reports to be delivered at regular intervals, the need for integration with SIEMs, the occurrence of false positives, and the absence of an option to require a password before uninstalling the app.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BlackFog Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    16
    Security
    16
    Customer Support
    12
    Ease of Use
    11
    Security Protection
    10
    Cons
    UX Improvement
    4
    MDM Issues
    3
    Alert Management
    2
    Complexity
    2
    Inadequate Security
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlackFog features and usability ratings that predict user satisfaction
    9.3
    Ease of Use
    Average: 8.9
    10.0
    Access Control
    Average: 8.6
    10.0
    Compliance
    Average: 9.0
    10.0
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BlackFog
    Company Website
    Year Founded
    2015
    HQ Location
    BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
    Twitter
    @blackfogprivacy
    1,482 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 63% Small-Business
  • 27% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BlackFog is a software that quietly operates to prevent data exfiltration with minimal interruption to the end user and a minimal install footprint.
  • Reviewers appreciate the ADX Vision feature for understanding the use of Shadow AI across their user base, the easy initial setup, the outstanding customer service, and the protection it provides against digital threats.
  • Reviewers noted the lack of ability to schedule reports to be delivered at regular intervals, the need for integration with SIEMs, the occurrence of false positives, and the absence of an option to require a password before uninstalling the app.
BlackFog Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
16
Security
16
Customer Support
12
Ease of Use
11
Security Protection
10
Cons
UX Improvement
4
MDM Issues
3
Alert Management
2
Complexity
2
Inadequate Security
2
BlackFog features and usability ratings that predict user satisfaction
9.3
Ease of Use
Average: 8.9
10.0
Access Control
Average: 8.6
10.0
Compliance
Average: 9.0
10.0
Data Visibility
Average: 8.8
Seller Details
Seller
BlackFog
Company Website
Year Founded
2015
HQ Location
BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
Twitter
@blackfogprivacy
1,482 Twitter followers
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Varonis is fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and de

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 65% Enterprise
    • 31% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Varonis is a data security platform that manages and monitors non-structured data to determine if documents contain sensitive data and need to be moved for better protection.
    • Users frequently mention that Varonis provides excellent visibility into sensitive data and user activity, automates threat detection, and helps reduce risks by controlling access effectively.
    • Reviewers mentioned that the platform can feel complex at first, requires time to learn all its features, and the cost can be high, especially for smaller or mid-market organizations.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Varonis Data Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    19
    Data Protection
    18
    Detailed Analysis
    17
    Features
    17
    Visibility
    16
    Cons
    Complexity
    17
    Learning Curve
    10
    Learning Difficulty
    10
    Steep Learning Curve
    8
    Complex Configuration
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Varonis Data Security Platform features and usability ratings that predict user satisfaction
    8.2
    Ease of Use
    Average: 8.9
    9.1
    Access Control
    Average: 8.6
    9.0
    Compliance
    Average: 9.0
    8.7
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Varonis
    Company Website
    Year Founded
    2005
    HQ Location
    New York, US
    Twitter
    @varonis
    6,376 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,729 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Varonis is fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and de

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 65% Enterprise
  • 31% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Varonis is a data security platform that manages and monitors non-structured data to determine if documents contain sensitive data and need to be moved for better protection.
  • Users frequently mention that Varonis provides excellent visibility into sensitive data and user activity, automates threat detection, and helps reduce risks by controlling access effectively.
  • Reviewers mentioned that the platform can feel complex at first, requires time to learn all its features, and the cost can be high, especially for smaller or mid-market organizations.
Varonis Data Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
19
Data Protection
18
Detailed Analysis
17
Features
17
Visibility
16
Cons
Complexity
17
Learning Curve
10
Learning Difficulty
10
Steep Learning Curve
8
Complex Configuration
7
Varonis Data Security Platform features and usability ratings that predict user satisfaction
8.2
Ease of Use
Average: 8.9
9.1
Access Control
Average: 8.6
9.0
Compliance
Average: 9.0
8.7
Data Visibility
Average: 8.8
Seller Details
Seller
Varonis
Company Website
Year Founded
2005
HQ Location
New York, US
Twitter
@varonis
6,376 Twitter followers
LinkedIn® Page
www.linkedin.com
2,729 employees on LinkedIn®
(696)4.6 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    #1 Global Leader in Data Resilience We keep businesses worldwide up and running From secure backups to intelligent data insights, Veeam Data Platform is engineered to tackle the realities of t

