Version information and system requirements
Device types controlled
Ports secured
Clipboard control
Network communications controlled
Content-aware controls
Encryption integration
Content discovery
Virtual DLP for remote virtualization
Full-text audit and shadow repository searching
User activity monitor (UAM)
User dossiers
72% of employees share sensitive information. Prevent any data leaks headed your way.
Sorry, your browser is not supported.
It seems that our new website is incompatible with your current browser's version. Don’t worry, this is easily fixed! To view our complete website, simply update your browser now or continue anyway.