There are several solid software solutions on the market that address just DLP. However, Cyberhill recommends taking a holistic look at the environment, including governance. An enterprise could implement a DLP only to allow a compromised privileged user inside. We have several partners and extensive knowledge to assist in the architecture, requirements, and selection of the proper solution.