0% found this document useful (0 votes)
161 views2 pages

Datasheet DLP Feature Comparison en

shows features for dlp

Uploaded by

maedee1399
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
161 views2 pages

Datasheet DLP Feature Comparison en

shows features for dlp

Uploaded by

maedee1399
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Specification Sheet

DLP Feature Comparison Schedule a Demo

Legacy Vendors Limited DLP Vendors

TRELLIX
DATA PROTECTION FEATURE BREADTH FORCEPOINT SYMANTEC ZSCALER NETSKOPE PROOFPOINT MICROSOFT
(MCAFEE)

Single-click remediation

Native remediation extensibility via scripting


on endpoints and policy engines

More than 1700+ data classifiers out of the


box enforced against any egress channel
(Endpoint, Network, Cloud, Web)

Native encryption of files moving


to removable media

Unified DLP policy enforcement


for SaaS Cloud Application (API/Inline)

Network connection not required


for endpoint detection and enforcement

Full Data Security for Email


(MSFT, Google, Mobile, agentless, etc.)

Advanced true file detection


for 900+ file types

Data discovery across critical cloud


and on-prem environments

300+ predefined Natural Language


Processing scripts accurately identifying
common data (PCI, PHI, PCI…)

Cloud app protection:


real-time inline and API

forcepoint.com 1
DLP Feature Comparison Specification Sheet

Legacy Vendors Limited DLP Vendors

TRELLIX
UNIFIED DATA PROTECTION COVERAGE FORCEPOINT SYMANTEC ZSCALER NETSKOPE PROOFPOINT MICROSOFT
(MCAFEE)

Consistent DLP engine for data in motion,


data at rest, data in use

Flexible deployment; cloud, hybrid, on-prem

Single DLP policy enforcement across web,


email, cloud, endpoint, egress channels

Single incident alert UI across all channels

TRELLIX
RISK-ADAPTIVE PROTECTION (UBA) FORCEPOINT SYMANTEC ZSCALER NETSKOPE PROOFPOINT MICROSOFT
(MCAFEE)

Native endpoint user behavioral analytics

Risk analysis based on 130+ Indicators


of Behavior (IOBs)

Integrated risk-based data protection


action plan enforcement
(Contextual and Content based)

Near real-time tunable analytics

TRELLIX
INTEGRATION AND ECOSYSTEM FORCEPOINT SYMANTEC ZSCALER NETSKOPE PROOFPOINT MICROSOFT
(MCAFEE)

Scan Exchange PST files (mailbox),


data at rest

Cloud native deployment with automated


endpoint provisioning

Crowdstrike and BitDefender


Malware Scanning

Compatibility with any classification vendors

Scan legacy on-prem file and data storage


(structured and unstructured)

DISCLAIMER: Product comparison is based off of in-product capabilities and cross-portfolio integrations available from the same vendor as of April 1st, 2024. Comparisons do not include integrations with third-party vendors.
Feature comparison is based off of each vendor’s most recent and modern version available as of Feb 1st, 2024. Information is based off of data collected from public websites and forums, analyst papers, and product datasheets as of April 1st, 2024.

© 2024 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.
All other trademarks used in this document are the property of their respective owners
forcepoint.com/contact [FP-DLP-Feature-Competitive Comparison-Chart-EN] 12Aug2024 2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy