Quick navigation

Forcepoint

Forcepoint Data Loss Prevention (DLP)

Data protection in a zero-perimeter world
Value Proposition

Problem

Data security is a never-ending challenge. On one hand, IT organizations are required to keep up with regulations and protect intellectual property from targeted attacks and accidental exposure. On the other, they must adapt to macro IT movements, such as the adoption of cloud applications, hybrid cloud environments and BYOD trends, all of which increase the ways data can leave your organization. This expanding attack surface poses the most significant challenge to protecting critical data. Data security teams take the seemingly logical approach to chase data: find it, catalogue it and control it. Yet this traditional approach to data loss prevention is no longer effective because it ignores the biggest variable in data security — your people. Instead of focusing solely on data, security should begin and end with people. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. In addition, the enterprise must remain vigilant of data as it moves across the enterprise and highlight the people who create, touch and move data

Solution

Forcepoint DLP addresses human-centric risk with visibility and control everywhere your people work and everywhere your data resides. Security teams apply user-risk scoring to focus on the events that matter most and to accelerate compliance with global data regulations.

Features

  • Regulatory coverage to quickly meet and maintain compliance with over 350 policies applicable to the regulatory demands of more than 80 countries
  • Locate and remediate regulated data with network, cloud and endpoint discovery
  • Central control and consistent policies across the IT environment.
  • Discover and control data everywhere it lives, whether in the cloud or on the network, via email and at the endpoint.
  • Coach employees to make smart decisions, using messages that guide user actions, educate employees on policy and validate user intent when interacting with critical data.
  • Securely collaborate with trusted partners using policy-based auto-encryption that protects data as it moves outside your organization
  • Automate data labeling & classification by integrating with leading third-party data classification solutions
  • Advanced detection and controls that follow the data
  • Machine learning allows users to train the system to identify relevant, never-before-seen data. Users provide the engine with positive and negative examples to flag similar business documents, source code and more.
  • Fingerprinting of structured and unstructured data allows data owners to define data types and identify full and partial matches across business documents, design plans and databases, and then apply the right control or policy that matches the data.
Downloads

Video(s)