Data Loss Prevention Software

Data Loss Prevention Software schützt unternehmensweite sensible Daten, indem sie potenzielle Datenschutzverletzungen erkennt und hilft, diese zu beseitigen.

Warum Capterra kostenlos ist

von CloudAlly

(39 Bewertungen)
CloudAlly ist eine Cloud-to-Cloud-Backup-und Recovery-Lösung, die tägliche Änderungen in Deiner SaaS sichet,, hin zu unbegrenztem Amazon S3 Speicher. Die Änderungen können erneut gespeichert oder exportiert werden. Nur ein Klick, um deine Cloud-Daten zu speichern / wiederherzustellen. Warum sind meine Cloud-Daten nicht sicher? Beliebte Online-Dienste wie Office 365, Google Apps und Salesforce verlassen sich immer noch auf den Papierkorb für die Datenrettung. Das bedeutet, dass deine Daten für immer verloren sind, sobald der Papierkorb manuell oder automatisch gelöscht wird. Erfahre mehr über Office 365 backup Cloud-to-Cloud-Backup- und Recovery-Lösung, die tägliche Änderungen in deiner SaaS sichert, hin zu unbegrenztem Amazon S3 Speicher. Erfahre mehr über Office 365 backup

von WorkPuls

(39 Bewertungen)
60% of costly digital attacks happen from within. Empluse prevents insider threats to make your workplace safe, secure and productive. Monitor employee behavior around-the-clock, secure your companys data, and protect your bottom line with insider threat detection, data loss prevention, employee monitoring, IT Forensics and more. All from a refreshingly intuitive dashboard. Finally, sophisticated endpoint cybersecurity thats simple to use. Erfahre mehr über empulse Endpoint security for companies who care about their data: insider threat detection, data loss prevention, employee monitoring & more. Erfahre mehr über empulse
Eliminiert alle Arten von Bedrohungen, einschließlich Viren, Malware, Ransomware, Rootkits, Würmer und Spyware, mit optionalem Cloud-basiertem Scannen für noch bessere Leistung und Erkennung. ESET verwendet mehrschichtige Technologien, die weit über die Möglichkeiten von Antivirenprogrammen hinausgehen. Enthält Anti-Spyware-, Anti-Phishing-, Web-Kontroll-, Anti-Spam- und Botnet-Schutz mit Remote-Management-Funktion. Erfahre mehr über ESET Endpoint Security Enthält Anti-Spyware-, Anti-Phishing-, Web-Kontroll-, Anti-Spam- und Botnet-Schutz mit Remote-Management-Funktion. Erfahre mehr über ESET Endpoint Security

von Teramind

(51 Bewertungen)
– Intelligenter Schutz vor Datenverlust: Mitarbeiterüberwachung, Nutzerverhaltensanalysen und Software zum Schutz vor Datenverlust auf einer einzigen Plattform – Leistungsfähige und flexible Engine für Richtlinien und Vorschriften mit webbasiertem Management-Dashboard – Out-of-the-Box-Integration in führende SIEM-Plattformen für Echtzeitbenachrichtigungen und -aktionen – Umfassende, anpassbare Berichterstattung – Cloud-/Private-Cloud-/Rechenzentrumsbereitstellungsoptionen für kleine, mittlere und große Unternehmen – Einhaltung von Anforderungen in den Bereichen Compliance, Überwachung, Audit und Forensik gemäß DSGVO, HIPAA, PCI und mehr Erfahre mehr über Teramind DLP Software für die Mitarbeiterüberwachung und DLP-Software (Data Loss Prevention) – Bereitstellungsoptionen für die Cloud, das eigene Rechenzentrum, Private Clouds und AWS. Erfahre mehr über Teramind DLP
Symantec Data Loss Prevention (DLP) provides a comprehensive approach to information protection that embraces todays cloud- and mobile-centered realities. Provides a comprehensive approach to information protection that embraces todays cloud- and mobile-centered realities.

von DeviceLock

(0 Bewertungen)
Bietet sowohl kontextbezogene als auch inhaltsbasierte Kontrolle für maximale Leckageprävention bei minimalen Vorab- und Betriebskosten. Bietet sowohl kontextbezogene als auch inhaltsbasierte Kontrolle für maximale Leckageprävention bei minimalen Vorab- und Betriebskosten.

von CoSoSys

(3 Bewertungen)
Cloud solution with data loss prevention and mobile device management, subscription and client deployment management functionality. Cloud solution with data loss prevention and mobile device management, subscription and client deployment management functionality.

von NeoCertified

(38 Bewertungen)
NeoCertified's secure email solution is an essential piece for your DLP strategy for businesses looking to protect confidential information, while meeting compliance obligations. NeoCertified gives you the flexibility and assured protection that you're looking for in an encryption provider. An included Microsoft Outlook-integrated button, a 24/7 customer support team, and commercial-grade encryption -- NeoCertified 's the upgrade your DLP solution has needed. Receive a personalized quote. NeoCertified provides an essential component for your DLP strategy: a trusted secure email solution for businesses of all industries.

von CloudCodes

(3 Bewertungen)
Bridging the SECURITY gap between the enterprise and cloud with seamlessly integrated CASB solutions agile enough to suit all industry verticals. One integrated for multiple solutions like Single Sign On, Data Loss Prevention, Shadow IT, Access Control, Identity Management and more. CloudCOdes is one of the most preferres CASB solution provider by SMBs globally. Most preferred CASB vendor for SMBs globally - Single Sign On, Data Loss Prevention, Identity Management, Shadow IT, Access Control,etc

von McAfee

(25 Bewertungen)
DLP app that protects intellectual property or financial data from unexpected disappearance via virtual data protection policies. DLP app that protects intellectual property or financial data from unexpected disappearance via virtual data protection policies.

