Best Data Loss Prevention Software in the UK

Find and compare the best Data Loss Prevention software in the UK in 2026

Use the comparison tool below to compare the top Data Loss Prevention software in the UK on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    ThreatLocker Reviews
    Top Pick
    See Software
    Learn More
    ThreatLocker Zero Trust Platform provides extensive application control with features like ring-fencing and selective elevation, ensuring meticulous execution management. Offering learning mode and extensive support, it integrates threat detection and activity monitoring to enhance compliance, reduce costs, and bolster cybersecurity through alerts and approvals. Despite its strengths, there are areas for improvement in training flexibility, policy updates, and interface enhancements, along with challenges in handling non-digitally signed software. Deployed across environments, it works well with existing cybersecurity instruments for real-time threat prevention.
  • 2
    Curtain LogTrace File Activity Monitoring Reviews

    Curtain LogTrace File Activity Monitoring

    Coworkshop Solutions

    Free with limited functions
    4 Ratings
    See Software
    Learn More
    In the daily work environment, companies often need to authorize their employees to access and use sensitive company data. However, most companies lack visibility into how their employees are actually utilizing this data, and whether any misuse is occurring. At the same time, companies have to meet internal audit requirements and comply with various data security regulations and policies. This creates a need for the IT department to find ways to effectively monitor and record how employees are accessing and using the company’s data resources. Curtain LogTrace provides enterprise-wide file activity monitoring. It tracks user actions: create, copy, move, delete, rename, print, open, close, save. Includes source/destination paths and disk type. Perfect for monitoring user file activities. Key Features: - File log (create & delete file) - File log (copy & move file) - File log (print & rename file) - App log (save, open & close file) - Support MySQL & MS SQL - Watermark for printout - Central administration - Integration with Active Directory - Uninstall password for client - Password management - Admin delegation - Self protection for the software
  • 3
    Curtain MonGuard Screen Watermark Reviews

    Curtain MonGuard Screen Watermark

    Coworkshop Solutions

    Free with limited functions
    7 Ratings
    See Software
    Learn More
    Curtain MonGuard Screen Watermark is an enterprise solution for displaying screen watermarks that administrators can enable on users' computers. This screen watermark can display various user information, such as the computer name, username, and IP address. The purpose of this watermark is to effectively grab the user's attention and serve as a reminder before they take a screenshot or photograph the screen to share the information with others. The key benefit of Curtain MonGuard is that it encourages users to "think before sharing" sensitive information. If the content being shared contains confidential company data, the watermark can help trace the source of the leaked information back to the user responsible. This allows organizations to hold users accountable and mitigate the consequences of data breaches or unauthorized information sharing. Key features: - On-screen watermark - Full screen-watermark - Application screen-watermark - Supports over 500 Applications - Self-defined content of watermark - Screen-watermark by condition - Central administration - Integration with Active Directory - Uninstall password for client - Password management - Admin delegation - Self protection for the software
  • 4
    ManageEngine Log360 Reviews
    Log360 is a SIEM or security analytics solution that helps you combat threats on premises, in the cloud, or in a hybrid environment. It also helps organizations adhere to compliance mandates such as PCI DSS, HIPAA, GDPR and more. You can customize the solution to cater to your unique use cases and protect your sensitive data. With Log360, you can monitor and audit activities that occur in your Active Directory, network devices, employee workstations, file servers, databases, Microsoft 365 environment, cloud services and more. Log360 correlates log data from different devices to detect complex attack patterns and advanced persistent threats. The solution also comes with a machine learning based behavioral analytics that detects user and entity behavior anomalies, and couples them with a risk score. The security analytics are presented in the form of more than 1000 pre-defined, actionable reports. Log forensics can be performed to get to the root cause of a security challenge. The built-in incident management system allows you to automate the remediation response with intelligent workflows and integrations with popular ticketing tools.
  • 5
    Teramind Reviews

