Federal header

Data loss protection for Federal Government Agencies


Monitor user activity to prevent data loss and exfiltration with Ava Reveal.

Augment operators

Reveal’s User Activity Monitoring is on the Approved Product List

Ava has successfully completed IA/CS testing. Reveal is now certified by JITC and listed as an approved User Activity Monitoring (UAM) Cybersecurity Tool on the Approved Product List.

Find out more

Scalable data loss and exfiltration prevention

Reveal is a next-generation enterprise data protection solution that helps government departments and agencies prevent data loss and exfiltration, detects behavior-related threats, and trains employees on cyber hygiene and compliance requirements–all within one single platform.

With Reveal, your agency can get visibility, analysis, and understanding of data flows and activity across all your employees and endpoints. Reveal's combination of data protection, user activity monitoring, and privacy capabilities gives your agency the ability to detect and mitigate threats while maintaining the confidentiality of employees and citizens.

Prevent accidental security breaches

Prevent data and security breaches

Reveal safeguards all data in motion, including data moving across email, web browser, external drives and removable media (CDs, USBs, etc), copy/paste, printers, Bluetooth, and more. It complements that data with enhanced visibility to user behaviors, such as sites the employee has visited or connections the employee has initiated. 

Detect malicious insiders

Detect malicious insiders upon install

Built-in rules immediately alert the operator of real-world insider risk scenarios. For example, detect employees using restricted administrative tools, sending sensitive information outside of the organization, circumventing security, and printing documents during irregular hours.

Automated enforcement

Automated enforcement

Constant enforcement without exception–whether they are remote or working offline. Enforcing employee adherence to corporate policies such as Acceptable Use Policy (AUP), Information Security Policy (ISP) and more. 

Full visibility blind spots

Full visibility into current blind spots

Reveal provides full context visibility into all data flows, regardless of labels. As the advanced content inspection happens when data is in motion, the solution assists with classified and top secret markings, internal company policy and regulatory compliance, as well as protection of intellectual property (IP), personal identifiable information (PII), and financial data. 

Out of the box configurable

Out-of-the-box and configurable policies

Policies allow you to automate data protection by defining rules for specific user activities and events and the actions taken if employees breach these rules–e.g. Send an alert of files marked top secret are uploaded to the browser.

Human-centric security

Human-centric security

Individual user profiles shed light on how data is accessed and used, with optional anonymization for privacy. With user activity monitoring, you can protect your systems and data from those who already have privileged access and knowledge of sensitive data and systems.

Jazz Networks merged with Ava Security in September 2020 and the solution is now called Reveal.

User Activity Monitoring (UAM)

Having visibility into non-file-related events further intensifies the organization’s ability to triage and investigate potential data loss. Investigating the specific file movement at hand isn’t all the Security Analyst can do; they can also understand what the user has done before and after the event, which helps to determine intent. 

In accordance with the key UAM requirements defined by NITTF CNSSD 504, the Reveal Agent includes capabilities such as: 

Data icon

Full application content

With a full paper trail—even if the data is deleted or evidence is destroyed during an attack, you can see full application content and metadata. You have all the data structured, consistent, and continuous collected and reported in one place by collecting our own telemetry.
icons web-14

Keystroke monitoring

With the Reveal Agent, you have several capabilities for monitoring, including keyboard typing pattern, keystroke analytics, and keyword blacklisting.
Screen capture icon

Screen capture

You can take a screenshot to capture an image of a user’s desktop based on automatic and manual real-time actions, In addition, motion screenshots show the screen capture recording of when the policy was breached.

File shadowing for all lawful purposes

With files, you can do advanced (regex) and standard content inspection, track file types, content and name changes, as well as see how the files move through your organization.
icons web-29

All collected data must be attributable to a specific user

With the Cyber Passport, all data collected and user activity is attributed to an individual. In the Cyber Passport’s activity feed you can see all user actions and alarms in logical sequence, including print, browser, file and integration events, as well as connections, logins, DNS lookups, USB events, applications, sensors, alarms and more.




Reveal integrates with Splunk’s analytics-driven SIEM to enhance the team's ability to detect and respond to endpoint incidents stemming from insiders.

Microsoft 365

Microsoft 365

The Microsoft Information Protection (MIP) integration allows customers to sync their sensitivity labels to Reveal DLP policies, so the agents can protect files inside and outside the Microsoft environment.


LDAP + Active Directory

Generate and automatically assign labels to users based on attributes in your LDAP directory. With Reveal’s directory labels, configuration and peer analysts of reports is easier. For example, you can create policies for specific departments, filter policy violation reports by department, and enrich user profiles.

Certifications and compliance

  • CYBERCOM insider threat competition winner

    Reveal took first place in the insider threat simulation facing seven industry-leading DLP, EDR, UBA, and SIEM vendors. Winner of seven out of ten categories, including best overall performance.

    Blog post
  • JITC certified

    Reveal successfully completed certification testing with the Defense Information Systems Agency’s (DISA) Joint Interoperability Test Command (JITC).

    Blog post
  • NITTF compliant

    Reveal is compliant with the CNSSD 504 and meets the key User Activity Monitoring (UAM) requirements defined by the NITTF.

    Blog post

Ava Federal partners


Contact our Federal sales team

Ava Federal is a dedicated team focused on business related to the US Federal Government. If you are interested in becoming an Ava Federal reseller or purchasing Ava products, please reach out to us.


Ava Reveal for Government

Choose the winner of U.S. Cyber Command to identify and manage risks related to data processing as well as educating employees on IT security and compliance policies.

Get the brochure