GetApp offers free software discovery and selection resources for professionals like you. Our service is free because software vendors pay us when they generate web traffic and sales leads from GetApp users. Because we’re committed to help you find the right solution for your business needs, we list all software vendors on our website, and give them the opportunity to feature their solutions and collect user reviews. At GetApp, our comprehensive software listings, verified user reviews, software evaluation scorecards, product comparison pages and articles will empower you to make confident and well-informed purchase decisions.
Here's our list of apps for Data Loss Prevention. Filters help you narrow down the results to find exactly what you’re looking for.
Fast, secure data loss prevention software for businesses and IT providers.
Comet is a flexible, all-in-one backup platform available in 12 languages. You choose your backup environment and storage destinations.
Simple, profitable pricing. No contracts. 30-day FREE trial!
Read more about Comet Backup
Kasm Workspace was developed for the US Government as a secure virtualized workspace for interacting with highly sensitive data that has built in security controls and access restrictions that prevent data loss/sharing.
Read more about Kasm Workspaces
NinjaOne is the world's easiest-to-use unified IT operations platform. IT leaders use Ninja to maintain infrastructure, manage endpoints, and support end-users in a single, seamless solution that improves technician efficiency, enables automation, and improves end-user satisfaction.
Read more about NinjaOne
Acronis Cyber Protect Cloud is a unique integration of backup with comprehensive anti-malware protection and endpoint management tools. This synergy eliminates complexity, so service providers can protect customers better while keeping costs down.
Read more about Acronis Cyber Protect Cloud
Unitrends Backup is a cloud-based and on-premise solution designed to assist businesses of all sizes manage processes related to data recovery and protection. Features include pattern recognition, predictive analytics, email alerts, and data replication and deduplication.
Read more about Unitrends Backup
Spectral is a cloud-based software that enables teams to ship & build software while avoiding security mistakes, misconfigurations, credential leakage and data breaches without agents, across the entire software development lifecycle.
Read more about SpectralOps
Acronis Cyber Protect is a cloud-based software that helps businesses leverage artificial intelligence (AI) technology to detect cybersecurity threats across IT assets and endpoint systems. Supervisors can perform vulnerability assessments, deploy security patches, and remotely prevent threats.
Read more about Acronis Cyber Protect
Teramind DLP is an on-premise data loss prevention software designed to help businesses monitor and gain insights into user activities to prevent data breaches. Managers can utilize digital inspection techniques to categorize sensitive information and use prebuilt templates to create policies.
Read more about Teramind DLP
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.
Read more about Malwarebytes for Business
Google Cloud Platform is a modular-based platform providing multiple build and scale services to businesses of any size within any industry. It offers tools for document storage, data warehousing, security key enforcement, app creation, API management, AI and machine learning, live chat, and more.
Read more about Google Cloud Platform
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.
Read more about ESET Endpoint Security
Device control software. Enforce the exclusive use of authorized peripheral devices. Block USB portable storage devices and restrict file transfers to protect sensitive data against theft.
Read more about AccessPatrol
GoodAccess is a cloud VPN that helps remote teams to securely access business systems, cloud apps and other resources. In 10 minutes you create resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.
Read more about GoodAccess
Veeam Backup & Replication is business continuity and backup management software that helps businesses manage data recovery, orchestrate disaster recovery strategies, handle storage processes, and more on a centralized platform. It allows staff members to reuse backup data to handle mining, testing, and DevOps operations.
Read more about Veeam Backup & Replication
Zscaler is a cloud-based secure internet and web gateway designed to help businesses manage IT security across multiple devices, users, corporate infrastructure, and locations. Its ByteScan engine inspects each inbound and outbound byte, Secure Sockets Layer (SSL) traffic, and other inline content from within a unified platform.
Read more about Zscaler
Content-aware policies normally reserved for standalone enterprise technology help companies of all sizes guard against insider threats. SilverSky protects small and mid-sized businesses with solutions to prevent targeted attacks, social engineering attacks and data exfiltration.
Read more about SilverSky Email Protection Suite
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking.
Read more about DriveStrike
Instant data warehousing, replication, integration, and compliance for 100+ data sources. Relational Junction unifies all of your data to one place for robust reporting and analytics. And that's not all! Our patented technology allows for the fastest possible data movement.
Read more about Relational Junction
Google Workspace Management, Email Signature, Contact Sharing, Drive Management and more.
Patronum takes the Google Workspace (G Suite) administrators wish list in order to create a set of must-have features to transform the way Google Workspace users, groups and resources are managed.
Read more about Patronum
BetterCloud provides critical insights, automated management, and intelligent data security for SaaS applications. By leveraging open APIs, BetterCloud securely connects with your data at its source, providing maximum control without requiring any cumbersome setup.
