Definition #
Models monitoring data flows to detect/prevent PII, IP, or financial data leaks.
Key Characteristics #
- Context-aware classification
- User behavior analytics
- Encryption enforcement
- Policy automation
Why It Matters #
Reduces breach costs by $1.2M per incident on average (Ponemon).
Common Use Cases #
1- Email attachment scanning 2- Cloud storage monitoring 3- Endpoint device control
Examples #
- Microsoft Purview
- Symantec DLP
- Forcepoint
FAQs #
Q: Cloud app coverage?
A: 150+ SaaS integrations including Slack, Teams, and Salesforce.
Q: Encryption handling?
A- Analyzes metadata without decrypting sensitive content.