skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration


There is an active market for network and endpoint DLP. This report looks at how the technology has changed, highlights areas where of success, and considers the technology’s future within the next-generation cybersecurity market.


  • The primary role for DLP hasn’t altered during the last decade. In fact, if anything, the need for stronger and more effective data protection has grown as more data is generated, more data is shared, and more users require access.
  • What has changed is the requirement for better data management controls, for more effective approaches to controlling who/what can get access to data, and for better data monitoring and protection services.

Features and Benefits

  • Understand that organizations benefit from knowing where sensitive data is, and how this can be achieved using DLP technology.
  • Understand that clients benefit from understanding how DLP Technology is used to deal with both the accidental and malicious misuse of data.

Key questions answered

  • How will the DLP role will continue evolve?
  • How is DLP Technology used to deal with both the accidental and malicious misuse of data?

Table of contents


  • Catalyst
  • Ovum view
  • Key messages


  • Recommendations for enterprises
  • Recommendations for vendors

The need for DLP technology remains as business protection requirements evolve

  • DLP is readily available in various forms
  • Uptake of pure DLP products remains steady but isn't breaking any records

Compliance, audit, and data protection drive the need for DLP

  • Regulatory compliance, audit demands, and data protection bolster the requirement for DLP services
  • The need to protect sensitive company data is a high priority

Sensitive data exists everywhere and needs to be dealt with

  • On-premise, virtual, and cloud-based operations need to be protected
  • Organizations need to target their DLP initiatives
  • DLP has the ability to help maintain control over business communications
  • Endpoint and mobile device protection is of growing importance
  • Central and virtual servers continue to hold large amounts of sensitive data
  • The use of cloud and managed services adds to the need for improved data protection

DLP has to deal with the accidental and malicious misuse of data

  • Accidental misuse needs to be addressed
  • Where there is malicious intent, DLP takes on a key protection role


  • Further reading
  • Author

Have any questions? Speak to a Specialist

Europe, Middle East & Africa team: +44 7771 980316

Asia-Pacific team: +61 (0)3 960 16700

US team: +1 212-652-5335

Email us at

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Email us at

Contact marketing -

Already an Ovum client? Login to the Knowledge Center now