Overview
What is Seeker DLP?
Seeker DLP is a Data Loss Prevention (DLP) software designed to detect and protect sensitive data. According to the vendor, Seeker DLP offers advanced features and customizable detection patterns that can be tailored to the specific needs of small to large organizations. It is aimed at IT Security...
Leaving a review helps other professionals like you evaluate Data Loss Prevention Software
Be the first one in your network to review Seeker DLP, and make your voice heard!
Get StartedPricing
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
Alternatives Pricing
Product Details
- About
- Tech Details
What is Seeker DLP?
Seeker DLP is a Data Loss Prevention (DLP) software designed to detect and protect sensitive data. According to the vendor, Seeker DLP offers advanced features and customizable detection patterns that can be tailored to the specific needs of small to large organizations. It is aimed at IT Security Professionals, Data Protection Officers, Compliance Officers, Healthcare Organizations, and Financial Institutions.
Key Features
Local and SMB File Scanning: Seeker DLP utilizes Microsoft Windows IFilters to scan the contents of most files, which the vendor claims ensures reliable and accurate detection of sensitive data. Seeker DLP can also read unidentified formats as plain text and is highly extensible for uncommon file formats.
Scanning a Large Number of Targets Quickly: Seeker DLP offers three methods to scan a large number of targets quickly: Concurrent Remotely Executed Scans, Concurrent SMB Scans, and Concurrent Database Scans. It can also scan OneDrive and web servers concurrently, according to the vendor.
Actionable Reports: Seeker DLP not only detects common forms of sensitive data but also flags files with concerning file system permissions. According to the vendor, it can alert on specific strings in the path of a file, generating reports that provide actionable insights for IT security professionals to address vulnerabilities and mitigate risks. Seeker DLP's reports are also said to aid in compliance with various standards and regulations.
Customizable Detection Patterns: Seeker DLP comes with built-in detection patterns for finding sensitive data like social security numbers, credit card numbers, and identification numbers from different countries. IT security professionals can use Seeker DLP's built-in patterns to search for passwords, SSH keys, and AWS keys. Additionally, organizations can add custom patterns to scan for organization-specific sensitive data, as claimed by the vendor, ensuring tailored data protection.
Seeker DLP Technical Details
Deployment Types | Software as a Service (SaaS), Cloud, or Web-Based |
---|---|
Operating Systems | Unspecified |