    Users
    • IT Manager
    • System Administrator
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 59% Mid-Market
    • 23% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Veeam Data Platform is a backup and recovery solution that provides data protection for on-prem, virtualized, and cloud environments.
    • Users like the platform's reliability, fast recovery times, wide range of features, and its ability to work on multiple devices and platforms.
    • Reviewers noted that the initial setup and licensing model can be complex, the platform can be resource-intensive, and the interface can feel complex at times.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Veeam Data Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    105
    Backup Solutions
    103
    Backup Frequency
    67
    Reliability
    67
    Easy Setup
    57
    Cons
    Backup Issues
    34
    Expensive
    34
    Licensing Issues
    24
    Backup Problems
    20
    Complex Setup
    20
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veeam Data Platform features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 8.9
    8.3
    Access Control
    Average: 8.6
    8.3
    Compliance
    Average: 9.0
    8.3
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Veeam
    Company Website
    Year Founded
    2006
    HQ Location
    Columbus, OH
    Twitter
    @veeam
    51,641 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,666 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

#1 Global Leader in Data Resilience We keep businesses worldwide up and running From secure backups to intelligent data insights, Veeam Data Platform is engineered to tackle the realities of t

Users
  • IT Manager
  • System Administrator
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 59% Mid-Market
  • 23% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Veeam Data Platform is a backup and recovery solution that provides data protection for on-prem, virtualized, and cloud environments.
  • Users like the platform's reliability, fast recovery times, wide range of features, and its ability to work on multiple devices and platforms.
  • Reviewers noted that the initial setup and licensing model can be complex, the platform can be resource-intensive, and the interface can feel complex at times.
Veeam Data Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
105
Backup Solutions
103
Backup Frequency
67
Reliability
67
Easy Setup
57
Cons
Backup Issues
34
Expensive
34
Licensing Issues
24
Backup Problems
20
Complex Setup
20
Veeam Data Platform features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 8.9
8.3
Access Control
Average: 8.6
8.3
Compliance
Average: 9.0
8.3
Data Visibility
Average: 8.8
Seller Details
Seller
Veeam
Company Website
Year Founded
2006
HQ Location
Columbus, OH
Twitter
@veeam
51,641 Twitter followers
LinkedIn® Page
www.linkedin.com
6,666 employees on LinkedIn®
(68)4.4 out of 5
View top Consulting Services for Netskope One Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Netskope is the leader in cloud security — we help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our Cloud XD™ technology targets and controls activit

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 59% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Netskope One Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Security
    5
    Features
    4
    Visibility
    4
    Cybersecurity
    3
    Cons
    Complex Configuration
    5
    Complex Implementation
    4
    Complexity
    3
    Difficult Learning
    3
    Difficult Learning Curve
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Netskope One Platform features and usability ratings that predict user satisfaction
    8.5
    Ease of Use
    Average: 8.9
    8.3
    Access Control
    Average: 8.6
    8.1
    Compliance
    Average: 9.0
    8.8
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Netskope
    Year Founded
    2012
    HQ Location
    Santa Clara, CA
    Twitter
    @Netskope
    11,260 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,131 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Netskope is the leader in cloud security — we help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our Cloud XD™ technology targets and controls activit

