Buyer's Guide

Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Choose the right DLP tools to help execute your DLP strategy

Protecting data and preventing leaks is the key to making sure a company's data stays valuable, and that the company remains compliant. Choose the right DLP tools that best match your company's data types and flow.

Introduction

Data loss prevention is both an enterprise security strategy and a category of software and hardware. The execution of a strategy should go hand in hand with DLP tools, but often, they do not.

More and more companies are dealing with sensitive, personal or valuable data, and if businesses don't have a data loss prevention (DLP) strategy or the coinciding software, they are risking that data falling into the wrong hands, or being noncompliant and potentially losing millions of dollars. Knowing the type of DLP product your company needs is crucial for your business to protect itself, its data, its employees and its customers.

There are different types of data with which all companies deal. Government agencies, health insurance companies and financial institutions deal with very different types of data.

Businesses store financial and tax data they receive when working with vendors and customers. This data resides in different areas of a company's infrastructure. It travels through the business in many different ways and to many different endpoints, like mobile devices and cloud-based file sharing systems.

Much like the data that they protect, not all DLP products are the same. Stand-alone DLP products are built solely for the purpose of protecting data and preventing leaks holistically. Meanwhile, integrated products protect one aspect of the data, whether it is data in use, in motion or at rest. Other data loss prevention functions can be found in other perimeter security gateways, such as endpoint security gates or intrusion prevention systems.

The size of a business, or the industry it's in will determine what type of DLP tools a company should deploy (or if it even needs DLP).

To assist in determining whether a business should procure DLP software or hardware, this buyer's guide dives into DLP technology, what DLP tools do, the business scenarios in which one should deploy DLP and the criteria to keep in mind when procuring DLP products. It presents a how-to on creating a DLP strategy, mapping data flows and classifying data. It compares stand-alone and integrated vendors in the DLP market, and offers insight into other technologies that are complementary to DLP software.

1What is?-

DLP tools help identify and plug data leaks

To properly deploy DLP software or appliances, businesses need to know what DLP is, and what type of data different DLP tools protect.

Feature

A primer on data loss prevention and DLP tools

Not all DLP tools are built the same. Stand-alone DLP tools differ greatly from integrated DLP software and appliances. Knowing the distinction is vital. Continue Reading

2Do I need?-

Use cases for DLP software and appliances

A DLP strategy and DLP tools can help businesses shore up their data security, potentially saving millions of dollars and avoiding litigation. These use cases can help companies determine if they need DLP tools or not and, if so, which type.

Feature

Determine what type of DLP tools businesses need (and if they need them in the first place)

DLP is a necessity for some companies, but other businesses may already be employing data loss prevention functionalities and not even know it. See where the differences lie. Continue Reading

Feature

Three instances where DLP tools are a necessity

A regional medical center. A growing tech company. A health insurance company. These businesses all have something in common: They need DLP to protect their data assets. Continue Reading

3How to buy-

Map out and classify data before purchasing DLP tools

Creating a data flow map and a data classification policy are the first crucial steps a business should take before procuring DLP tools. Once a company knows the type of data it has, how it moves and where it resides, it needs to know the criteria for assessing DLP software or appliances.

Feature

The six steps to finding the right DLP tools

Before deciding on which DLP software or appliance to choose, businesses need to follow this roadmap of the DLP selection process. Continue Reading

Feature

Matching up the right type of DLP tools with certain business scenarios

Three very different data scenarios, three different types of DLP tools. See which kind of DLP tool works best for large, growing and geographically distributed companies. Continue Reading

Feature

Know where data is processed, how it moves and where it's stored with a data flow map

The key to selecting the right DLP software is to first know where sensitive data is stored, how it moves across a company and where it's processed. Once those questions are answered, the DLP tools selection process can begin. Continue Reading

Feature

DLP tools are of little use unless a data classification policy is in place

When a company deals with an extremely large amount of data, it needs to be classified in order to valuate risk. If a business does not have a data classification policy in action, then any DLP tools it deploys are not going to work as efficiently as they should. Continue Reading

4Which should I buy?-

Select DLP tools that are best for business

Purchasing a DLP tool is easy. Selecting the right one that best matches business needs is the challenge. It's a necessary challenge, though. Select the wrong tool, and hundreds of thousands of dollars could be wasted on a tool that may not even be able to protect data and prevent loss the way a company needs. Companies need to choose the right DLP software or appliance based on what type of data they have, where it lives and how it moves. To holistically execute a DLP strategy, businesses should also consider complementary technologies that can enhance DLP tools.

Feature

Which DLP tools suit SMBs and enterprises best?

Once a business has determined the type of data it needs to protect, and how that data moves across the company, it can select the best DLP tools for the job. Here's a comparison of some DLP vendors that offer comprehensive suites and integrated tools. Continue Reading

Feature

Enhance data security beyond DLP software

There are complementary technologies that can extend data security beyond what DLP tools can do, and businesses should consider them when executing a DLP strategy. Continue Reading

5Product overviews-

Deep-dives into DLP tools

Here are in-depth overviews of both comprehensive DLP suites and integrated DLP tools. These vendors were selected by TechTarget editors after extensive research into the top DLP market share holders, as well as seeing who fit the presented buying criteria best.

Feature

Blue Coat's DLP tools target a wide range of customers

With three appliance models, Blue Coat's DLP appliances aim to protect both data at rest and in transit. See how each appliance prevents data loss. Continue Reading

Feature

CA Technology's data loss prevention software suite covers a broad swath of data protection needs

CA Technology's Data Protection is a DLP software suite aimed at large enterprises in need of complete data loss protection. Continue Reading

Feature

Digital Guardian's DLP tools protect data at all levels and states

Digital Guardian for Data Loss Prevention and three accompanying tools protect a business's data across the network and in the cloud. Continue Reading

Feature

McAfee Total Protection offers DLP tools that monitor and manage for data security

Built for a variety of enterprises, McAfee Total Protection discovers, monitors and manages data in use and in transit. Continue Reading

Feature

RSA Data Loss Prevention Suite protects data for medium-sized businesses and enterprises

RSA's suite of DLP tools address data on mobile devices, cloud apps and services to help assist in protecting a business's data assets. Continue Reading

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close