100% found this document useful (2 votes)
368 views8 pages

ForcePoint DLP

The document discusses Forcepoint Data Loss Prevention (DLP) which provides visibility and control over data across endpoints, networks, cloud applications, email and web to prevent data loss and protect regulated information. It highlights key capabilities such as pre-defined policies and classifiers, centralized management, data discovery, user guidance, advanced detection of data in use, and prioritized incident response.

Uploaded by

Mossasi Chun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
368 views8 pages

ForcePoint DLP

The document discusses Forcepoint Data Loss Prevention (DLP) which provides visibility and control over data across endpoints, networks, cloud applications, email and web to prevent data loss and protect regulated information. It highlights key capabilities such as pre-defined policies and classifiers, centralized management, data discovery, user guidance, advanced detection of data in use, and prioritized incident response.

Uploaded by

Mossasi Chun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Forcepoint Data Loss

Prevention (DLP)
Data protection in a
zero-perimeter world

Brochure

forcepoint.com
Forcepoint Data Loss Prevention (DLP) forcepoint.com

Forcepoint DLP Data protection must:


› Secure regulated data with a single
Visibility and control everywhere your people work and data resides point of control for all the applications
your people use to create, store, and
Data security is a major problem for organizations of all types and sizes today. move data.
On one hand, IT organizations are required to keep up with regulations › Protect intellectual property with
and protect intellectual property from targeted malicious attacks as well as
advanced DLP that analyzes how
accidental data loss. On the other, they must adapt to macro IT movements,
people use data, coaches your people
such as the adoption of cloud applications, hybrid cloud environments, and
to make good decisions with data, and
BYOD trends, all of which increase the ways data can leave your organization.
prioritizes incidents by risk.

This expanding attack surface poses the most significant challenge to


protecting critical data. Data security teams must consider the explosion of
data movement from “inside” the organization to all the places and channels
that data now resides and moves. Visibility must be gained across all data in Important channels protected
the cloud as well as on-prem. Data security teams must also have visibility and › Cloud Applications
control across all channels (endpoint, web, network, email and cloud) with a
single point of management.
› Endpoint
› Network
› Discovery
› Web
› Email

Accelerate Empower
Compliance People to
Forcepoint DLP is the industry’s most trusted solution, giving you the tools Protect Data
to easily manage global policies across every major channel, whether its
endpoint, network, cloud, web, or email. We can simplify your work with the
most pre-defined templates, policies and classifiers of any DLP provider in the
industry. This can dramatically streamline your incident management so you
can focus on what’s most important, eliminating risk so that your people can
innovate. Forcepoint DLP addresses risk by bringing you visibility and control
Advanced Respond &
everywhere your people work and anywhere your data resides. Detection Remediate Risk
& Control

2
Forcepoint Data Loss Prevention (DLP) forcepoint.com

→ Discover and control data everywhere it lives, whether in


the cloud or on the network, via email, or at the endpoint.

→ Coach employees to make smart decisions, using


messages that guide user actions, educate employees
Accelerate compliance
on policy, and validate user intent when interacting with
critical data.
The modern IT environment presents a daunting challenge
for enterprises aiming to comply with dozens of global data → Securely collaborate with trusted partners using policy-
security regulations, especially as they move toward cloud based auto-encryption that protects data as it moves
applications and mobile workforces. Many security solutions outside your organization.
offer some form of integrated DLP, such as the type found
→ Automate data labeling & classification by integrating
within cloud applications.
with leading third-party data classification solutions
(e.g., Microsoft Azure Information Protection,
Yet security teams face unwanted complexity and added
Boldon James).
costs when deploying and managing separate and
inconsistent policies across endpoints, cloud applications,
and networks. Forcepoint DLP accelerates your compliance
efforts by combining an extensive library of pre-defined global
regulations with central control across your IT environment.
Forcepoint DLP efficiently secures sensitive customer
information and regulated data so you can confidently prove
ongoing compliance. Advanced detection and controls that follow the data

→ Regulatory coverage to easily meet and maintain Malicious and accidental data breaches are complex incidents,
compliance with more than 1500 pre-defined templates, not single events. Forcepoint DLP is recognized by Gartner and
policies, and classifiers applicable to the regulatory Frost and Sullivan as an industry leader for DLP solutions. One
demands of 83 countries. of the key features is Forcepoint DLPs ability to identify data at
rest, in motion, and in use. Key data identification includes:
→ Locate and remediate regulated data with network,
cloud, and endpoint discovery.
→ Optical Character Recognition (OCR) identifies data
→ Central control and consistent policies across all embedded in images while at rest or in motion.
channels including cloud, endpoint, network, web and
→ Robust identification for Personally Identifiable
email.
Information (PII) offers data validation checks, real name
detection, proximity analysis, and context identifiers.

→ Custom encryption identification exposes data hidden


from discovery and applicable controls.