Read more about BetterCloud
Forcepoint DLP is a cloud-based data loss prevention software, which helps businesses identify, investigate, and mitigate potential risks to critical assets and information. Features include policy enforcement, behavioral analytics, and data discovery and classification.
Read more about Forcepoint DLP
Protect Windows systems and Office 365 Data from cyberthreats, natural disaster, human error and sabotage. On-premise and cloud backup solutions that perform automatic, scheduled backups to a variety of backup devices.
Read more about BackupAssist
Endpoint Protector is a data loss prevention tool which assists businesses of all sizes with data encryption and file scanning. Key features of the platform include compliance management and reporting, policy management, device control, and sensitive data identification.
Read more about Endpoint Protector
Chimpa UEM helps manage, monitor, and secure various Android and iOS-based devices like digital signage, interactive displays, service kiosks, single-purpose devices, and more. Users can protect devices from unauthorized access, data theft, and intrusion using role-based permissions.
Read more about Chimpa
INKY is an endpoint protection tool that helps businesses leverage artificial intelligence (AI) technology and machine learning capabilities to identify and prevent phishing attacks. INKY can be integrated with Microsoft Exchange, Google Workspace and other applications.
Read more about Inky
Real-time cross-platform file replication, data distribution, and file synchronization between different operating systems, different cloud providers, and different geographic sites.
Read more about EDpCloud
MVISION Cloud, formerly known as McAfee Skyhigh Security Cloud, is a cloud security software that gives companies more visibility into their cloud usage while ensuring data privacy & enforcing compliance policies.
Read more about MVISION Cloud
Aware is a data governance, data loss prevention, and intelligence application for businesses in all industry sectors. Key features include policy creation, metadata extractions, data captures & transfers, OCR, integrations, reporting & collaboration tools, search & filters, archiving, and more.
Read more about Aware
Nightfall DLP is a cloud-based data loss prevention software designed to help businesses discover, manage, classify, and protect sensitive data using machine learning technology.
Read more about Nightfall DLP
Exabeam is an analytics and automation solution for accelerated threat detection. It helps security teams add intelligence to their existing security tools – including SIEMs, XDRs, cloud data lakes, and hundreds of other business and security products.
Read more about Exabeam
Built to help simplify data protection on AWS, Clumio's secure isolated backup service enables organizations to meet strict compliance requirements, put a gap between data and bad actors, backup and restore data in minutes, and optimize cloud storage.
Read more about Clumio
Acronis True Image is a cybersecurity and threat detection platform for applications, files, and systems that provides real-time protection from cyber threats, ransomeware, and cryptojacking attacks. The system comes with vulnreability assessments that automatically provide safety recommendation updates as well as on-demand antivirus scans from...
Read more about Acronis True Image
Veeam Backup for Microsoft Office 365 is designed to help businesses schedule backups and restore data for various Microsoft 365 applications such as SharePoint Online, OneDrive for Business, Exchange Online, and Microsoft Teams. The application enables employees to streamline data recovery, mining, testing, filtering, and storage operations via a...
Read more about Veeam Backup for Microsoft Office 365
M365 Manager Plus is a reporting, auditing, monitoring, management, and security solution for Microsoft 365. Designed for businesses of all sizes, it helps users manage Exchange Online, Azure AD, Microsoft Teams, OneDrive for Business, and other services from a centralized dashboard.
Read more about M365 Manager Plus
Disaster Recovery as a Service (DRaaS) is a data loss prevention software that helps organizations automatically trigger data replication operations. Administrators can create failover plans to identify virtual machines (VM) that require a failover during disaster recovery scenarios.
Read more about Disaster Recovery as a Service
Aperture is a cloud-based data protection and IT security solution for Microsoft security products including Office 365 DLP, Azure Information Protection (AIP), and Microsoft Cloud App Security (CAS). It enables data protection via scanning, alerts, incident reports, and more.
Read more about Aperture
euBackups is a cloud-based software designed to help organizations backup data stored across laptops, virtual machines and datacenters to recover lost data. It enables IT professionals to monitor backup processes for multiple devices from a unified control panel and restore corrupted data.
Read more about euBackups
Qostodian Recon™ restores visibility and accelerates an organization’s ability to find and secure data even in the most remote locations. With Recon’s industry-leading scan times, security teams achieve immediate time to value and get contextualized results.
Read more about Qostodian Recon
Vendors bid for placement within our listings. This option sorts the directory by those bids, highest to lowest. Vendors who bid for placement can be identified by the blue “Visit Website” button on their listing.
Sorts products as a function of their overall star rating, normalized for recency and volume of reviews, from highest to lowest.