What is session level DLP and is it actually useful for GenAI data leaks?
Posted by southway_@reddit | sysadmin | View on Reddit | 5 comments
I work at a mid sized B2B tech company and management is pushing pretty hard for AI adoption.....
As a result - employees are noallowed to vibe code small internal tools for their own workflows, and we also have a small dedicated AI engineering team building AI into actual business processes.
From security standpoint this is starting to feel very messy.
People can now build little apps with Lovable, Replit whatever else (like they can connect docs, paste customer data, upload spreadsheets, create internal dashboards, build wrappers around ChatGPT or Claude)...
At first we tried to frame this as “which AI tools are allowed”, but we understood that it is too narrow pretty quickly because the bigger issue is where company data moves once someone is already inside a browser session.
Classic DLP feels too far away in some of these cases. Same with normal web filtering. They can tell me someone visited ChatGPT or uploaded something somewhere, but I’m trying to understand what happened inside the actual browser session.
Was sensitive data pasted into a prompt. Was a file uploaded to Claude. Was an internal tool exposed publicly because someone forgot auth. Was an AI wrapper extension reading page content. Was this done from a managed laptop or some contractor/BYOD machine.
I also really do not want to force everyone into a new enterprise browser unless there is no other choice. I know Island/Talon type tools can give deep control, but for our culture and user base that feels like a big change management project.
I’m trying to understand the practical options for GenAI prompt-level DLP / session-level DLP without overbuilding this thing.
From what I see, CASB/SSE/web filtering gives broad visibility but may miss browser session detail. Browser extension security can make sense if we can enforce it through MDM, but that gets weaker for BYOD and contractor access.
The other bucket we are looking at is agentless SSE / web session security, where the control is more around the access/session path instead of forcing a new browser or heavy endpoint rollout.
Red Access is one we are looking at there, mostly because it seems closer to session level DLP / secure web access than a full browser replacement. I’m not assuming it solves everything. There is still identity/routing/session enforcement somewhere. But the idea of controlling the session without making everyone switch browsers is appealing.
For people who already dealt with this, what did you end up using for GenAI data exfiltration prevention?
Did session level DLP actually help, or did you end up back at browser extensions / enterprise browser / blocking tools?
jafarion@reddit
We’re trialing DefensX for this purpose on a few clients who want to lock this down/track it. Looks like browser extension plus an agent on the machine is one way of doing this.
Low-Egg-6764@reddit
session DLP catches the paste-into-chatgpt path but not the part where the user just screenshots on their phone and retypes it at home
Ihaveasmallwang@reddit
Purview can do all this.
Any-Bet9069@reddit
I was in a similar situation and also didn’t really want to force everyone into a new browser.
Enterprise browsers can make sense if you really need deep control and you can get people to use them, but that was the part I didn’t trust. In our case devs, sales, contractors, everyone already had their normal Chrome/Edge setup, and I could see the rollout turning into a support project before we even got value from it
I think Red Access is suitable if the main problem is unmanaged/BYOD/contractor access and you don’t want to rely on everyone installing an extension or switching browsers. It is more about securing the web session/access path. So less local machine visibility than owning the browser, but much easier to roll out when the laptop is not really yours.
In short, It is more about what control point you can realistically enforce. If you own the device, browser controls are fine. If you don’t, agentless/session level DLP makes sense
Empty-Lingonberry133@reddit
Following this, we are going down the path of purview but I feel in my heart of hearts it won't be enough and I'm so worried about the data leakage that is on the rise. It's all moving so fast and no one seems to understand the gravity (open claw breaches, loveable breaches ect)