Software Alternatives & Reviews

Symantec Data Loss Prevention VS SecurStick

Compare Symantec Data Loss Prevention VS SecurStick and see what are their differences

Symantec Data Loss Prevention logo Symantec Data Loss Prevention

Fully protect your data with the comprehensive detection technologies and unified policies of Symantec's industry leading Data Loss Prevention (DLP).

SecurStick logo SecurStick

Free portable application that lets you carry encrypted files on your USB drive.
  • Symantec Data Loss Prevention Landing page
    Landing page //
    2023-05-11
  • SecurStick Landing page
    Landing page //
    2021-09-29

Symantec Data Loss Prevention videos

No Symantec Data Loss Prevention videos yet. You could help us improve this page by suggesting one.

+ Add video

SecurStick videos

How to use SecureStick

Category Popularity

0-100% (relative to Symantec Data Loss Prevention and SecurStick)
Monitoring Tools
100 100%
0% 0
Security & Privacy
87 87%
13% 13
File Encryption
0 0%
100% 100
Cloud Storage
100 100%
0% 0

User comments

Share your experience with using Symantec Data Loss Prevention and SecurStick. For example, how are they different and which one is better?
Log in or Post with

What are some alternatives?

When comparing Symantec Data Loss Prevention and SecurStick, you can also consider the following products

Microsoft BitLocker - BitLocker is a full disk encryption feature included with Windows Vista and later.

EncFSMP - EncFSMP, a program to mount EncFS folders on Windows and OS X.

Paubox - Paubox provides HIPAA compliant email encryption without the hassle of extra steps.

Encrypto - Encrypto lets you encrypt files before sending them to friends or coworkers.

OpenSSH - OpenSSH is a free version of the SSH connectivity tools that technical users rely on.

File Lock PEA - Password-encryption of files and directories. File PEA encrypts files and folders with authenticated encryption to protect confidentiality and integrity. The program uses memory-hard key derivation functions to prevent custom hardware attacks.