→ Cumulative analysis for drip DLP detection (i.e., data that


leaks out slowly over time).
Empower people to protect data
→ Integration with Microsoft Azure Information Protection
analyzes encrypted files and automatically applies
DLP with only preventive controls frustrate users who
appropriate DLP controls to the data.
will attempt to circumvent them with the sole intention
of completing a task. Going around security results in
unnecessary risk and inadvertent data exposure.

Forcepoint DLP recognizes your people as at the front lines of


today’s cyber threats.

3
Forcepoint Data Loss Prevention (DLP) forcepoint.com

→ Machine learning allows users to train the system to → Focus response teams on the greatest risk with
identify relevant, never-before-seen data. Users provide prioritized incidents that highlight the people responsible
the engine with positive and negative examples to flag for risk, the critical data at risk, and common patterns of
similar business documents, source code, and more. behavior across users.

→ Fingerprinting of structured (e.g. databases) and → Increase employee awareness for handling sensitive
unstructured (e.g. documents) data allows data owners data and IP with employee coaching on Windows and
to define data types and identify full and partial matches macOS, in addition to enabling employees with integration
across business documents, design plans and databases, of classification solutions like Boldon James and Microsoft
and then apply the right control or policy that matches Azure Information Protection.
the data.
→ Enforce advanced DLP data identification capabilities,
→ Analytics identify changes in user behavior as it relates to such as fingerprinting, on remote work endpoints and in
data interaction such as increased use of personal email. enterprise cloud applications.
With Risk-Adaptive Protection, Forcepoint DLP becomes
→ Enable data owners and business managers with email-
even more effective as it leverages behavior analytics to
based distributed incident workflow to review and respond
understand user risk, which is then used to implement
to DLP incidents.
automated policy enforcement based on the risk level of
the user. This allows security teams to implement dynamic → Safeguard user privacy with anonymization options and
policies which are individualized as compared to static access controls.
global ones.
→ Add the context of data into broader user analytics
through deep integrations with Forcepoint Risk-Adaptive
Identify, manage and remediate data protection risk Protection.

Most DLP solutions lack the robustness of a strong pre-


defined classification library and sensitive visibility across
all your data, overloading users with false positives while
missing data at risk. In addition to making security teams less
effective, this makes employees or end users frustrated as
they see security solutions as a hindrance to their business
productivity. Leveraging analytics, and the largest library of
pre-built templates and policies in the industry Forcepoint
DLP drastically reduces false positives which helps security
operations to be more efficient. To increase employee security
awareness, DLP supports employee coaching and integration
with data classification solutions.
4
Forcepoint Data Loss Prevention (DLP) forcepoint.com

Visibility everywhere including both your data on- → Unify policy enforcement via a single console to define
prem and data in the cloud and apply data in motion and data discovery policies
across all channels—cloud, network, endpoints, web and
Today’s enterprises are challenged with complicated email.
environments, where data is everywhere and requires the
→ Deploy a Forcepoint-hosted solution that extends DLP
protection of data in places that aren’t managed or owned by
policy features including fingerprinting and machine learning to
the enterprise. Forcepoint DLP for Cloud Applications extends
cloud applications, while having the option of maintaining
analytics and DLP policies to critical cloud applications so
incidents and forensics data within your data center.
your data is protected, wherever it resides.
→ View incidents and manage in 3rd Party BI tools
→ Focus response teams to identify and protect data through exposed REST APIs. Automate incident
across cloud applications, network data stores, databases, management workflows and support business processes
and managed endpoints. relying on DLP incidents through automation and service
tools such as ServiceNow, Nagios and Tableau.
→ Identify and automatically prevent sharing of sensitive
data to external users or unauthorized internal users. Forcepoint DLP includes advanced analytics and regulatory
policy templates from a single point of control with every
→ Protect data in real-time for uploads into and downloads
deployment.
from critical cloud applications including Office 365, Teams,
Sharepoint, OneDrive, Salesforce, Box, Dropbox, Google
Apps, AWS, ServiceNow, Zoom, Slack, and many more.

Appendix A: DLP solution component overview

Forcepoint DLP – Endpoint protects your critical data on Windows and Mac endpoints on and off the corporate
network. It includes advanced protection and control for data at rest (discovery), in motion, and in use. It
Forcepoint DLP – integrates with Microsoft Azure Information Protection to analyze encrypted data and apply appropriate DLP
Endpoint controls. It enables employee self-remediation of data risk based on guidance from DLP coaching dialog. The
solution monitors web uploads, including HTTPS, as well as uploads to cloud services like Office 365 and Box
Enterprise. Full integration with Outlook, Notes, and email clients.

Powered by Forcepoint CASB, DLP – Cloud Applications extends the advanced analytics and single control of
Forcepoint DLP –
Forcepoint DLP to sanctioned cloud applications, including Office 365, Salesforce, Box, Dropbox, Google Apps,
Cloud Applications
Amazon AWS, ServiceNow, Zoom, Slack, and many more.

