Data Loss Prevention (DLP)

Prevent leakage of sensitive data with minimal effort to value
DLP datasheet
Ultimate Cyber Insurance guide
Protection for sensitive data across 70+ channels
Automatic, behavior-based DLP policy creation and extension
Prompt reactiveness to DLP events
Enhance your security portfolio with streamlined data loss prevention
Unlock new profitability opportunities

Minimize your effort to value and speed up provisioning

Reduce data leakage risks and strengthen compliance

How DLP simplifies service provisioning, management and reporting
1. Effortlessly provision DLP services with automatic policy creation

2. Easily validate the created policy with clients

3. Enforce the DLP policy to start preventing data leaks and boost regulatory compliance

4. Demonstrate your value to clients with powerful widgets

Differentiate your DLP services with an edge over the competition
Current DLP solutions require costly security expertise and deep knowledge of clients’ business processes, together with complex, error-prone, manual configuration to ensure client-specific policies. With DLP, you can prevent data leaks for clients with the provisioning speed and policy management ease you need.

Automated DLP policy creation
Minimize manual work and the risk of error. Simplify provisioning by automatically creating an initial DLP policy for each client with a behavior-based approach.

Client-specific DLP policies
Baseline and profile outgoing sensitive data flows across organizations to automatically map clients’ business processes to a DLP policy — adjusted to their specifics. Leverage optional end-user assistance for higher accuracy, and request client validation before enforcing a policy.

70+ controlled channels
Control data flows across most common local and network channels, including removable storage, printers, redirected mapped drives and clipboard, emails and webmails, instant messengers, file sharing services, social networks, web access, and network protocols

Unmatched DLP controls to differentiate your service
Ensure web-browser-independent control of data transfers to social media, webmail and file-sharing services. Leverage content inspection of outgoing instant messages and sensitive data detection in images sent from remote and offline computers.

Centralized cyber protection with single console
Control your TCO, reduce management overhead and boost margins by using a single solution that integrates backup, disaster recovery, next-generation anti-malware, email security, workload management, and data loss prevention.
Acronis Cyber Protect Cloud with DLP
Prevent data leakage and strengthen compliance with the ease and speed you need
What types of clients could be protected with DLP?
Data loss prevention protects against leakage of sensitive data. Service providers can launch services on top of DLP oriented with clients that store regulated sensitive information such as personally identifiable information (PII), protected health information (PHI), or payment card data (PCI DSS). DLP services are also critical for clients that need to protect confidential corporate information.
Traditional industries that rely more heavily on data loss prevention are banking and finance (BFSI), healthcare, government, IT providers and telecoms, manufacturing, legal, retail and logistics.
How complex is it to provision and manage services on top of Acronis DLP?
Service providers can leverage DLP to deliver data loss prevention services without adding costly security expertise headcount on their end.
Advanced DLP removes the inherent complexity of DLP solutions historically focused at enterprises, with automatic client-specific DLP policy creation achieved by learning from end users.
Advanced DLP also streamlines DLP service management. Once the initial DLP policy is generated automatically in an easy to understand and validate graphical format, the enforced DLP policy can be extended with additional rules to allow and protect newly observed data flows through an automated, user-assisted process.
The advanced pack is natively integrated into Acronis Cyber Protect Cloud, allowing you to centralize service management and provisioning and manage clients per tenant while integrating it with the most common RMM and PSA tools used by service providers.
The unmatched level of data loss prevention automation offered by DLP, with its MSP-centric design, makes it easy to launch a comprehensive DLP service without high costs for Acronis partners.
How are services with DLP usually provisioned?
Provisioning data loss prevention services could be a complex and costly process, historically requiring additional consultation from DLP vendors. DLP, however, is specifically designed to remove this complexity and enable service providers to include a comprehensive DLP into their practice.
The service is provisioned to clients through the Acronis Cyber Protect Cloud agent and requires only a flick of a switch in the management console. In initial provisioning, DLP should be set in observation mode to automatically create the initial DLP policy by observing end users’ behavior and optionally requiring a one-time justification from them for newly detected data flows. The baseline data loss prevention policy creation period should take between one and two months, depending on the quantity of observed data flows during that period.
Once generated, the baseline (initial) DLP policy is presented in an easy-to-understand graphical format. It is then validated with clients, who best understand their business’ specifics and can help make the DLP rules more accurate. The validation process is extremely easy, requires no technical knowledge from clients, and is done in just a few hours.
Once validated, the data loss prevention policy is enforced to allow all business-related transfers of sensitive data while blocking any sensitive data transfer that is not used in the business process. The policy can be enforced in two ways — strict enforcement or adaptive enforcement. In adaptive enforcement, you can leverage automated, user-assisted extensions of enforced policies with additional rules to allow and protect new data flows that were not observed when creating the initial DLP policy. The adaptive enforcement mode enables better business continuity, ensuring new data flows will not be blocked. The strict enforcement mode is for clients who require more strict controls, DLP will block any new data flows that do not match already approved ones in the DLP policy.