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 59% Enterprise
  • 32% Mid-Market
Netskope One Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Security
5
Features
4
Visibility
4
Cybersecurity
3
Cons
Complex Configuration
5
Complex Implementation
4
Complexity
3
Difficult Learning
3
Difficult Learning Curve
3
Netskope One Platform features and usability ratings that predict user satisfaction
8.5
Ease of Use
Average: 8.9
8.3
Access Control
Average: 8.6
8.1
Compliance
Average: 9.0
8.8
Data Visibility
Average: 8.8
Seller Details
Seller
Netskope
Year Founded
2012
HQ Location
Santa Clara, CA
Twitter
@Netskope
11,260 Twitter followers
LinkedIn® Page
www.linkedin.com
3,131 employees on LinkedIn®
(148)4.6 out of 5
Optimized for quick response
12th Easiest To Use in Data Loss Prevention (DLP) software
Save to My Lists
Entry Level Price:$15.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Teramind is a unified workforce intelligence and cybersecurity platform that provides organizations with comprehensive visibility into employee activity, data movement, and insider risk across endpoin

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 54% Small-Business
    • 39% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Teramind is a platform that allows companies to track progress, improve consistency, and enhance productivity by monitoring employee activities.
    • Users frequently mention the platform's excellent visibility, detailed analytics, behavior alerts, customizable policies, and the ability to monitor remote employees as key benefits.
    • Reviewers noted that the user interface can be difficult to navigate, especially for new administrators, and that setting time-based filters specifically associated with application execution could be improved.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Teramind Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    9
    Monitoring
    8
    Ease of Use
    7
    Employee Monitoring
    6
    Remote Management
    6
    Cons
    Complexity
    3
    Difficult Setup
    3
    Dashboard Issues
    2
    Difficult Navigation
    2
    Inadequate Monitoring
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Teramind features and usability ratings that predict user satisfaction
    8.9
    Ease of Use
    Average: 8.9
    8.9
    Access Control
    Average: 8.6
    8.9
    Compliance
    Average: 9.0
    9.2
    Data Visibility
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Teramind
    Company Website
    Year Founded
    2014
    HQ Location
    Aventura, FL
    Twitter
    @teramindco
    877 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    192 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Teramind is a unified workforce intelligence and cybersecurity platform that provides organizations with comprehensive visibility into employee activity, data movement, and insider risk across endpoin

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 54% Small-Business
  • 39% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Teramind is a platform that allows companies to track progress, improve consistency, and enhance productivity by monitoring employee activities.
  • Users frequently mention the platform's excellent visibility, detailed analytics, behavior alerts, customizable policies, and the ability to monitor remote employees as key benefits.
  • Reviewers noted that the user interface can be difficult to navigate, especially for new administrators, and that setting time-based filters specifically associated with application execution could be improved.
Teramind Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
9
Monitoring
8
Ease of Use
7
Employee Monitoring
6
Remote Management
6
Cons
Complexity
3
Difficult Setup
3
Dashboard Issues
2
Difficult Navigation
2
Inadequate Monitoring
2
Teramind features and usability ratings that predict user satisfaction
8.9
Ease of Use
Average: 8.9
8.9
Access Control
Average: 8.6
8.9
Compliance
Average: 9.0
9.2
Data Visibility
Average: 8.8
Seller Details
Seller
Teramind
Company Website
Year Founded
2014
HQ Location
Aventura, FL
Twitter
@teramindco
877 Twitter followers
LinkedIn® Page
www.linkedin.com
192 employees on LinkedIn®

Learn More About Data Loss Prevention (DLP) Software

What is Data Loss Prevention (DLP) Software?

Data loss prevention (DLP) software helps companies ensure their sensitive data is not leaked, lost, or stolen. Data loss prevention (DLP) software provides data security by enforcing company policies that determine who can view, change, or share sensitive data. DLP tools secure data by identifying sensitive data, classifying it, monitoring its usage, and then taking actions to stop data misuse by preventing user access and actions, alerting administrators, quarantining suspicious files, encrypting data, or taking other actions to remediate when necessary.