    Teramind

    Teramind

    $12/month/user
    Teramind provides a user-centric security approach to monitoring your employees’ digital behavior. Our software streamlines employee data collection in order to identify suspicious activity, improve employee productivity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents using highly customizable Smart Rules that can alert, block or lockout users when rule violations are detected, to keep your business running securely and efficiently. Our live and recorded screen monitoring lets you see user actions as they’re happening or after they’ve occurred with video-quality session recordings that can be used to review a security or compliance event, or to analyze productivity behaviors. Teramind can be installed in minutes and can be deployed either without employees knowing or with full transparency and employee control to maintain trust.
  • 6
    ESET Endpoint Security Reviews
    This EDR solution will help you uncover the hidden potential in your network. This tool uses ESET's multilayered Endpoint Protection Platform to detect and respond to endpoints. All layers send relevant information to ESET Enterprise Inspector which analyzes large amounts of real-time data from endpoints. It can quickly identify and fix any security problem in the network. ESET Enterprise Inspector offers a unique reputation-based detection system that is transparent to security teams. To allow fine-tuning, all rules can be easily edited via XML. You can create new rules to meet the specific needs of your enterprise environment, including SIEM integrations. ESET's endpoint response and detection tool makes it easy to suppress false alarms. You can adjust the sensitivity of detection rules according to different computer groups or users. Combine criteria such as file name/path/hash/command line/signer to fine-tune the trigger conditions.
  • 7
    MSP360 RMM Reviews
    MSP360 RMM enables users to efficiently manage all aspects of their IT infrastructure within a single dashboard. Features include system resource monitoring, software deployment, patch management, alerting, remote access, scripting, and more. Licensed per admin with unlimited endpoints.
  • 8
    Forcepoint DLP Reviews
    Data security need not hinder business efficiency. Forcepoint emphasizes the integration of policies, user risk assessment, and automation, creating a seamless and user-friendly approach to data protection. With access to the largest library of pre-defined policies in the industry, you can oversee and manage your data effectively. Achieve compliance with regulations such as GDPR and CCPA across over 80 nations. Utilize Boldon James and Azure Information Protection for effective data classification. Transition from broad, generalized rules to tailored, responsive data security measures that maintain employee productivity. Restrict actions only when necessary, empowering your workforce. Safeguard sensitive information, including personally identifiable information (PII), protected health information (PHI), financial records, trade secrets, and credit card details, even in visual formats. Monitor both structured and unstructured intellectual property (IP) and thwart slow, stealthy data breaches, even when user devices operate off the network. By adopting these strategies, organizations can enhance their data security posture while fostering a more productive work environment.
  • 9
    Endpoint Protector Reviews
    Endpoint Protector, a comprehensive, all-in-one Data Loss Prevention Solution for Windows, macOS, and Linux, prevents data theft and data leakage and provides seamless control over portable storage devices. Endpoint Protector can filter data in motion and at rest using regular expressions, dictionaries or data protection regulations like GDPR, PCI DSS and HIPAA. Endpoint Protector has several modules that can be combined and matched to meet client needs. These modules include Content Aware Protection and Device Control. Enforced Encryption is also available. eDiscovery is available. It makes work easier, safer, and more enjoyable, with a great ROI.
  • 10
    Fortinet Reviews
    Fortinet stands out as a prominent global entity in the realm of cybersecurity, recognized for its all-encompassing and cohesive strategy aimed at protecting digital infrastructures, devices, and applications. Established in the year 2000, the company offers an extensive array of products and services, which encompass firewalls, endpoint security, intrusion prevention systems, and secure access solutions. Central to its offerings is the Fortinet Security Fabric, a holistic platform that effectively melds various security tools to provide enhanced visibility, automation, and real-time intelligence regarding threats across the entire network. With a reputation for reliability among businesses, governmental bodies, and service providers across the globe, Fortinet places a strong emphasis on innovation, scalability, and performance, thereby ensuring a resilient defense against the ever-evolving landscape of cyber threats. Moreover, Fortinet’s commitment to facilitating digital transformation and maintaining business continuity further underscores its role as a pivotal player in the cybersecurity industry.
  • 11
    SearchInform DLP Reviews
    The solution allows you to know your data and place controls where you need them to protect your company from information leakage. SearchInform DLP monitors data transfer channels and provides reports to the person responsible. SEARCHINFORM DLP HELPES BUSINESSES IN MANY WAYS *Protects confidential data from leakage during transfer and use *Remote access and virtualization tools (TeamViewer RAdmin, RDP) can be controlled by the user. *Encrypts data to protect it from being used outside of the company *Reports unusual events within the network such as copying data onto removable storage devices or deleting large numbers of files
  • 12
    Data Rover Reviews
    Data Rover is an Advanced User Data and Security Management for any Data-Driven Organisation. A single solution for Infrastructure and Security managers that allows data users to explore, manage, process, and protect their data effectively and efficiently, by simultaneously addressing the two primary needs related to the use of data: Cyber Security and Data Management. Data Rover plays a key role in business asset protection and corporate data management policy definition. The software is designed for companies that need to ensure compliance with personal data protection regulations and provides detailed analysis of data access permissions. User Access Rights & Auditing Provides invaluable information about access privileges to files and folders. It allows you to analyse the effective permissions of the users, i.e. the real ones. It identifies not only who can access data, but also who did exactly what, when, and from where. Data Housekeeping Helps you identify and distinguish valuable assets from junk information that becomes unnecessary ballast and an unjustified cost to the company. Data Exchange Provides the company with an advanced data exchange and tracking system exclusively designed for the business.
  • 13
    WipeDrive Reviews

