Products
Plans
Solutions
Developers
Resources
Company
Customers
For saas
Nightfall for SaaS
FOR HISTORICAL DATA
Nightfall for Data at Rest
For AI
Nightfall for ChatGPT
For developers
Nightfall Developer Platform
APPLICATIONS
Slack
Jira
Asana
ChatGPT
GitHub
Confluence
Zendesk
Notion
Google Drive
Salesforce
Microsoft Teams
Use Cases
Securely use GenAI
Protect secrets and keys
Automate HIPAA compliance
Automate PCI and PII compliance
Prepare for Mergers and Acquisitions
Build a human firewall
Industries
Digital Health
Fintech
SaaS & Cloud
Compliance
HIPAA
PCI-DSS
ISO 27001
SOC 2
CCPA
SOX ITGC
PARTNERS
Reseller and Channel Partners
Technology Partners
Referral Partners
Compliance and Audit Partners
Getting Started
API Quickstart
Detection Playground
Libraries & SDKs
Examples & Tutorials
Ecosystem
LLM Content Filter
Cribl Integration
Fluentbit Integration
Demo Videos
Webinars
Tutorials
Podcasts
Guides
ROI Calculator
Free Tools
Help Center
Blog
Cloud vs. Network vs. Endpoint DLP
About us
Careers
Contact us
Press
Product
=
Mobile Menu Placeholder
4 ways to secure your HAR files.
AI development tools introduce a number of new security challenges. Here's how to stay secure.
Nightfall’s vision for DLP in an age of GenAI.
In this blog post, we will discuss the essential cybersecurity requirements that vendors must adhere to when selling to banks.
In this blog post, we will discuss some essential cybersecurity requirements for selling to health insurers, including deploying cloud data leak prevention (DLP)
Detect, pinpoint, and triage the highest risks in your environments: Exposed secrets and credentials.
Learn how to add DLP to communications services like Twilio and SendGrid.
Learn about the essential cybersecurity requirements that businesses must meet to sell to the federal government.
A deep dive into the six key security risks posted by Generative AI and the role of Data Leak Prevention (DLP) solutions in mitigating potential risks.
Enterprise data is already transmitting to systems like OpenAI via some of your favorite apps.
Learn how to implement content filtering when using ChatGPT.
When two companies merge, there is typically a lot of data that needs to be transferred between the two organizations. This data may include confidential information such as customer records, financial reports, and employee data. If this data falls into the wrong hands, it could be used to commit fraud or theft. That's where data loss prevention (DLP) comes in.
Jira and Confluence house high volumes of customer information, tickets, notes, wiki articles, and more. To scan Jira and Confluence Data Center or Server editions, you can use Nightfall’s APIs to scan data at-rest in these silos. In this article, we’ll walk through how you can run a full historical scan on your Jira and Confluence data to discover sensitive data, like API keys and PII.
How to implement data loss prevention (DLP) on Slack, and detect leakage of sensitive data across any Slack workspace.
Salesforce houses high volumes of customer information, support tickets, quotes and files, synced emails, tasks & notes, and much more. This data can often be accessed by teams across the company who may leverage Salesforce to provide prospects and customers with a great customer experience.
In this tutorial, we will build a lightweight endpoint DLP scanner that scans files on your device in real-time for sensitive data like PII & secrets using Nightfall's data loss prevention APIs.
In this tutorial, we will create and deploy a server that scans files for sensitive data (like credit card numbers) with Nightfall's data loss prevention (DLP) APIs and the Flask framework.
In this tutorial, we'll demonstrate how easy it is to redact sensitive data and give you a more in-depth look at various redaction techniques, how Nightfall's data loss prevention (DLP) API works, and touch upon use cases for redaction techniques.
In this tutorial, we will walk through the end-to-end process of scanning your Amazon S3 buckets for sensitive data with Nightfall's S3 Sensitive Data Scanner.
Git is a complicated protocol and because git is designed to be a full historical trail of commits, remediation is non-trivial. As a result, we’ve outlined best practices to remediate violations below.