Data loss prevention (DLP) software protects data in three states—data in use, data in motion, and data at rest.

  • Data in use refers to data that is used on an endpoint such as a laptop, mobile device, or tablet. An example would be an employee attempting to copy and paste sensitive data using their laptop.
  • Data in motion refers to data moving over an internal or external network to a user’s endpoint. DLP software monitors when data is transmitted across networks and via email or other communication methods.
  • Data at rest refers to data stored in databases, cloud repositories, computers, mobile phones, or other similar devices. DLP software protects data at rest by restricting it’s access to approved users, encrypts it, or deletes it based on the organization’s retention policies.

Data loss prevention (DLP) software protects data using predefined policies to identify, classify, monitor, and protect data to meet business and regulatory compliance. For example, if an employee sends an email to a customer and attaches proprietary company information, the data loss prevention (DLP) software will prevent the email with protected data from being sent. In this example, the DLP software prevented data leakage. Another example would be preventing someone—whether an internal employee or a hacker who breached the company’s traditional perimeter security—from inflicting damage to the company by deleting data. Data protected by DLP software as defined by company policies would be blocked from deletion. In this example, the DLP software prevented data loss.

Key Benefits of Data Loss Prevention (DLP) Software

  • Identify, classify, monitor, and protect sensitive data including personally identifiable information (PII), protected health information (PHI), payment card information (PCI), intellectual property (IP), confidential corporate information, sensitive research, and other important data as defined by the company
  • Prevent data from being leaked, stolen, or lost by both internal and external actors
  • Alert administrators or remediate incidents
  • Help companies meet compliance requirements such as privacy, payments, health, or other global data protection regulations

Why Use Data Loss Prevention (DLP) Software?

Companies use DLP software to protect their sensitive data. Today’s workforce is increasingly mobile. Employees use devices, such as mobile phones and laptops, to access both on-premises and cloud-based company applications. Because of this ability to access company data while not physically in the office, organizations’ data security strategies must evolve. Companies use DLP software to help them employ a data-centric security strategy which secures the data itself, in addition to traditional network-centric security strategies which secure the perimeter, such as a network. This is particularly helpful for companies that allow employees to bring their own device to use for work.

In the event of a data breach, companies that have employed DLP software can reduce the expense of recovery, especially if the breached data was not sensitive data or was encrypted, rendering it useless to other parties without the encryption keys. Companies may also be able to reduce their cyber liability insurance premiums by using data security software such as DLP software.

To use an analogy on protecting the data itself, imagine a burglar robs a jewelry store by smashing in the front door and then the jewelry cases. What did the burglar take? They likely took gold, silver, and diamond jewelry, among other precious gems. Did they take the jewelry stands or any empty jewelry gift boxes laying around? No, because those have low value. Similarly, not all data is valuable; hackers are typically after sensitive data (gems). Hackers will break through network security (the doors and jewelry cases) to get to sensitive data (jewelry). But what if the data itself was protected and thus hard to steal? In the jewelry robbery example, imagine if the jewelry was bolted down in the cases, had explosive ink tags attached to it, or was locked in an overnight safe instead of left out. What then? The concept of protecting data using DLP software is similar.

The main reasons companies use data loss prevention (DLP) software include:

Protect sensitive data — Sensitive data is valuable to companies and therefore it is also valuable to bad actors and hackers. Companies protect their sensitive data, such as personally identifiable information (PII) like social security numbers, intellectual property (IP) such as source codes or product development maps, and other sensitive data like financial data or customer data.

Enable secure data use on mobile devices — Today’s workforce increasingly brings their down devices to work or works remotely with a variety of endpoints. Companies can take more steps to secure their data by using DLP software.

Prevent data leaks — DLP software prevents accidental or willful data leaks caused by employees or insider threats.

