Cyberhaven (www.cyberhaven.com) takes a novel approach to DLP that is provenance-based - i.e. dynamically tracking data from origin to exfiltration point as it crosses end-user devices. By deploying sensors across user endpoint it's not reliant upon 'manual tagging' or 'data classification' tools to be able to identify sensitive data you want to control - overcoming a major limitation of traditional DLP. By looking at the source of the data, Cyberhaven better understands sensitive or privileged information to then track its flows across the organization - and enforce policies based upon much simpler classification rules. It provides intuitive tools that enable you to set custom policies that protect the organization, and educates the users against risky behavior. All this while being lightweight both to the end-user (less than 1% of CPU), and creating no false-positives which distracts from real challenges. They’ve been highly successful around protecting intellectual property like Source Code, research, designs/CADs - stopping PII/PHI from being shared to unauthorized users, preventing accidental insider threats of employees insecurely sharing files to do work, etc.