DLP functions on a four-phase principle. In the first phase, the system lets you find the software holes or risk users through which sensitive information might be leaked. In the second phase, these weaknesses are strengthened or fixed. The next phase is notification, where the risk users are cautioned about violations of the rules for protecting sensitive data and trained so as to avoid such situations. The last phase sees the software protection of information loss or leaks.
The system produces benefits by detecting weak points in the system, by protecting sensitive data across all devices, by intuitive training of employees, but also by the automatic repair of system holes.