von LC Technology

(4 Bewertungen)
FILERECOVERY recovers deleted and lost files from all types of media, including hard drives, flash drives and more. Whether you need to recover files from a hard rive, flash drive, GoPro camera or others, FILERECOVERY will recover your lost data. Easy to use. Recovery is just a few mouse clicks away. FILERECOVERY® recovers deleted and lost files from all types of media, including hard drives, flash drives and more. Easy to use.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and databases, and alert you which servers are the culprits. There is no need to install endpoints as DataSense's architecture allows for central management without the pain of trying to install agents for reporting. Centrally managed system that scans for sensitive data such as social security numbers for data at rest.

von Digital Guardian

(2 Bewertungen)
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration. Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration.

von Check Point Software Technologies

(1 Bewertung)
Cloud DLP app that allows businesses to protect data from unforeseen loss via document watermark and protocol inspection. Cloud DLP app that allows businesses to protect data from unforeseen loss via document watermark and protocol inspection.

von Clearswift

(1 Bewertung)
DLP app for businesses of any types that lets IT securities analyze content, reveal and delete sensitive data, and protect devices. DLP app for businesses of any types that lets IT securities analyze content, reveal and delete sensitive data, and protect devices.

von Forcepoint

(1 Bewertung)
Solution that lets enterprises prevent unforeseen data leakage using incident risk ranking, pre-defined policy templates, and OCR. Solution that lets enterprises prevent unforeseen data leakage using incident risk ranking, pre-defined policy templates, and OCR.

von Coworkshop Solutions

(0 Bewertungen)
A data loss prevention solution with features to maintain document security and keep files in the system. A data loss prevention solution with features to maintain document security and keep files in the system.

von CA Technologies

(0 Bewertungen)
Prevent office or home applications against data leakage with Runtime Application Self Protection (RASP) tool that controls devices and blocks threat attacks. Prevent office or home applications against data leakage with tool that controls devices and blocks threat attacks.
DLP-System, das die Online-Kommunikation von Unternehmen steuert, den Zugriff bei einer Verletzung von HTTP-, HTTPS- und FTP-Richtlinien unterbindet und sensible Daten erkennt.

von Comodo Group

(0 Bewertungen)
System that protects office applications from internal or external data loss, detects private data, and alerts about possible leakage. System that protects office applications from internal or external data loss, detects private data, and alerts about possible leakage.

von WatchGuard

(0 Bewertungen)
PCI- und HIPPA-konforme DLP-App, mit der Unternehmen jeder Größe Online-Inhalte schützen, kategorisieren und sensible Daten offenlegen können.

von Prime Factors

(0 Bewertungen)
EncryptRIGHT is multi-purpose data encryption, tokenization and key management software suite EncryptRIGHT is multi-purpose data encryption, tokenization and key management software suite

von falcongaze

(0 Bewertungen)
Enterprise DLP solution with a lot of functionality for user monitoring and analysis. Enterprise DLP solution with a lot of functionality for user monitoring and analysis.

von Striim

(0 Bewertungen)
Striim combines real-time data integration, stream analytics, and visualization in a single platform. It continuously ingests a wide variety of semi-structured, unstructured, and structured data, including data from enterprise databases via change data capture. It offers built-in validation, SQL-based stream processing such as filtering, transformations, aggregations, and enrichment, multi-source correlation, complex pattern matching, predictive analytics, and real-time dashboards with alerts. Real-time data integration from databases, logs, messaging, cloud, sensors with built-in validation, stream analytics, and dashboards

von Stellar Data Recovery

(0 Bewertungen)
Stellar Phoenix Mailbox Exchange Recovery software repairs severely corrupt or damaged Microsoft Exchange Server Database (EDB) files efficiently and swiftly. With this powerful software, you can recover all the components of an EDB file including contacts, calendars, emails, attachments journals, and tasks.The software scans corrupt EDB files, repairs them and shows the preview of all recoverable mailbox items. Users can then select the required mailbox items and save it in several formats. Stellar Phoenix Mailbox Exchange Recovery efficiently repairs corrupt Exchange Database (EDB) files.

von ManageEngine

(0 Bewertungen)
O365 Manager Plus is a reporting, auditing, monitoring, management, and alerting solution for Office 365. With this solution, easily administer Exchange Online, Azure AD, Skype for Business, OneDrive for Business, and other Office 365 services from one place. Comply with industrial mandates with detailed audit reports. Create custom roles for cross-tenant and domain-based delegation.Monitor the Office 365 setup 24X7 and receive real-time emailnotifications when service degradation occurs. O365 Manager Plus is the one-stop Office 365 solution with reporting, auditing, monitoring, management, alerting, and delegation capabi

von Panda Security

(0 Bewertungen)
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface. Data Control is designed to assist in complying with data protection regulations, as well as discovering and protecting sensitive data.

von SolarWinds Security Management

(0 Bewertungen)
ARM enables IT and security admins to centrally provision, deprovision, manage, and audit user access rights to systems, data, and files while protecting their organizations from security breaches and complying with regulatory requirements. Customized reports show who has access to what, and when access can be generated to support compliance standards. User provisioning and deprovisioning can also be performed using role-specific templates. Access Rights Manager (ARM) is designed for IT or security admins responsible for providing and monitoring user access to systems and d

von Prosoft Engineering

(0 Bewertungen)
Our data recovery software can retrieve photos or videos and important business or school documents for you with a few simple steps. Our data recovery software can retrieve photos or videos and important business or school documents for you with a few simple steps.