Forcepoint DLP – Discovery identifies and secures sensitive data across file servers, SharePoint (on-premises
and cloud), Exchange (on-premises and cloud), and detection within databases such as SQL server and Oracle.
Forcepoint DLP –
Advanced fingerprinting technology identifies regulated data and intellectual property at rest and protects that
Discover
data by applying appropriate encryption and controls. Discovery also includes OCR which provides visibility into
data in images.

Forcepoint DLP – Network delivers the critical enforcement point to stop the theft of data in motion through email
Forcepoint DLP – and web channels. The solution helps identify and prevent data exfiltration and accidental data loss from outside
Network attacks or from insider threats. OCR recognizes data within an image. Analytics provides Drip DLP to stop the
theft of data one record at a time as well as other high-risk user behaviors.

Forcepoint DLP for Cloud Email stops unwanted exfiltration of your data and IP through outbound email. You can
combine with other Forcepoint DLP channel solutions such as Endpoint, Network, Cloud and Web to simplify
Forcepoint DLP for your DLP management, writing one policy and deploying that policy across multiple channels. Unlike non-cloud
Cloud Email solutions, Forcepoint DLP for Cloud Email enables enormous scalability potential from unforeseen bursts of
email traffic. It also allows your outbound email traffic to grow with your business without having to configure and
manage additional hardware resources.

Forcepoint DLP - Cloud Web allows you to monitor and prevent the loss of sensitive data and intellectual property via the web, and
Cloud Web easily assess the risk exposure of those websites visited.

5
Forcepoint Data Loss Prevention (DLP) forcepoint.com

Appendix B: DLP solution component overview

FORCEPOINT FORCEPOINT FORCEPOINT FORCEPOINT FORCEPOINT FORCEPOINT


DLP – DLP – CLOUD DLP – DLP–– DLP – DLP –
ENDPOINT APPLICATIONS DISCOVER NETWORK CLOUD EMAIL CLOUD WEB

How is it Forcepoint Forcepoint IT Managed Network Forcepoint Forcepoint


deployed? One Endpoint Cloud Discovery Appliance or Cloud Cloud
Server Public Cloud

What is Collection of Discovery of Discovery, Visibility and Visibility and Visibility


the primary information data and scanning, and control for control for and control
function? on the user’s enforcement of remediation data in motion data in motion for data in
endpoint policies of data at rest via the web via outbound motion via
in the cloud or within data and web email email the web (not
with cloud- centers within the within the
delivered network network)
applications

Where is Windows OneDrive, On-premises


the data endpoints Sharepoint file servers
discovered / MacOS Online, and network
protected endpoints Exchange storage,
at rest? Online, Google Sharepoint
Drive, Box, server
DropBox, Exchange
Salesforce, server,
ServiceNow Databases
like Microsoft
SQL Server,
Oracle, and
IBM Db2

Where is Email, Web: Uploads, Email, Web: Email HTTP(S)


data in HTTP(S), downloads & HTTP(S) ICAP
motion Printers, sharing for
protected? Removable Office 365,
media, File Google Apps,
servers / NAS Salesforce.
com, Box,
Dropbox &
ServiceNow
via API
and all other
major
apps via proxy

Where is Zoom, Webex, During


data in use Google collaboration
protected? Hangouts, IM, activities
VOIP file using cloud
sharing, applications
applications
(cloud storage
clients),
OS clipboard

6
Forcepoint Data Loss Prevention (DLP) forcepoint.com

Appendix B: DLP solution component feature comparison

FORCEPOINT FORCEPOINT FORCEPOINT FORCEPOINT FORCEPOINT FORCEPOINT


DLP–– DLP – CLOUD DLP–– DLP–– DLP – DLP –
ENDPOINT APPLICATIONS DISCOVER NETWORK CLOUD EMAIL CLOUD WEB

Risk-Adaptive Add-on
Protection

Optical Included Included Included


character
recognition

Data Microsoft
classification Azure
& labeling Information
integrations Protection,
Boldon James

What data
can be
Structured (databases), Unstructured (documents), Binary (non-textual files)
finger-
printed?*

Unified policy
Policy configuration & enforcement via single console from endpoints to cloud applications
management

Robust policy
Discovery & enforcement from the largest compliance policy library in the industry
library

7
About Forcepoint
forcepoint.com/contact Forcepoint is the leading user and data protection cybersecurity
company, entrusted to safeguard organizations while driving
digital transformation and growth. Forcepoint’s humanly-attuned
solutions adapt in real-time to how people interact with data,
providing secure access while enabling employees to create
value. Based in Austin, Texas, Forcepoint creates safe, trusted
environments for thousands of customers worldwide.

© 2022 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.
All other trademarks used in this document are the property of their respective owners.
[DLP-BROCHURE-US-EN] 15Feb2022

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy