Gartner Research

Enterprise Content-Aware DLP Solution Comparison and Select Vendor Profiles

Published: 17 April 2013

ID: G00245932

Analyst(s): Trent Henry, Anton Chuvakin

Summary

Content-aware data loss prevention has grown up and is on the verge of becoming a standard part of security architecture. A small set of vendors dominate a majority of enterprise DLP deployments. Challenges remain with planning, deployments and operations of large-scale DLP implementations.

Table Of Contents

Summary of Findings

Analysis

  • What Is DLP?
  • DLP Is Different
    • Content-Aware DLP Types
  • Needs for Enterprise DLP: Threats to Data
  • Threats to Data
    • Types of Protected Data
    • Types of Data Threats
  • DLP Drivers
    • Control Regulated Information
    • Understand and Control How Information Is Used and Stored
    • Security Incident Response and Forensics
    • Part of Defense in Depth
  • DLP Use Cases
  • Market Landscape
    • Market Segmentation
    • Market Dynamics and Trends
    • Adjacent Technologies
  • Technology Trends
    • Detection Accuracy Evolution
    • Data Fingerprinting
    • Endpoint Support
    • Lack of DLP Standards
  • Customer Perspectives
    • DLP: Education or Blocking
  • Generic DLP Tool Requirements and Architecture
    • DLP Tool Requirements
    • DLP Tool Architecture
  • Assessing Solutions
    • Architecture
    • Integration
    • Detection Engine and Accuracy
    • Network Support
    • Endpoint Support
    • Discovery and Classification Support
    • Enforcement and Remediation
    • User Experience
    • Management and Reporting
    • Security
  • Risks of DLP
  • DLP Services
  • Future of DLP and DLP for Future IT
    • Forces Shaping the DLP of the Future
    • Evolving IT and DLP
    • Ideal DLP Tool

Comparison

  • DLP Detection Methods
  • DLP Actions
  • Use-Case Comparison
  • DLP Is Part of Data Security
  • Realize That "DLP Is Different"
  • Collaboration Is a Must for DLP
  • Don't Buy More DLP Than You Need Now
  • Buy DLP Tools With Specific Data and Threats in Mind
  • Define Organization-Specific DLP Buying Criteria
  • Use DLP Actions to Secure for Now and Educate for Later
  • Motivate DLP Vendors to Improve Virtual, Cloud and Mobile Support
  • Prepare for DLP's Future

The Details

  • Vendors
    • McAfee
    • RSA
    • Symantec
    • Verdasys
    • Websense

Recommended Reading

Notes

©2020 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.

Already have a Gartner Account?

Become a client

Learn how to access this content as a Gartner client.