    WipeDrive

    WipeDrive

    $19.95/one-time/drive
    WipeDrive is a tool that allows individuals, businesses, and government agencies to securely and permanently erase data off hard drives, removable media, mobile devices, and other storage devices. It's a cost-effective and secure way to recycle and retire computer storage. WipeDrive is the global leader in secure data destruction.
  • 14
    Sheetgo Reviews

    Sheetgo

    Sheetgo Europe

    $20/user/month
    Sheetgo is a no-code automation tool that teams can use. You can create custom workflows to collect and manage data, as well as share it with others -- all from a spreadsheet. You can create an automated system that automates any business process, from inventory management and financial forecasting to sales tracking or student attendance monitoring. Sheetgo can be used with Google Sheets, Excel, and CSV files. Sheetgo.com makes it easy to automate your work.
  • 15
    Microsoft Purview Data Loss Prevention Reviews
    Achieve smart detection and management of sensitive data throughout Office 365, OneDrive, SharePoint, Microsoft Teams, and on local devices. As our data landscape continues to change, it's crucial that data loss prevention (DLP) strategies adapt accordingly. Discover the typical deployment scenarios, hurdles in migration, and effective practices, along with the advantages of leveraging a cloud-native DLP solution. Safeguard against unauthorized sharing, usage, or transfer of sensitive information across applications, services, and devices through Microsoft Purview Data Loss Prevention. You can establish, oversee, and implement DLP policies directly from the Microsoft Purview compliance portal. Additionally, DLP seamlessly integrates with information protection features, including pre-built, custom, or advanced SITs and trainable classifiers. Manage, investigate, and monitor alerts via the Data Loss Prevention (DLP) alerts page. Furthermore, you can extend these DLP alerts to both the Microsoft Defender XDR portal and Microsoft Sentinel, enhancing your overall security posture. This comprehensive approach not only protects sensitive data but also ensures compliance with organizational policies and regulations.
  • 16
    BigID Reviews
    Data visibility and control for security, compliance, privacy, and governance. BigID's platform includes a foundational data discovery platform combining data classification and cataloging for finding personal, sensitive and high value data - plus a modular array of add on apps for solving discrete problems in privacy, security and governance. Automate scans, discovery, classification, workflows, and more on the data you need - and find all PI, PII, sensitive, and critical data across unstructured and structured data, on-prem and in the cloud. BigID uses advanced machine learning and data intelligence to help enterprises better manage and protect their customer & sensitive data, meet data privacy and protection regulations, and leverage unmatched coverage for all data across all data stores.
  • 17
    Humming Heads Reviews
    To thwart attacks, it is essential to secure all authorized actions and ensure that leaked or stolen data remains unreadable, all done seamlessly and reliably. The Shinobi Defense System (SDS) enables you to concentrate your endpoint security efforts on areas you can effectively manage, rather than endlessly pursuing the latest malware threats or attempting to educate users on security practices. For the first time in the USA, SDS offers a distinctive and integrated portfolio of established technologies. It provides covert protection against the three most significant and common endpoint security challenges that lead to financial losses for businesses. By merging DeepWhite, a robust whitelist-based protection technology, with Evolution DLP, an automatic and seamless data loss prevention solution, SDS creates a cohesive system powered by our innovative Active Intercept engine and the Shinobi Forensics logging and reporting platform. This comprehensive approach ensures that any leaked or stolen files are automatically rendered unreadable, requiring no rules or interactions from end users, thus simplifying security management. With SDS, organizations can confidently safeguard their data without burdening their employees.
  • 18
    ManageEngine M365 Manager Plus Reviews
    M365 Manager Plus is a comprehensive Microsoft 365 tool that can be used to report, manage, monitor, audit, and create alerts for critical activities. It is easy to manage Microsoft 365 services such as Exchange Online, OneDrive for Business and Skype for Business from one place. M365 Manager Plus offers extensive pre-configured reports on Microsoft 365. It helps you perform complex tasks such as bulk user management, bulk mail management, secure delegation, and bulk mailbox management. You can monitor Microsoft 365 services 24/7 and receive email notifications about service interruptions. M365 Manager Plus simplifies compliance management with built in compliance reports. It also offers advanced auditing, alerting, and reporting features to help keep your Microsoft 365 setup safe.
