For VendorsBlog
Login
Please turn the screen for optimal content display

Compare: Data Loss Prevention

Characteristics

Network protection

Endpoint protection

Cloud support

Enterprise email control

Webmail control

Instant messengers control

Internet traffic control

Encrypted traffic control

External/removable devices control

Policy templates

Data fingerprints

Graphics recognition

Data protection outside of the organization

Trial

Yes
Yes
N/A
Yes
Partially
Yes
Yes
Found mistake? Write us.