sase.cloud
SSE Component

DLP

Data Loss Prevention

9 min readUpdated Feb 2025

Data Loss Prevention is the component of SASE that turns security from a threat-focused discipline into a data-focused one. While every other component in the SASE stack — SWG, FWaaS, ZTNA, CASB — focuses on preventing bad things from getting in, DLP focuses on preventing valuable things from getting out. It is the control that detects when a departing employee uploads the customer database to their personal Google Drive, when a developer pastes proprietary source code into an AI assistant, when a support agent copies PCI cardholder data into an unsanctioned ticketing system, or when a financial analyst emails a pre-earnings spreadsheet to a personal email address.

DLP technology has evolved significantly from its early-2000s origins as a pattern-matching engine that flagged anything resembling a credit card number or Social Security number. Modern SASE-integrated DLP combines multiple detection techniques: regular expression pattern matching for structured data like credit card numbers and SSNs, exact data matching (fingerprinting) that creates a hash of actual sensitive records from your databases and detects when those exact records appear in transit, machine learning classifiers trained to recognize categories of content like source code, legal documents, financial reports, or medical records without needing explicit patterns, and optical character recognition (OCR) that extracts text from images and screenshots to detect sensitive data that has been screen-captured to bypass text-based detection.

The integration of DLP within SASE is a fundamental advantage over standalone DLP products. Because the SASE platform already inspects all web traffic (SWG), all SaaS application traffic (CASB), all non-web traffic (FWaaS), and all private application traffic (ZTNA), DLP policies can be applied consistently across every channel through a single policy engine. There is no gap between web DLP, email DLP, endpoint DLP, and cloud DLP — it is all the same engine, the same policies, and the same incident workflow.

What it does

Data Loss Prevention identifies sensitive data in transit across the network, at rest in cloud applications, and in use on endpoints, then enforces policies that prevent unauthorized disclosure, exfiltration, or mishandling of that data. DLP uses multiple detection techniques in combination: regular expression pattern matching identifies structured data like credit card numbers (PCI), Social Security numbers (PII), medical record numbers (PHI), and API keys. Exact data matching (fingerprinting) hashes actual sensitive records from your databases and detects when those exact records appear in any channel. Machine learning classifiers recognize categories of sensitive content — source code, legal contracts, financial statements, engineering designs — without needing explicit patterns. OCR extracts text from images and screenshots to catch data that has been screen-captured to evade text-based detection. The policy engine applies enforcement actions — block, quarantine, encrypt, alert, coach, or watermark — based on the data type, the user's identity, the destination, and the channel.

How it works

DLP in a SASE architecture operates across multiple inspection points simultaneously. At the SWG layer, DLP scans web uploads, form submissions, and file transfers to internet destinations, detecting sensitive data being exfiltrated to personal cloud storage, webmail, or AI chat services. At the CASB inline layer, DLP applies granular controls to SaaS application interactions — for example, allowing a user to upload files to corporate SharePoint but blocking uploads containing PCI data to a personal OneDrive. At the CASB API layer, DLP scans data at rest in sanctioned SaaS applications, classifying files, applying retention labels, and alerting on overshared sensitive documents. At the FWaaS layer, DLP can inspect non-web protocols for sensitive data exfiltration through channels like FTP, custom database exports, or SSH file transfers. At the ZTNA layer, DLP inspects traffic flowing through authorized tunnels to private applications, detecting data exfiltration even through legitimate access channels. For each detection, the DLP engine calculates a confidence score based on the number of matching patterns, the proximity of related context (a credit card number near an expiration date is higher confidence than a 16-digit number alone), and the volume of sensitive data in the transaction.

Why it matters

Data breaches through legitimate channels are the hardest threat to detect and the most damaging when they occur. An employee with authorized access to a customer database does not trigger any threat detection system when they export that database — they are doing something they are allowed to do. DLP is the only control that examines the content of what is being transferred, not just whether the user is authorized to perform the transfer. For regulatory compliance, DLP provides the technical control that maps to specific requirements in GDPR (Article 32, security of processing), PCI-DSS (Requirement 3 and 4, protecting stored and transmitted cardholder data), HIPAA (Technical Safeguards, access controls and transmission security), and SOX (internal controls over financial reporting). Beyond compliance, DLP protects competitive advantage: source code, product designs, pricing models, M&A plans, and customer lists are the crown jewels that competitors and nation-state actors target. A single source code leak can cost millions in competitive advantage; a customer data breach triggers notification requirements, regulatory fines, and reputational damage that dwarfs the cost of the DLP deployment.

Watch out

The number one mistake in DLP deployment is enabling blocking on day one. Every DLP implementation, without exception, generates false positives. Blocking legitimate business activity because a DLP rule incorrectly flagged a transaction as containing sensitive data will crater user productivity, flood the helpdesk with tickets, and create political opposition that can kill the entire project. Start every DLP deployment in monitor-only mode for 4-6 weeks minimum. During this period, tune detection rules to reduce false positives: adjust confidence thresholds, add context-based exceptions (the finance team legitimately handles PCI data), refine ML classifier training data, and build a whitelist of known-good destinations for sensitive data types. When you do begin enforcement, use coaching actions first — pop-up notifications that warn users and ask them to justify the action — before moving to hard blocks. Coaching reduces risky behavior by 60-70% with dramatically lower operational impact than blocking. Only apply hard blocks to the highest-risk channels: uploads to personal cloud storage, emails to personal webmail domains, and posts to AI chat services.

Vendor comparison — DLP

CiscoSecure Access + Catalyst SD-WAN
Strong

Cloud DLP with exact data matching (EDM), indexed document fingerprinting (IDM), OCR for images and screenshots, and 80+ predefined dictionaries for PCI, PII, PHI, and GDPR. Policies apply consistently across SWG, CASB, and email channels.

FortinetFortiSASE (FortiOS)
Moderate

FortiSASE DLP provides pattern matching with predefined and custom data patterns for PCI, PII, PHI, and GDPR compliance. Supports file type filtering and keyword-based detection. Lacks advanced features found in specialized DLP platforms: no exact data matching (EDM), no indexed document matching (IDM), and limited OCR support for image-based data detection.

Palo AltoPrisma SASE
Leader

Enterprise DLP with exact data matching (EDM), indexed document matching (IDM), ML-based data classification, OCR for images, and 100+ predefined data patterns for global compliance frameworks. Policies apply consistently across SWG, CASB, email, and endpoint channels. Advanced features include proximity-based detection and multi-pattern correlation for reduced false positives.

Check PointHarmony SASE
Moderate

Cloud DLP with predefined data patterns for common compliance frameworks (PCI-DSS, HIPAA, GDPR). Keyword matching, regex patterns, and file type controls. Policies apply across SWG and CASB channels. Lacks advanced capabilities found in enterprise DLP platforms: no exact data matching (EDM), no document fingerprinting (IDM), limited OCR, and basic pattern matching without ML-enhanced classification.

See DLP in context

DLP is one of six core SSE components. See how they fit together and compare vendors.

Stay current
SASE moves fast. We'll keep you sharp.

One email when we publish. No spam. Unsubscribe anytime.