Prevent data loss — DLP software prevents data loss by preventing users from deleting files they do not have permission to.

Detect data breaches — DLP software can alert administrators to suspicious activity and stop data exfiltration attempts or data breaches currently in progress.

Understand data usage — Sensitive data is stored in multiple databases, both on-premises and in the cloud, applications, other systems, networks, and on endpoints. DLP software discovers sensitive data, classifies it, and monitors it; this reporting gives organizations visibility into how their data is used. This information can provide key insights on a business’s data strategy.

Maintain customer trust — Due to major data breaches becoming so commonplace, end users have become wary about how their data is used and want to know their data is protected by companies who store it. Using DLP tools helps companies protect customer data and ultimately protect their brands while gaining their customers’ trust.

Meet business partner compliance — Not only are end users demanding better data protection from providers, but increasingly so are business partners. Many business partners contractually obligate companies to protect sensitive data or pay financial penalties. Many business partners audit the companies they do business with to ensure they have adequate data security to protect sensitive data.

Comply with governmental regulations — In some jurisdictions, data protection policies are codified into law. Regulatory bodies enforcing data protection laws such as the General Data Protection Regulation (GDPR) require reports from companies proving compliance with the law. If a company is found non-compliant, they can face steep fines.

Who Uses Data Loss Prevention (DLP) Software?

All organizations can benefit from using DLP software, however, enterprise-level companies in highly-regulated industries such as health care, finance, manufacturing, energy, and government are the most likely to use DLP software. With the adoption of more privacy regulations codifying data security into law, such as GDPR and the California Consumer Privacy Act (CCPA),more mid-level and small companies can benefit from DLP software.

Employees within a company that may use DLP software, include:

CISOs and InfoSec teams — InfoSecurity teams use DLP software to secure the business and its data.

IT teams — Some IT teams may be responsible for administering DLP software.

C-suite — C-level executives like CEOs and CMOs use DLP software to protect intellectual property (IP) and protect the value of the brand by securing customers’ personally identifiable information or other sensitive data.

Everyday employees — Everyday employees may encounter DLP software if they try to take an action, such as sharing sensitive data, which is not allowed by their company’s policy.

Kinds of Data Loss Prevention (DLP) Software

There are generally four kinds of DLP software companies use.

On-premise storage DLP — On-premise storage DLP identifies and protects sensitive data in databases, servers, and file shares.

Cloud DLP — Cloud DLP is similar to on-premise storage DLP, but focuses on finding sensitive data in cloud storage. The connection to cloud storage is achieved through application programming interfaces (APIs).

Network DLP — Network DLP monitors sensitive data across a company’s network. This includes scanning email, web, social media, and other communication methods to ensure compliance with the company’s sensitive data policy. This monitoring function is achieved by using a physical appliance or by passing network traffic through a dedicated virtual machine.

Endpoint DLP — Endpoint DLP protects sensitive data on laptops, mobile phones, and other endpoints through software installed on the device. Endpoint DLP also allows companies to block certain activities, such as preventing specific file types from being loaded onto mobile devices.

Data Loss Prevention (DLP) Software Features

Central policy management — DLP software uses a specific company’s policies to protect sensitive data and meet specific compliance regulations. DLP software is a central place to create, enforce, and manage policies on a user-friendly dashboard.

Incident detection and management — DLP software informs administrators of policy violations in real time, and offers incident management functions that allow administrators to manage these events.

Data identification — For DLP software to protect data, it needs to know where the data is. DLP solutions offer both content analysis and context analysis.

Data classification — DLP tools categorize data based on their sensitivity and apply policies such as who should have access to it and or what actions they can take with the data.

Integrations — DLP software should include pre-built integrations with major platforms, directories, email providers, applications, and other areas where company data is stored.

Reporting — DLP software includes reporting tools, such as pre-built templates and customizable reports, which are useful for showing compliance to regulators, auditors, forensic teams, incident response teams, and other parties.