Data Loss Prevention | ||||||||
Network protection | N/A | N/A | N/A | |||||
Endpoint protection | N/A | |||||||
Cloud support | N/A | N/A | ||||||
Enterprise email control | N/A | N/A | ||||||
Webmail control | N/A | N/A | ||||||
Instant messengers control | N/A | N/A | N/A | |||||
Internet traffic control | ||||||||
Encrypted traffic control | N/A | N/A | N/A | N/A | ||||
External/removable devices control | N/A | |||||||
Policy templates | N/A | N/A | ||||||
Data fingerprints | N/A | N/A | N/A | |||||
Graphics recognition | N/A | N/A | N/A | N/A | N/A | |||
Data protection outside of the organization | Yes | Yes | N/A | Yes | Partially | Yes | Yes | |
Trial | N/A |
Data Loss Prevention |
Network protection |
Endpoint protection |
Cloud support |
Enterprise email control |
Webmail control |
Instant messengers control |
Internet traffic control |
Encrypted traffic control |
External/removable devices control |
Policy templates |
Data fingerprints |
Graphics recognition |
Data protection outside of the organization |
Trial |