Symantec DLP

Symantec DLP by Symantec Corporation is an enterprise data loss prevention platform designed to discover, monitor
4.6 
Rating
91 votes
Your vote:
No screenshots
Visit Website
broadcom.com
Loading

Symantec DLP by Symantec Corporation is an enterprise data loss prevention platform designed to discover, monitor, and protect sensitive information wherever it lives or moves. It provides unified visibility and policy enforcement across endpoints, networks, on‑premises storage, email, web traffic, and cloud applications such as Microsoft 365 and Google Workspace.

Using advanced detection techniques—including exact data matching, document fingerprinting, machine learning, and OCR—Symantec DLP accurately identifies regulated data (PII, PHI, PCI) and intellectual property. Security teams can apply consistent controls to block, quarantine, redact, encrypt, or coach users in real time, reducing accidental data exposure and insider risk.

The solution includes centralized policy authoring, role‑based incident workflows, and comprehensive reporting to support compliance with standards like GDPR, HIPAA, PCI DSS, and CCPA. Endpoint protections extend to removable media, printing, clipboard, and screen capture, while cloud integrations help safeguard data in SaaS and IaaS environments. Scalable architecture and integrations with SIEM/SOAR tools enable streamlined deployment and response for organizations of all sizes.

Review Summary

Features

  • Robust data protection: It effectively prevents data breaches and ensures compliance
  • Centralized management: Simplifies data security management across multiple endpoints and devices
  • Advanced threat detection: Leverages machine learning to identify and respond to sophisticated cyber threats

How It’s Used

  • Steep learning curve: May require significant training and resources to implement and manage the solution effectively
  • Complex configuration: Setting up and finetuning policies might be challenging for some users

Plans & Pricing

Symantec Dlp

Custom

User And Entity Behavior Analytics
Monitors for Policy Violations
Combat Data Leakage
Data Protection Policies to Cloud Apps
Data Compliance Obligations
Restrict Suspicious Apps
Threat-aware Data Protection
Integrated Cyber Defense Exchange (ICDX)

Comments

4.6
Rating
91 votes
5 stars
0
4 stars
0
3 stars
0
2 stars
0
1 stars
0
User

Your vote: