Skip to main content

Network Data Loss Prevention (nDLP) - How Does it Differ from Endpoint Data Loss Prevention (eDLP)?

by Graeme Batsman on Wednesday October 25, 2023

Contact Us
Free Demo
Chat

Looking for a nDLP vs. eDLP cheat sheet? In this blog, we break down how network data loss prevention (nDLP) differs from endpoint data loss prevention (eDLP) and vice versa.

Data Loss Prevention (DLP) is everywhere. On endpoints, on email services or servers, on email and web gateways, on Microsoft Teams, on cloud services and more. 

In this article, we'll cut through the complexities and look at what network data loss prevention (nDLP) can do over endpoint data loss prevention (eDLP) and vice versa.

First, a quick primer: What is an endpoint? What is a network? An endpoint is what the end user interacts with. Typically, a desktop or laptop, however tablets and smartphones are included also. The network is the realm between users’ devices, servers, buildings, data centers and really, the internet. nDLP can monitor, track, and analyze activity across a network, uncovering sensitive data in protocols, local and remote repositories while eDLP extends that monitoring to include laptops, servers, and so on.

Looking at the combined features of both eDLP and nDLP

Before looking at what eDLP and nDLP can and can't do, let's define the following actions.

Email: Monitoring and/or blocking of incoming and/or outgoing emails.

Web Traffic: Monitoring and/or blocking of traffic leaving the network.

Bluetooth: Monitoring and/or blocking transfers to laptops, phones or tablets.

CD/DVD/USB: Monitoring and/or blocking of devices or stopping data going to them.

Printing: Monitoring/blocking of physical printing or to PDF.

Application Control: Blocking launches of specified applications.

Discovery: Scanning of network shares, cloud repositories & databases for sensitive information.

Data Registration: Register data you deem sensitive, then look for it later. Instead of writing pattern-based policies; register the data and detect if egress data matches pre-registered data.

Packet Monitor: Take a feed from a switch, monitor traffic and record triggers.

How do they compare? 

   

Other considerations

Cost 

Depending on the features taken, in some scenarios, nDLP can work out being cheaper in licensing and labor costs. 

Setup time 

nDLP is rolled out centrally and does not need an agent for all devices in the organization, something that can reduce implementation time.

AV exclusions 

eDLP requires antivirus exclusions to be done both ways and nDLP does not. 

Faster policy deployment 

NDLP policies are active in seconds whereas agent new policies updates need to be received by end devices. 

In an ideal world, using both eDLP and nDLP would be a perfect way to help increase your organization's visibility and defense-in-depth methodology. Naturally, like most things, everything comes down to your risk appetite, what you want to protect and of course, your budget.

Tags:  Data Loss Prevention Endpoint Security Networking

Graeme Batsman

Graeme Batsman

Graeme is a Sr. Security Consultant with Fortra’s Professional Services team. Based in the UK, Graeme has been in the cybersecurity industry for 17 years. He is experienced in working with clients on their full project and technical requirements to lead his teams to deliver on Fortra’s customer objectives. Throughout his career in cybersecurity, Graeme has written over 125 articles, while also being called upon to appear as a cybersecurity expert in radio, TV, newspapers, and magazines.

Recommended Resources

The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention

All the essential information you need about DLP in one eBook.

6 Cybersecurity Thought Leaders on Data Protection
6 Cybersecurity Thought Leaders on Data Protection

Expert views on the challenges of today & tomorrow.

Digital Guardian Technical Overview
Digital Guardian Technical Overview

The details on our platform architecture, how it works, and your deployment options.

Get the latest security insights
delivered to your inbox each week.