Home IT Forcepoint DLP
ForcepointDLPreviews

Forcepoint DLP

Human-centric cybersecurity platform
our rating 4.5 out of 5 Stars

Forcepoint DLPProduct Overview

  1. About Forcepoint DLP
  2. Pros of Forcepoint DLP
  3. Cons of Forcepoint DLP
  4. Breakdown of core features

Forcepoint DLP product overview

Forcepoint DLP is a human-centric cybersecurity platform for user and data protection. It delivers behavior-based solutions that adapt to risk in real-time through a converged security system that protects network users and cloud access. The platform prevents confidential data from leaving the corporate network and eliminates breaches caused by insiders.

Forcepoint DLP gives tools to streamline the management of global policies across every major channel, including endpoint, network, cloud, web, or email. It simplifies work with pre-defined templates, policies, and classifiers, improving incident management. It empowers organizations to focus on what’s most important–eliminating risk so that people can innovate. Forcepoint DLP addresses risk by bringing visibility and control everywhere people work and anywhere data resides.

Pros of Forcepoint DLP

Back to top ↑

  • The software prevents data breaches automatically and blocks actions based on an individual user’s risk level with risk-adaptive data protection.
  • It enables users to view and control all data with a pre-defined policy library to ensure regulatory compliance across numerous countries for GDPR and CCPA.

Cons of Forcepoint DLP

Back to top ↑

  • According to users, its reporting features need improvement.

Breakdown of core features

Back to top ↑

Endpoint

Forcepoint DLP Endpoint protects critical data on Windows and Mac endpoints on and off the corporate network. The feature includes advanced protection and control for data at rest, in motion, and in use. It integrates with Microsoft Azure Information Protection to analyze encrypted data and apply appropriate DLP controls. It also enables employee self-remediation of data risk based on guidance from the DLP coaching dialog. Furthermore, the solution monitors web uploads, including HTTPS, as well as uploads to cloud services like Office 365 and Box Enterprise.

Discovery

Discovery identifies and secures sensitive data across file servers, SharePoint, Exchange, and detection within databases such as SQL Server and Oracle. Its advanced fingerprinting technology determines regulated data and intellectual property at rest and protects that data by applying appropriate encryption and controls. Discovery also includes OCR, which provides visibility into data in images.

Network

Forcepoint DLP Network delivers the critical enforcement point to stop data theft in motion through email and web channels. It identifies and prevents data exfiltration and accidental data loss from outside attacks or from insider threats. OCR recognizes data within an image, and analytics provides Drip DLP to stop the theft of data one record at a time as well as other high-risk user behaviors.

Cloud email

The Cloud Email feature stops unwanted exfiltration of data and IP through outbound email. Users can combine different ForcePoint solutions to simplify DLP management, writing one policy and deploying that policy across multiple channels. Unlike non-cloud solutions, Forcepoint DLP allows enormous scalability potential from unforeseen bursts of email traffic. It also lets outbound email traffic grow with the business without having to configure and manage additional hardware resources.

(Last updated on 04/22/2022 by Liz Laurente-Ticong)

Quick Facts

  • Industry Specialties
    All Industries
  • Pricing
    Average
  • Works Best For
    Any Sized Businesses

Screenshots

Forcepoint1Forcepoint2Forcepoint3Forcepoint4

Features

  • Drip DLP
  • Native remediation
  • Comprehensive data discovery
  • Fingerprinting/OCR
  • Unified policy enforcement
  • Converged network and endpoint
  • Behavioral Awareness
  • Automated policy enforcement
  • Classification vendor compatibility
  • Database flexibility

Integrations

  • Okta
  • Ericom
  • Splunk
  • VMware
  • Seclore
  • Ping Identity
  • Microsoft Azure Information Protection
  • Boldon James
  • Box Enterprise
  • Office 365

Languages

  • English