  • 19
    Snowplow Analytics Reviews
    Snowplow is a data collection platform that is best in class for Data Teams. Snowplow allows you to collect rich, high-quality data from all your products and platforms. Your data is instantly available and delivered to your chosen data warehouse. This allows you to easily join other data sets to power BI tools, custom reporting, or machine learning models. The Snowplow pipeline runs in your cloud (AWS or GCP), giving your complete control over your data. Snowplow allows you to ask and answer any questions related to your business or use case using your preferred tools.
  • 20
    Next DLP Reviews
    Uncover potential threats, inform your workforce, implement regulations, and safeguard against data breaches with Reveal. Your employees, users, and information are in a constant state of flux: ever-evolving and on the move. In today's hybrid work environment, individuals are creating, altering, and distributing data in a fluid manner across a multitude of channels. This creates numerous possibilities for data exposure, with employees being the primary focus—thus, the foundation of securing your organization lies in ensuring the safety of your personnel. Reveal Cloud is designed for the cloud, making it straightforward to purchase, set up, and operate. From the moment you start, you benefit from automated defense mechanisms, featuring pre-configured policies and machine learning capabilities that facilitate smart remediation, even when devices are offline. The lightweight agent guarantees that your data and staff remain safeguarded without causing any interruptions. Additionally, ongoing monitoring grants insight into user activity, data accessibility, and system utilization, empowering security personnel to perform detailed searches on files, USB devices, connections, browser interactions, application events, and much more. This comprehensive approach ensures that your organization stays one step ahead of potential threats.
  • 21
    ManageEngine Device Control Plus Reviews
    Device Control Plus Enterprise Software is designed to manage file access and device control. It features an intuitive interface that allows admins to classify USB and other peripheral devices in a way that is easy to use. It also has many data security capabilities, including the ability to restrict file copying and block unauthorized file transfers, as well as read-only file access. File shadowing and file tracing reports will also be generated to provide extensive visibility into device actions and forensic analysis on policy efficacy, network performance, and policy effectiveness.
  • 22
    Fidelis Network Reviews
    To effectively identify sophisticated threats, it is essential to conduct thorough inspection, extraction, and real-time analysis of all types of content traversing the network. Fidelis' network detection and response technology systematically scans all ports and protocols in both directions, gathering extensive metadata that serves as the foundation for robust machine-learning analytics. By utilizing sensors for direct, internal, email, web, and cloud communications, you achieve comprehensive network visibility and coverage. The tactics, techniques, and procedures (TTPs) of identified attackers are aligned with the MITRE ATT&CK™ framework, enabling security teams to proactively address potential threats. While threats may attempt to evade detection, they ultimately cannot escape. You can automatically profile and categorize IT assets and services, including enterprise IoT devices, legacy systems, and shadow IT, to create a detailed map of your cyber landscape. Furthermore, when combined with Fidelis' endpoint detection and response offering, you obtain a software asset inventory linked to known vulnerabilities, such as CVE and KB references, along with an assessment of security hygiene concerning patches and the status of endpoints. This comprehensive approach equips organizations with the tools needed to maintain a resilient cybersecurity posture.
  • 23
    GTB Technologies DLP Reviews
    Data Loss Prevention can be described as a system that automatically enforces data security policies and real-time data classification of data in motion and at rest. Data in motion refers to data that is sent to the internet, cloud, devices, or printer. Our technology leader is our solution. Our Data Loss Prevention security engine detects both structured and unstructured data at the binary level. It protects on-premises, offsites, as well as the cloud. GTB is the only Data Loss Prevention tool that protects data even when it's not connected to the network. Find, classify, classify, index, redact and re-mediate your data. This includes PII, PHI, structured data, FERC/NERC, SOX & more. Our patent-pending proprietary technology can prevent sensitive data from being synced to private or unapproved clouds. It also allows users to identify "sync files".
  • 24
    Plurilock AI Cloud DLP Reviews

    Plurilock AI Cloud DLP

    Plurilock Security

    $36/user/year
    Plurilock AI Cloud is a cloud native yet endpoint capable data loss prevention (DLP). It also provides passwordless SSO, CASB and CASB. It is specifically designed for cloud-centric businesses that rely on an army SaaS applications in order to succeed. Plurilock AI Cloud DLP allows companies that lack the resources to manage and configure (much less to pay for) the "defaults" of incumbent DLP solutions to still benefit from full-featured DLP. This is done at a cost-effective level that makes DLP available to companies who don't have specialized IT staff. Plurilock AI Cloud-based DLP is a part of the Plurilock AI Platform, which grows with companies, and has an expansion path for continuous, real-time, authentication and user/entity behaviour analytics (UEBA) to detect and respond to biometric threats in real-time. Info-Tech rated Plurilock AI as the best in the industry for customer satisfaction based on feedback from actual customers.
  • 25
    Netwrix Endpoint Protector Reviews
    Netwrix Endpoint Protector stands out as a sophisticated enterprise-level Data Loss Prevention (DLP) tool aimed at safeguarding sensitive information from being improperly shared or maliciously extracted from employee devices. It boasts multi-platform support, catering to Windows, macOS, and Linux operating systems, which guarantees thorough security across various IT infrastructures. The solution features customizable device control that allows for the management of USB and peripheral ports, effectively preventing unauthorized data transfers and reducing the risk of potential data leaks. In addition to these capabilities, it includes advanced content inspection functions that apply complex policies based on categories of sensitive information, keywords, and file formats, thereby successfully blocking unauthorized transfers of data. Furthermore, Netwrix Endpoint Protector plays a crucial role in helping organizations maintain compliance with regulatory requirements such as GDPR, HIPAA, and PCI DSS, thereby ensuring the protection of personally identifiable information, protected health information, and payment card data. By implementing this solution, businesses can enhance their overall data security posture while minimizing the risk of breaches.
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB