What Integrates with Symantec Data Loss Prevention?

Find out what Symantec Data Loss Prevention integrations exist in 2026. Learn what software and services currently integrate with Symantec Data Loss Prevention, and sort them by reviews, cost, features, and more. Below is a list of products that Symantec Data Loss Prevention currently integrates with:

  • 1
    Google Chrome Enterprise Reviews
    See Software
    Learn More
    Chrome Enterprise provides organizations with the tools needed to optimize productivity while ensuring robust security. By offering centralized management, Zero Trust protection, and integrations with existing IT systems, businesses can enhance their workflows with ease. Chrome Enterprise allows for secure remote work and collaboration, ensuring that teams have access to business apps and data no matter where they are. With flexible options for managing devices and policies, companies can streamline security, increase efficiency, and create an open, productive environment for employees across the globe.
  • 2
    MOVEit Reviews

    MOVEit

    Progress Software

    622 Ratings
    See Software
    Learn More
    Progress MOVEit software is a Managed File Transfer (MFT) solution designed to help organizations securely control, monitor and govern the movement of sensitive and mission critical data. As file transfer volumes grow and regulatory requirements become more demanding, many organizations face operational risk from fragmented tools, limited visibility and manual processes. MOVEit software addresses these challenges by centralizing file transfer activity into a single, controlled environment that improves oversight, strengthens security and promotes operational consistency. Progress MOVEit Transfer consolidates internal file transfers, external data exchanges and ad-hoc sharing into one managed system, reducing complexity while improving control over business critical data movement. The platform is well suited for organizations that handle sensitive data and operate in regulated environments, supporting requirements such as PCI DSS, HIPAA and GDPR. Progress MOVEit Cloud extends these capabilities through a fully managed, auditor certified SaaS deployment that delivers the same security, control and governance standards as on premises deployments, without the overhead of maintaining infrastructure. The cloud service provides documented controls, strong encryption, detailed audit logging, role based access enforcement, built in resiliency and continuous monitoring. Progress MOVEit Automation provides no code file transfer automation, simplifying complex, multi step file transfer processes that would otherwise rely on custom scripts. By reducing manual effort and standardizing file movement, MOVEit Automation helps minimize errors, accelerate partner onboarding and improve operational efficiency while maintaining strong security and compliance controls.
  • 3
    NorthStar Navigator Reviews

    NorthStar Navigator

    NorthStar.io, Inc.

    $8 per device
    NorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation.
  • 4
    Siberson Veriket Data Classification Reviews
    Siberson Veriket Data Classification is a cutting-edge platform driven by artificial intelligence that assists businesses in effectively classifying, labeling, and safeguarding sensitive data throughout various environments, including Microsoft 365, Google Workspace, Zimbra, endpoints, emails, file servers, and other business documents. By integrating user input, policy-driven approaches, and AI capabilities, it enhances the precision of labeling, fortifies data governance, and minimizes the risk of exposing sensitive information. Veriket offers a range of customizable classification levels, employs metadata for labeling, incorporates document and screen watermarking, provides guided classification forms, and enables centralized policy oversight. Designed specifically for enterprises and industries with regulatory demands, it empowers security and compliance teams to standardize how information is managed, adhere to privacy and regulatory standards, and improve the overall effectiveness of data loss prevention and comprehensive information protection measures. Furthermore, this platform not only simplifies the classification process but also enhances organizational resilience against data breaches and compliance violations.
  • 5
    F5 BIG-IP SSL Orchestrator Reviews
    Malicious entities exploit SSL/TLS encryption to conceal harmful payloads and evade security measures. To shield your organization from potential threats, it is essential to employ security solutions capable of efficiently inspecting encrypted traffic on a large scale. The BIG-IP SSL Orchestrator offers robust decryption for both incoming and outgoing SSL/TLS traffic, allowing for thorough security inspections that reveal dangers and thwart attacks before they can occur. Enhance your infrastructure and security investments by utilizing dynamic, policy-driven decryption, encryption, and traffic management through your security inspection tools. Safeguard against outbound traffic that may spread malware, steal data, or connect to command-and-control servers to instigate attacks. By decrypting incoming encrypted traffic, you can confirm that it does not contain ransomware, malware, or other threats that can lead to breaches, infections, and security incidents. Additionally, this approach helps eliminate new security blind spots and provides increased flexibility without necessitating significant architectural modifications. Overall, maintaining a proactive stance on encryption inspection is essential for comprehensive cybersecurity.
  • 6
    OctoXLabs Reviews
    Quickly identify, prioritize, and address threats to your security assets within minutes. Leverage Cyber asset attack surface management to enhance your visibility and oversee your entire cybersecurity inventory effectively. Uncover vulnerabilities across all your assets while bridging the gaps often left by traditional agent-based management solutions. Identify weaknesses in servers, clients, cloud environments, and IoT devices seamlessly. Octoxlabs utilizes agentless technology to amplify your visibility, offering over 50 API integrations. You can monitor the status of your installed application licenses at any time, including the number remaining, those already used, and renewal dates, all from a centralized location. Additionally, manage user data better by integrating with intelligence services, allowing for easy tracking of local accounts across all products. Discover devices that possess vulnerabilities yet lack security agents, ensuring that no threat goes unnoticed. Furthermore, this comprehensive approach empowers organizations to bolster their security posture and maintain a proactive stance against emerging risks.
  • 7
    Spirion Reviews
    Spirion has been solving real data protection problems since 2006. Since 2006, Spirion has provided accurate, contextual discovery of structured data and unstructured data. It also provides automated risk remediation and dashboards that give organizations greater visibility into the most sensitive data and assets. Spirion's data security software helps organizations reduce risk exposure, gain visibility to their data footprint, improve business efficiency and decision-making, and facilitate compliance with data protection laws.
  • 8
    CA Auditor for z/OS Reviews
    As each generation of computers evolves, the complexity of operating systems increases significantly. This rising complexity has resulted in a more arduous and time-consuming process for auditing these systems. All operating systems, including mainframes, can experience security vulnerabilities stemming from improper installations, customizations, and bugs associated with product maintenance. CA Auditor serves as a robust software solution that automates the technical review of both the hardware and software environments, effectively pinpointing areas of integrity risk. It detects potential security vulnerabilities arising from misconfigured implementations, allowing for a thorough evaluation of the operating system and its various components. Additionally, it offers functionality to oversee system usage and maintain the integrity of essential system files. By utilizing CA Auditor, users can effectively address significant vulnerabilities within the z/OS operating system, enabling detailed auditing, integrity checks, and necessary verifications for enhanced security measures. This comprehensive approach not only mitigates risks but also fosters a more secure computing environment.
  • Previous
  • You're on page 1
  • Next