Product Overview
Terminal Data leak Prevent System(TDLP) is endpoint data security software that automatically identifies sensitive data on endpoints using content‑recognition technology. It monitors data flows in real time, detects and blocks high‑risk operations (e.g., IM transfers, email sending, USB copying, cloud uploads), and logs all activities to generate audit reports for compliance.
A data security solution for enterprise endpoints (desktops, laptops, mobile devices) to prevent unauthorized leakage of sensitive information. It is ideal for scanning endpoint data, preventing insider leaks, and enhancing endpoint security—crucial for protecting intellectual property and customer privacy.
Key Features & Functions
Sensitive Data Scanning
Supports keyword matching, regular expressions, file properties, document fingerprinting, image recognition, and AI/machine‑learning techniques.
Full‑disk scanning with customizable scope; supports full and incremental scan modes.
Outbound Channel Monitoring
Support IM monitoring, including: WeChat/Enterprise Micro, QQ, Nail, Flybook, WeChat, WhatsApp, Telegram and so on.
Support sensitive information detection of browser, email client, network disk, U disk, FTP sharing, printing, burning, etc.
Risk Behavior Response
Audits and alerts on risky behaviors.
Supports file isolation, encryption, and behavior blocking.
Endpoint Watermarking & Traceability
Enables on‑screen watermarking to deter photos, screenshots, and recordings. Uses watermark metadata to trace back to the originating endpoint.
Application Scenarios
- Preventing Sensitive File Transfers
Block unauthorized copying, uploading, or sharing of confidential documents via USB drives, email, or cloud storage. - Source Code Protection
Monitor and restrict unauthorized transmission or backup of source code on developers’ machines. - Financial and Personal Data Security
Protect spreadsheets, financial reports, and customer data from being leaked by employees or malicious insiders. - Control of Printing and Screen Capture
Prevent printing or screen capture of sensitive data in highly confidential environments. - Insider Threat Mitigation
Detect and alert on suspicious file movements or bulk copying behaviors that could indicate insider threats.


