77% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
Monitor and protect your valuable business data from unintended loss
71.4%
28.6%
0%
0%
0%
The depth of DLP and its feature showcased. It benefits me and i guess everyone. It can be useful in every organizagion. It must be the best in the market right now.
Seriously, I dont dislike anything since the feautures that the tool have are updated as per the current standards and provides immense capabilities to the network.
Mainly, we are using it for all the data coming in and out to look for any loopholes which are fairly detected by Checkpoint DLP. The main benefits would be it less False positives.
Check Point DLP (Data Loss Prevention) blade is very useful to protect our confidential information. We can create policy and enforce to all so that no one can send any personal confidential details or company confidential document over mail also no one can copy the data to other drive or online drive. It is very useful and unique features.
as of now no any compain or mis-behave we found.
It is not allowing any users to share confidential data to outside people or outsider mail, drive etc.
This is very good, as we DLP blage is integrated with CheckPoint gateway so no need to manage or install any additional software. If we have Check Point Smart Event enabled, the DLP balde alerts are automatically processed within it as well. Also no client need to install on user end. We have also encrypt the USB devices as well with password protection,
As of now we couldnt find and disadvantage. Note: we are using R80.40 MGMT, but we would like to protect .jpg .gif .png files as well.
Please get this solution, this is only one blade so we can enabled it on our perimeter .
We have protected data from inside to outside. We are protecting most of txt and pdf files.
What I like best about this software is that it helps you save stored data so that you can not loose any data.
What I dislike is that you have to get the hang of it to actually understand how it works.
This is one of the best softwares you can use to prevent Data loss
What I'm solving is tracking my old data down and saving it so that I wouldn't loose it. The benefits I have realized is that you will always keep track of your data no matter what..
What I like best about this software is that it helps you save stored data so that you can not loose any data.
What I dislike is that you have to get the hang of it to actually understand how it works.
This is one of the best softwares you can use to prevent Data loss
What I'm solving is tracking my old data down and saving it so that I wouldn't loose it. The benefits I have realized is that you will always keep track of your data no matter what..
1- Administrative control over data governance.
2- Data leaks detection or misuse.
3- Monitor data storage and sharing for compliance
4- Facilate data identification and discovery.
I think it was not a full DLP solution when I used it. It's just covering the network layer and when once the blade is active, the performance of the server goes up and slows down.
It's a must have product for financial companies. Checkpoint DLP solutions ensure our company's complaince with regulations. We can easily pass the audits successfully.
Automated alerts to users which also educates the users.
Reporting and logging feature that provides more visibility.
Covers only the network layer.
Could be a bit simplistic and interactive GUI is required for users.
We use to analyzise pdf and TXT files.
the innovation and practical approach to prevent data breaches before they occur with easy deployment and activation for immediate data loss prevention in real-time
One of the things that I dislike is that once this blade is active, the performance of the server goes up and slows down the server affecting the service and sometimes losing the connection to the ISP
Most of the things that we have been solving is preventing the loss of credit cards numbers that, on some occasions, are shared trought and e-mail increasing the security of the corporation
You can enable it on the existing GW or dedicate HW. The existing GW option is very cheap; there's no additional HW investment. It's a pure networking DLP solution. Ftp, http-s, smtp passing through the firewall with DLP is analyzed based on the DLP policy. Initial policy and activation is straightforward. Soluion fits many enterprises with default policy covering several regulations. Usercheck client is very small and enhances the interation with clients. Portal is customizable. Smartevent enhances the visibility and reporting options. There are hundreds of already defined datatypes in the database. It also supports many countries datasets, you don't need to describe these presets. By the way, you have several options to describe and add the datatypes to the repository. Checkpoint DLP is unique in terms of approach, as it tries to educate the users as well as protecting the organization. First thing before staring and throughout the transition within the DLP is the user awareness. Checkpoint DLP is the only real DLP solution working as an add-on to the Firewall-NGTP GWs in the market. I've tested several companies DLP solution, these solutions cover only limited areas like credit card, file scan or predefined sets where you can not customize or tune to make it running. By using granular access control on the smartconsole , delegation of DLP to the compliance or infosec team.
It's not a full DLP solution. It's just covering the network layer. It does not cover database or data sits on local or share. There may be need for additional DLP porducts to cove the gap. Checkpoint DLP needs Checkpoint environment up and running. You can not use the Checkpoint DLP solution with a 3rd party system. It needs SSL inspection (web site) and identity awareness/AD entegration on the GW. Template is straightforward you don't have the option to select a template with specific security weight. There's no option for sensitivity and weighted risk levels, this effect the usage. There's no auto learning option for the existing traffic. Data owners can be assigned on the policy, but there's no option for 3rd party integration for asset management or SCRM solution.
FP tuning is somehow complicated, end users should be involved for the learning process.
DLP module does not run on itself; it needs SSL inspection and identity awareness running on the gateway. Sizing is crucial as SSL inspection affects the performance of firewalls. I recommend firewall admins do not administer the DLP add-on, as the firewall admins' first core responsibility is to ensure the systems up and running; they don't have an infosec approach many times. First, add the DLP to the security plan a year ago even it should be a corporate program with the participation of several groups. If you don't have a dedicated infosec or compliance group in the organization, I recommend to go with the context awareness blade instead of DLP.
It is a must-have product for financial companies if you don't already have running DLP solutions. Checkpoint DLP solutions ensure our company's compliance with regulations. We can easiy pass the audits successfully. It's a a vital element in our security strategy and plan which helps us to prevent secyurity breaches.
Looking for the right SaaS
We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.
Want more customers?
Our experts will research about your product and list it on SaaSworthy for FREE.
It offers customizable and comprehensive DLP capabilities. It has advanced detections and provides realtime monitoring capability as well. Can integrate well with other security tools
Configuration and management could be a little complex.
Also has the issue of false positives but thats with almost every security tool.
System performance is impacted especially during times of extensive scanning
Helps prevent data breaches , assists with regulatory compliance and also helps safeguard PII.
There is more visibility and control over data for sure.
This also helps mitigate any insider threats.