site-logo
Updated on :
Symantec DLP - Data Loss Prevention (DLP) Software

Symantec DLP

Get End-to-end Protection For Sensitive Data

(150 ratings)

Symantec DLP offers custom pricing plan

8.6/10

Spot Score

Overview of Symantec DLP

What is Symantec DLP ?

Symantec Data Loss Prevention (DLP) Software stops sensitive data from leaving the network, protecting valuable assets by reducing the risk of information leaks. DLP integrates directly with Symantec endpoint, server, storage and cloud management platforms for a comprehensive security solution. ... Read More

API not available

Symantec DLP Platforms

  • Browser Based (Cloud)
  • Installed - Windows
  • Installed - Mac

Symantec DLP Customer Type

  • Large Enterprises
  • Medium Business

Symantec DLP Features

Show All

Pricing of Symantec DLP

  • Quotation Based

Symantec DLP Alternatives

7.2/10

Spot Score

Code42 DLP - Data Loss Prevention (DLP) Software

Code42 DLP

Data Loss Prevention (DLP) Software

Proactive insider risk management, file backup and...

Symantec DLP FAQs

Symantec DLP is a Data Loss Prevention (DLP) Software. Symantec DLP offers the following functionalities:
  • Threat Protection
  • Policy Management
  • Incident Management
  • Sensitive Data Identification
  • Blacklisting
Read More
Here's a list of the best alternatives for Symantec DLP
No, Symantec DLP doesn't provide API.
No, Symantec DLP doesn’t provide mobile app.
Symantec DLP is located in San Jose, California
Symantec DLP offers Quotation Based pricing model
We don't have information regarding integrations of the Symantec DLP as of now.

Symantec DLP Support

Customer Service

Online

Location

San Jose, California

Read More about Symantec DLP

Symantec Data Loss Prevention (DLP) Software stops sensitive data from leaving the network, protecting valuable assets by reducing the risk of information leaks. DLP integrates directly with Symantec endpoint, server, storage and cloud management platforms for a comprehensive security solution. It can discover confidential information and protect it using policies and actions that are integrated with existing security tools to simplify compliance while ensuring all data is highly protected.

Disclaimer: This research has been collated from a variety of authoritative sources. We welcome your feedback at [email protected].

Researched by Rajat Gupta