Browse Software
List Your Product
Loading...
Endpoint Protector logo

Endpoint Protector

  Add to Compare

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

ManageEngine Device Control Plus logo
Visit Website

78% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Proofpoint Email DLP logo
Visit Website

Overview

Description ManageEngine Device Control Plus is an advanced DLP solution for enterprises, enabling them to discover and monitor threats in an accurate way by assigning role-based access rights and authorizing detected devices. The software helps enterprises say goodbye to insider attacks, assure zero data loss and get access to adequate security within a budget. Enterprises can set read-only access controls and prevent removable devices from copying files. Moreover, admins can also grant temporary access rights to guest devices for a certain amount of time to facilitate easy work. They can also enable the zero-trust approach to curate a list of trusted devices, which will get instant access to confidential business data. ManageEngine Device Control Plus with its explicit set of business dashboards, clear-cut audits and expert policies turns out to be of great help. Further, the software with features like malicious insider activity detection skills, helps admins monitor devices being used within their premises and gain access to instant alerts in case of suspicious activities. Read more Proofpoint Email DLP provides email data loss prevention solutions seamlessly. Email is considered the most critical risk vector for data breaches and thefts. Thus the software provides client organisations with unparalleled visibility and enforcement, without them having to bear extra costs on complex security solutions. Proofpoint Email DLP further detects critical/sensitive data and information besides using the email feature to prevent data leakage outside the organisation. Further, the analysed information is auto-classified under categories like extra-filtration transmissions, critical data loss and sensitive information. The data in concern can be uploaded by the users themselves and it can be in any format ranging from local identification forms to medical record numbers. Proofpoint Email DLP can analyse 300 files at a go and accurately detect the sensitive bits of information and collect them. Further, the software looks for every bit of restricted content and covers them with its built-in dictionaries. Read more
Pricing Options
  • Free Trial Available
  • Starts at $595.0.
  • Free Trial Available
  • Proofpoint Email DLP Offers Custom plan.
SW Score & Breakdown

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    83%
  • Reviews
    64%
  • Momentum
    62%
  • Popularity
    67%

78% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    81%
  • Reviews
    72%
  • Momentum
    63%
  • Popularity
    64%

Features

Total Features
6 Features
5 Features
Common Features for All
    Blacklisting The practice of blocking identified entities to access particular privilege and services
    Compliance Reporting Helps in creating a compliance report to establish an effective and efficient policy and procedure management.
    Data Leak Detection Helps to prevent and mitigate data leaks through endpoints
    File Analysis Helps to analyze and identity ROT (redundant, outdated, and trivial) files to perform disk optimization
    File Server Auditing Records and reports all file accesses and modifications made to file servers in the real-time environment.
    Incident Management Helps in identifying, analyzing and rectifying a bad incident or issues to ensure it does not reoccur in future
    Policy Management Helps to design, maintain, update and report on compliance rules, regulations and policy status electronically so that it is easily accessible
    Sensitive Data Identification Inspects the sensitive data (PII, PCI, PHI) in file contents and classifies the files, folders, and data based on vulnerability
    Threat Protection This feature will defend the system and application from cyber threats
    Whitelisting The practice of allowing identified entities to access particular privilege and services
  • + 3 More - Show Less
    • Blacklisting The practice of blocking identified entities to access particular privilege and services
      Compliance Reporting Helps in creating a compliance report to establish an effective and efficient policy and procedure management.
      Data Leak Detection Helps to prevent and mitigate data leaks through endpoints
      File Analysis Helps to analyze and identity ROT (redundant, outdated, and trivial) files to perform disk optimization
      File Server Auditing Records and reports all file accesses and modifications made to file servers in the real-time environment.
      Incident Management Helps in identifying, analyzing and rectifying a bad incident or issues to ensure it does not reoccur in future
      Policy Management Helps to design, maintain, update and report on compliance rules, regulations and policy status electronically so that it is easily accessible
      Sensitive Data Identification Inspects the sensitive data (PII, PCI, PHI) in file contents and classifies the files, folders, and data based on vulnerability
      Threat Protection This feature will defend the system and application from cyber threats
      Whitelisting The practice of allowing identified entities to access particular privilege and services
  • + 2 More - Show Less
  • Technical Details

    Organization Types Supported
    • Large Enterprises
    • Medium Business
    • Large Enterprises
    • Medium Business
    Platforms Supported
    • SaaS/Web/Cloud
    • Installed - Windows
    • SaaS/Web/Cloud
    • Installed - Windows
    Modes of Support
    • 24/7 (Live rep)
    • Business Hours
    • Online
    • 24/7 (Live rep)
    • Business Hours
    • Online

    Reviews & Ratings

    User Rating
    4.5/5 2 user ratings
    4.7/5 3 user ratings
    Ratings Distribution
    • Excellent

      50%
    • Very Good

      50%
    • Average

      0%
    • Poor

      0%
    • Terrible

      0%
    • Excellent

      66.7%
    • Very Good

      33.3%
    • Average

      0%
    • Poor

      0%
    • Terrible

      0%
      Read All User Reviews Read All User Reviews

    AI-Generated from the text of User Reviews

    Pricing

    Pricing Options
    • Free Trial Available
    • Starts at $595.0.
    • Free Trial Available
    • Proofpoint Email DLP Offers Custom plan.
    Pricing Plans
    Monthly Plans Annual Plans

    Device Control Plus $595.00 $595.00 per year

    Perpetual $1,488.00 $1,488.00 per year

    Proofpoint Email DLP Custom

     
    View Detailed Pricing
    View Detailed Pricing

    Screenshots & Videos

    Screenshots Admin
    + 3 More
    Not Available
    Videos Video Thumbnail
    + 1 More
    Video Thumbnail

    Vendor information

    Company Details Located in: Pleasanton, California Located in: Sunnyvale, California
    Contact Details

    +1-888-720-9500

    https://www.manageengine.com/device-control/

    +1-408-517-4710

    https://www.proofpoint.com/us/products/information-protection/email-dlp

    Social Media Handles

    Not available

    Not available

    We understand SaaS better

    SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

    icon

    Buyers

    Looking for the right SaaS

    We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

    icon

    Makers

    Want more customers?

    Our experts will research about your product and list it on SaaSworthy for FREE.

    Get Listed