17 years helping Singaporean businesses
choose better software
Data Loss Prevention Software
Data Loss Prevention software keeps corporate sensitive data secure by identifying potential data breaches and helping to eliminate them.
Capterra offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Featured software
Most reviewed software
Explore the most reviewed products by our users on the Data Loss Prevention Software
Filter Results (191)
Countries available
Countries where the product is available. Note: Customer support may not be accessible in that country.
Singapore
Pricing Options
Product type
Show local products
191 results
Sort by
Endpoint DLP Plus is an integrated DLP solution designed to safeguard sensitive endpoint data and effectively mitigate insider risks.
Learn more about ManageEngine Endpoint DLP Plus
Endpoint DLP Plus leverages advanced data loss prevention strategies to safeguard sensitive data within endpoints. Its capabilities enable administrators to locate, consolidate and categorize sensitive information as well as monitor and limit its movement across various exit routes such as cloud applications, email, peripheral devices and more in order to prevent accidental or deliberate disclosure. It is a versatile and scalable solution ideal for SMB's and enterprises.
Learn more about ManageEngine Endpoint DLP Plus
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
DataSecurity Plus offers data discovery and real-time server auditing, alerting, and reporting.
Learn more about ManageEngine DataSecurity Plus
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it monitors file integrity; streamlines compliance requirements; generates instant, user-defined email alerts; finds sensitive personal data (PII/ePHI) stored in files, folders, or shares; and automatically executes predefined responses when security threats such as ransomware attacks occur.
Learn more about ManageEngine DataSecurity Plus
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
NinjaOne is the easiest, all-in-one IT management solution that MSPs and IT professionals love.
Learn more about NinjaOne
NinjaOne fast-tracks IT management by automating the hardest parts of IT, empowering over 20,000 IT teams worldwide to achieve unparalleled visibility, security, and control over every endpoint. Our platform enables MSPs and IT professionals to streamline operations, significantly boosting productivity while reducing risks and costs. With a robust, user-friendly interface, NinjaOne supports many critical use cases, including endpoint management, patch management, mobile device management, software deployment, remote access, and backups. Designed with seamless IT and security integrations, NinjaOne provides the tools necessary to manage your entire IT environment with unmatched ease, scalability, and efficiency. By automating routine tasks, NinjaOne allows you to focus on high-impact strategic initiatives rather than day-to-day firefighting, ensuring your IT operations remain agile, secure, and ahead of the curve in today’s dynamic tech landscape.
Learn more about NinjaOne
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP. Device Control & eDiscovery capabilities on Windows, macOS and Linux.
Learn more about Netwrix Endpoint Protector
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP solution for Enterprises, available as hardware and virtual appliance, or as cloud infrastructure.
Netwrix Endpoint Protector puts an end to data leaks and data theft and offers seamless control of portable storage devices. It's content filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or regulations such as PCI DSS, HIPAA, GDPR, CCPA etc.
Learn more about Netwrix Endpoint Protector
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
Cloud-based suite of cybersecurity solutions that help businesses identify, analyze and remediate threats on a unified platform.
Malwarebytes for Business is a cybersecurity platform that protects laptops, servers, and mobile devices against threats. The endpoint security portfolio combines layers of protection and threat intelligence to secure organizations from threats, including ransomware, malware, viruses, and other attacks.
Learn more about Malwarebytes for Business
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
Cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes.
Google Cloud Platform is cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes in all industries. Google Cloud Platform offers a scalable data warehouse powered by cloud storage and machine learning, as well as relational databases for transactions, complex queries, and more.
New customers get $300 in free credits during the first 90 days after exhausting free usage which is available across 20+ different products.
Learn more about Google Cloud
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
Cybersecurity to prevent data breaches for organizations with 250+ employees, covering a suite of devices, networks, and applications.
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users to protect their mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. It features file, bot, and mail protection, along with remote device management, virtualization security, firewall set-up, and web control.
Learn more about ESET Endpoint Security
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
NAKIVO Backup & Replication is a reliable and affordable data protection solution for virtual, physical, cloud and SaaS environments.
NAKIVO Backup & Replication is a comprehensive data protection solution delivering incremental, application-aware backup, instant recovery, ransomware protection and disaster recovery orchestration for VMware vSphere, Microsoft Hyper-V, Nutanix AHV, Amazon EC2, physical Windows/Linux environments, Microsoft 365 and Oracle Database.
Learn more about NAKIVO Backup & Replication
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats.
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates, cloud-driven security means endpoints are always up to date.
Learn more about Webroot Business Endpoint Protection
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
Industry-leading data protection helps businesses of all sizes through data encryption, compliance, file management and cloud backup.
Industry-leading data protection system which helps businesses of all sizes through data encryption, compliance, file management and cloud backup. Protect against accidental deletion, theft, hardware failure, and data corruption. Restore data following a ransomware attack without paying ransom and retain business data to meet compliance requirements. Automatic backup, with award winning support makes data protection seamless.
Learn more about Carbonite
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
Iperius Backup for Servers, VMware ESXi, Hyper-V, SQL Server, MySQL, Microsoft 365 - To Cloud, NAS, RDX, Tape, FTP, Google Drive, S3.
Iperius Backup is a complete and lightweight backup software with powerful features: Incremental backup and restore of VMware ESXi virtual machines, Backup and restore for Hyper-V, Drive image and full system recovery, backup to NAS/RDX, Synchronization, backup to Tape LTO, Backup FTP and CLOUD (Google Drive, Amazon S3, Azure Storage, OneDrive, Dropbox), Backup for Microsoft365 (OneDrive, Exchange, SharePoint, Teams), Database backup (SQL Server, MySQL, MariaDB, PostgreSQL, Oracle).
Learn more about Iperius Backup
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
Always hot, S3 compatible object storage built to host content, build & run applications, manage media, back up, archive & protect data
Backblaze B2 is S3 compatible cloud object storage built purposefully to unlock budgets, unburden administrators, and unleash innovators. Delivering performance at 1/5 the cost including free egress up to 3x monthly storage. Together with technology partners, Backblaze B2 helps customers break free from restrictive, overpriced legacy providers that hold them back, and blaze forward with the full power of the open cloud in their hands.
Learn more about Backblaze B2 Cloud Storage
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
Safetica is a global software company that provides Data Loss Prevention and Insider Risk Management solutions to organizations.
Safetica is an integrated Data Loss Prevention (DLP) and Insider Risk Management (IRM) solution, which helps companies to identify, classify, and protect sensitive data as well as detect, analyze, and mitigate risks posed by insiders within an organization.
Safetica covers the following data security solutions:
Data Classification
Data Loss Prevention
Insider Risk Management
Cloud Data Protection
Regulatory compliance
Whether deployed on-premise or in the cloud, our solution is designed to protect business-critical data against accidental leaks and intentional theft in today's hybrid landscape.
Learn more about Safetica
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
Veriato offers predictive behavior intelligence built with AI to help organizations manage insider risk and monitor employee activity.
Veriato has reinvented the category it created, using AI based user behavior analytics to help companies prevent risks and increase productivity in their remote, hybrid and in-office environments. Veriato’s platform offers solutions for Insider Risk Management (IRM), behavioral analytics, user activity monitoring (UAM) and data loss prevention (DLP) in a single powerful platform. Veriato delivers monitoring, alerts, reporting and screenshots, allowing customers to be predictive and proactive rather than reactive, critical in cybersecurity. The platform helps global Enterprises, SMBs and Government entities become more engaged, productive and safe.
Learn more about Veriato Workforce Behavior Analytics
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
Device control software. Block USB removable storage devices and other peripherals to secure sensitive data against theft and misuse.
AccessPatrol is device control software from CurrentWare that provides a proactive solution for securing company endpoints against data breaches caused by illicit data transfers.
AccessPatrol includes device control features for a variety of peripheral devices including USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, and MP3s.
File operations alerts and permissions can be configured to alert IT administrators to suspicious file operations and proactively prevent data transfers to unauthorized users.
Learn more about AccessPatrol
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
Cypherdog's Encryption solution provides complete email protection by encrypting all email messages and attachments.
Cypherdog Encryption (CE) encrypts and decrypts any text or any media which you can send by any medium including e-mail or other platforms like Google Drive, Dropbox or Wetransfer.
You can use CE with Gmail on the most popular browsers, Thunderbird and Outlook. With just one click, you can use Cypherdog to encrypt e-mail messages and attachments.
CE is based on asymmetric encryption and prevent against data leaks and support cybersecurity policies.
Learn more about Cypherdog Encryption
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
NeoCertified provides an essential component for your DLP strategy: a trusted secure email solution for businesses of all industries.
NeoCertified's secure email solution is an essential piece for your DLP strategy for businesses looking to protect confidential information, while meeting compliance obligations. NeoCertified gives you the flexibility and assured protection that you're looking for in an encryption provider.
An included Microsoft Outlook-integrated button, a 24/7 customer support team, and commercial-grade encryption -- NeoCertified 's the upgrade your DLP solution has needed.
Receive a personalized quote.
Learn more about NeoCertified
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
Top-rated Zero Trust SASE/SSE for network security and regulatory compliance. Protect your business, anytime, anywhere.
GoodAccess is the world's most usable cybersecurity SaaS for enabling secure remote access to digital resources. 🛡️
● Deployable in just 10 minutes.
● Delivers SMEs the benefits of zero trust network access (ZTNA) without the complexities.
● Any company can mitigate the risks introduced by remote workforce, BYOD and distributed IT resources with no hassle.
GoodAccess is recognized by TechRadar as one of the best ZTNA solutions and acclaimed by leading review platforms such as G2 and Capterra for its excellence in customer support, simplicity, and ease of use.
As part of our mission, in 2022 we brought companies all around the world the first forever-free business VPN named GoodAccess Starter that helps them achieve secure remote access essentials with no constraints.
Companies in more than 120 countries use GoodAccess to secure access to their business systems, applications, clouds, and data.
Anytime, anywhere.
Start your 14-day full-featured free trial.
Learn more about GoodAccess
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
A comprehensive enterprise-level data backup and recovery solution for providing your entire business workload a powerful protection.
Vinchin Backup & Recovery is an easy-to-use enterprise-level data protection solution that provides comprehensive, cost-optimized, highly scalable backup and recovery strategy for your business-critical data on virtualizations (including VMware, Hyper-V, XenServer, XCP-ng, oVirt, RHV, Oracle OLVM, Sangfor HCl, OpenStack, Huawei FusionCompute, H3C CAS/UIS, ZStack, Proxmox), databases, massive files, physical servers, and NAS devices in private cloud, public cloud, and hybrid cloud environments.
Learn more about Vinchin Backup & Recovery
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
Teramind tracks employee behavior, detects threats, and optimizes your business for productivity with advanced employee monitoring.
Discover Teramind - the ultimate tool for businesses looking to optimize productivity, streamline workflows, and protect assets. Our customizable platform ensures regulatory compliance, detects and prevents insider threats, and monitors remote employees. Automated actions keep your business secure and efficient, while real-time alerts and logs provide all-around security. Experience the power of machine-learned behavior analytics to secure your company data. Ready to revolutionize your business?
Learn more about Teramind
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
Veeam’s® premier product delivers trusted availability for all of your cloud, virtual, Kubernetes and physical workloads.
Achieve radical resilience that can only come from complete confidence in your protection, response and recovery. Built on the principles of Data Security, Data Recovery, and Data Freedom—Veeam Data platform provides the confidence you need to make a stand against cyberattacks.
Data Security:
Keep your data secure with multi-layered security
- Pinpoint threats with SIEM integration
- AI Powered malware detection engine
- 24/7 monitoring for malicious acts.
Data Recovery:
Trust your business to the pioneer of instant recovery
- Single files
- Application objects
- Orchestrated recovery of production workloads at-scale
Data Freedom:
Protect all your data
- Anywhere, any way, with zero lock‑in.
- In the cloud, on premises or at the edge
- Support for hybrid- and multi-cloud infrastructure
Learn more about Veeam Data Platform
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
Service providers solution that unifies backup, disaster recovery, EDR, DLP, anti-malware, antivirus, and endpoint protection
Acronis Cyber Protect Cloud is a single solution that combines backup, anti-malware, antivirus, and endpoint protection for service providers. Control through the single management console significantly reduces complexity, while strengthening security offerings, improving SLAs, decreasing churn risks, and generating additional recurring revenue.
Learn more about Acronis Cyber Protect Cloud
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Lookout, Inc. is the endpoint to cloud security company purpose-built for the intersection of enterprise and personal data. We safeguard data across devices, apps, networks and clouds through our unified, cloud-native security platform.
Learn more about Lookout
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
Delivery Trust enables two-way secured communication without recipients of your secured messages having to download or register
Delivery Trust by Identillect Technologies provides convenient, user-friendly email security for businesses of all sizes; no IT department or know-how is required for set up or administration.
Unlike many encryption solutions, Delivery Trust enables two-way secured communication without recipients of your secured messages having to download, purchase or register for services.
Learn more about Delivery Trust
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management
Start running backups and restores in less than 15 minutes to prevent data loss! Comet is a fast, secure all-in-one backup platform.
Start running backups and restores in less than 15 minutes to prevent data loss! Comet is a fast, secure all-in-one backup platform for businesses and IT providers. You control your backup environment and storage destination (local, AWS, Google Cloud Storage, Azure, Backblaze, Wasabi, or other S3 storage providers).
Our backup software supports businesses across 120 countries in 15 languages. No contracts. Support, updates, replication, and re-branding are all free. 30-day FREE trial!
Learn more about Comet Backup
...
Read more
Features
- Policy Management
- Sensitive Data Identification
- Whitelisting/Blacklisting
- Web Threat Management
- Compliance Tracking
- Incident Management