What is Symantec Data Loss Prevention?

DLP provides thorough oversight and management of your information regardless of its location or method of transmission, effectively preventing insiders from pilfering sensitive data such as customer information and product details. It consistently monitors for policy violations and questionable user behavior at multiple control points. Through the use of real-time blocking, quarantining, and alerts, it deters end users from leaking information. In cases of substantial data loss, it facilitates swift and effective responses using automated incident remediation tools and one-click SmartResponses. This system also allows for policy adjustments to find the right balance between security and user efficiency. Moreover, it improves visibility and control over data both in transit and at rest within cloud applications, helping to uncover Shadow Data. You can leverage your existing DLP policies and workflows to implement highly specific rules and business logic across various cloud platforms like Office 365, G Suite, Box, and Dropbox. By adopting these measures, organizations can cultivate a secure environment that supports both regulatory compliance and innovative growth. Ultimately, this comprehensive approach not only safeguards sensitive information but also empowers organizations to thrive in a digital landscape.

Screenshots and Video

Symantec Data Loss Prevention Screenshot 1

Company Facts

Company Name:
Broadcom
Date Founded:
1991
Company Location:
United States
Company Website:
www.broadcom.com/products/cybersecurity/information-protection/data-loss-prevention

Product Details

Deployment
SaaS
Training Options
Documentation Hub
Support
Web-Based Support

Product Details

Target Company Sizes
Individual
1-10
11-50
51-200
201-500
501-1000
1001-5000
5001-10000
10001+
Target Organization Types
Mid Size Business
Small Business
Enterprise
Freelance
Nonprofit
Government
Startup
Supported Languages
English

Symantec Data Loss Prevention Categories and Features

Data Loss Prevention Software

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Data Governance Software

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management