top of page

AI Data Loss Prevention is full-stack, production-ready software. Built with Python FastAPI on the backend and React 18 with TypeScript on the frontend, it gives you a working codebase for detecting, classifying, and managing sensitive data risks across text inputs, uploaded files, and API integrations. The full stack runs on PostgreSQL and Redis, ships with a Docker Compose configuration covering six services, and includes Celery with a beat scheduler for async and scheduled task processing. It is designed for developers and security-focused technical teams who need a substantial, working DLP codebase without building one from scratch.

 

Every scan passes through a unified parallel pipeline that runs seven AI and ML engines simultaneously: a compiled regex engine with 40+ patterns covering PII, PHI, PCI-DSS, credentials, and financial data including Luhn-validated card numbers; a spaCy transformer NER engine for extracting named entities in context; a DistilBERT multi-label classifier for content categorization; an all-MiniLM-L6-v2 embedding engine for semantic similarity detection that catches paraphrased sensitive content; an Isolation Forest anomaly detector for behavioral scoring; an LLM-powered deep analyzer for contextual risk explanation; and a Policy AI engine that converts plain English descriptions into structured policy rules. Each finding is scored and merged into a single risk level — CRITICAL, HIGH, MEDIUM, LOW, or SAFE — with confidence scores, masked values, and recommended remediation actions.

 

Beyond scanning, the software includes a policy engine with BLOCK, ALERT, QUARANTINE, and LOG actions; an incident management workflow with severity filtering, team assignment, investigation comments, and false-positive marking; on-demand compliance reports for GDPR, HIPAA, PCI-DSS, and SOC 2 with gap analysis and recommendations exportable as CSV or PDF; a real-time dashboard with risk heatmap, scan activity charts, and recent incidents feed; and a full REST API documented via Swagger UI. Authentication uses JWT with TOTP-based two-factor authentication (QR code enrollment included). The LLM-powered features — deep analysis and Policy AI — require an Anthropic API key.

 

The classifier and NER model training data is synthetically generated: 200 labeled classification examples and 102 NER span annotation examples. Synthetic data is used deliberately to improve coverage across sensitive data categories and to ensure no real personal information is embedded in or distributed with the codebase. A complete ML training pipeline is included — fine-tune the DistilBERT classifier, train the spaCy NER model, evaluate performance, and export to ONNX — using the provided scripts and training data.

 

Requirements: Docker Desktop with at least 8 GB RAM (16 GB recommended) for the Docker deployment path. For manual setup, Python 3.11+ and Node.js are required along with a running PostgreSQL instance and Redis. An Anthropic API key is required for the LLM deep analyzer and Policy AI features.

 

IMPORTANT NOTE: This software has been fully developed with all features implemented. However, it has not been tested in a live production environment. Buyers should expect to perform integration testing and may encounter minor bugs that require fixing. Basic technical knowledge and development skills are required. Buyers are solely responsible for ensuring their deployment complies with all applicable data protection laws and regulations, including GDPR, HIPAA, PCI-DSS, and any other frameworks relevant to their jurisdiction and use case.

 

All sales are final. Due to the digital nature of this product, no refunds will be issued under any circumstances.

 

LICENSE TERMS: Seller retains full ownership and control. Purchase grants a non-exclusive, non-transferable, perpetual license—AS IS, no support/updates, no refunds, no other obligations. Buyer may build and operate a materially new, closed-source product (including SaaS/paid service) for their own business/customers. Buyer may not open-source or disclose the application, nor resell, redistribute, rebrand, sublicense, or use the application (or any derivative) to create a competing or substantially similar product. License terms may be updated or changed at any time; continued use constitutes acceptance.

AI Data Loss Prevention Software

  • Ownership. Seller retains all right, title, and interest in and to the software application, including all copyrights and other intellectual property rights. No ownership is transferred to Buyer.

     

    License Grant. Upon payment, Seller grants Buyer a non-exclusive, non-transferable, perpetual license to use, modify, and internally reproduce the software application solely to build, operate, and maintain Buyer’s own closed-source product or service for Buyer’s internal business purposes or for services Buyer provides to Buyer’s customers.

     

    Permitted Commercial Use. Buyer may use the software application as a component in a materially distinct end product or service, including a hosted SaaS or paid service, provided that:

    (a) the end product is offered under Buyer’s own brand;

    (b) the software application is not exposed, sold, licensed, or distributed on a standalone basis;

    (c) Buyer’s customers receive only the functionality of Buyer’s end product or service, not the source code or reusable software itself; and

    (d) the end product or service is not advertised, marketed, positioned, or offered as a substitute for, clone of, competing alternative to, or lower-priced or free version of Seller’s software application or any commercial version of Seller’s software application.

     

    Restrictions. Buyer may not, and may not permit any third party to:

    (a) sell, resell, license, sublicense, redistribute, publish, transfer, or otherwise make available the software application, in whole or in part, on a standalone basis;

    (b) open-source, disclose, or provide access to the source code of the software application except to Buyer’s employees and contractors who are bound by written confidentiality obligations;

    (c) use the software application, or any substantially similar version of it, to create or offer a competing developer tool, template, starter kit, boilerplate, clone, or other product whose primary value is substantially the same as the software application itself; or

    (d) remove any proprietary notices contained in the software application.

     

    Buyer IP. As between the parties, Buyer owns Buyer’s branding, content, data, and original code that Buyer independently creates for Buyer’s end product, excluding the software application and any portion derived directly from it. Seller retains all rights in the software application and all modifications to the software application itself.

     

    No Support; No Warranty. THE SOFTWARE APPLICATION IS LICENSED “AS IS” AND “AS AVAILABLE,” WITHOUT WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, TO THE MAXIMUM EXTENT PERMITTED BY LAW. SELLER HAS NO OBLIGATION TO PROVIDE SUPPORT, MAINTENANCE, UPDATES, OR ENHANCEMENTS.

     

    Termination. This license terminates automatically if Buyer materially breaches these terms. Upon termination, Buyer must stop using the software application itself, except that Buyer may continue operating an already-deployed end product for a reasonable wind-down period of 30 days unless the breach involves unauthorized distribution, disclosure, or competition.

     

    Changes to Terms. Seller may update these license terms prospectively for future sales only. The version in effect on the purchase date governs Buyer’s license, unless Buyer later expressly agrees in writing to a new version.

No Reviews YetShare your thoughts. Be the first to leave a review.
bottom of page