Forcepoint: Data Loss Prevention (DLP)
Forcepoint: Data Loss Prevention (DLP)
This expanding attack surface poses the most significant challenge to protecting critical data. Data security teams take
the seemingly logical approach to chase data: find it, catalogue it and control it. Yet this traditional approach to data loss
prevention is no longer effective because it ignores the biggest variable in data security — your people.
Instead of focusing solely on data, security should begin and end with people. The key is to gain visibility into user
interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s
risk and the sensitivity or value of the data.
An organization’s data protection program must consider the human point — the intersection of users, data and networks. In
addition, the enterprise must remain vigilant of data as it moves across the enterprise and highlight the people who create,
touch and move data.
Forcepoint DLP addresses human-centric risk with visibility and control everywhere your people work and everywhere
your data resides. Security teams apply user-risk scoring to focus on the events that matter most and to accelerate
compliance with global data regulations.
www.forcepoint.com
ACCELERATE COMPLIANCE Apply data classification and tagging by integrating
with leading third-party data classification solutions
The modern IT environment presents a daunting
(e.g., Microsoft Azure Information Protection, Bolden
challenge for enterprises aiming to comply with dozens
James, Titus).
of global data security regulations, especially as they
move toward cloud applications and mobile workforces.
Many security solutions offer some form of integrated ADVANCED DETECTION AND CONTROLS THAT
DLP, such as the type found within cloud applications. Yet FOLLOW THE DATA
security teams face unwanted complexity and added costs Malicious and accidental data breaches are complex
when deploying and managing separate and inconsistent incidents, not single events. Forcepoint DLP is a proven
policies across endpoints, cloud applications and solution that analyst firms including Gartner, Forrester
networks. and others recognize as a leader within the industry.
Forcepoint’s DLP offerings are available in 2 versions:
Forcepoint DLP accelerates your compliance efforts by DLP for Compliance and DLP for IP Protection.
combining pre-packaged coverage of global regulations
with central control across your IT environment. Forcepoint DLP for Compliance provides critical capability
Forcepoint DLP efficiently secures sensitive customer addressing compliance with features such as:
information and regulated data so you can confidently
prove ongoing compliance. Optical Character Recognition (OCR) identifies
data imbedded in images while at rest or in motion
Regulatory coverage to quickly meet and maintain (available with Forcepoint DLP – Network).
compliance with more than 370 policies applicable to Robust identification for Personally Identifiable
the regulatory demands of 83 countries. Information (PII) offers data validation checks,
Locate and remediate regulated data with network, real name detection, proximity analysis and
cloud and endpoint discovery. context identifiers.
Central control and consistent policies across Custom encryption identification exposes data hidden
the IT environment. from discovery and applicable controls.
Cumulative analysis for drip DLP detection
EMPOWER PEOPLE TO PROTECT DATA (i.e., data that leaks out slowly over time).
DLP with only preventive controls frustrates users who Integration with Microsoft Azure Information
will circumvent them with the sole intention of completing Protection analyzes encrypted files and applies
a task. Going around security results in unnecessary risk appropriate DLP controls to the data.
and inadvertent data exposure.
Forcepoint DLP for IP Protection applies the most
Forcepoint DLP recognizes your people as the front lines advanced detection and control of potential data loss with
of today’s cyber threats. features such as:
Discover and control data everywhere it lives, Machine learning allows users to train the system
whether in the cloud or on the network, via email to identify relevant, never-before-seen data. Users
and at the endpoint. provide the engine with positive and negative
Coach employees to make smart decisions, using examples to flag similar business documents,
messages that guide user actions, educate employees source code and more.
on policy and validate user intent when interacting Fingerprinting of structured and unstructured data
with critical data. allows data owners to define data types and identify
Securely collaborate with trusted partners using full and partial matches across business documents,
policy-based auto-encryption that protects data as it design plans and databases, and then apply the right
moves outside your organization. control or policy that matches the data.
Analytics identify changes in user behavior as
it relates to data interaction such as increased use
www.forcepoint.com
of personal email. VISIBILITY EVERYWHERE YOUR PEOPLE
RESPOND AND REMEDIATE RISK WORK, CONTROL EVERYWHERE YOUR
DATA RESIDES
Traditional approaches to DLP overload users with
false positives while missing data at risk. Forcepoint Forcepoint DLP includes advanced analytics and
DLP applies advanced analytics to correlate seemingly regulatory policy templates from a single point of
unrelated DLP events into prioritized incidents. Incident control with every deployment. Enterprises choose the
Risk Ranking (IRR) provided with Forcepoint DLP fuses deployment options for their IT environment.
disparate DLP indicators into a framework of Bayesian
belief networks to assess the likelihood of data risk
scenarios, such as data theft and broken business
processes.
4
APPENDIX A: DLP SOLUTION COMPONENT OVERVIEW
Forcepoint DLP – Forcepoint DLP – Endpoint protects your critical data on Windows and Mac endpoints on and off the corporate network. It includes advanced
Endpoint protection and control for data at rest (discovery), in motion and in use. It integrates with Microsoft Azure Information Protection to analyze
encrypted data and apply appropriate DLP controls. The solution monitors web uploads, including HTTPS, as well as uploads to cloud services
like Office 365 and Box Enterprise. Full integration with Outlook, Notes and email clients.
Forcepoint DLP – Powered by Forcepoint CASB, DLP – Cloud Applications extends the advanced analytics and single control of Forcepoint DLP to critical cloud
Cloud Applications applications, including Office 365, Salesforce, Google Apps, Box and more.
Forcepoint DLP – Forcepoint DLP – Discovery identifies and secures sensitive data across your network, as well as data stored in cloud services like Office 365
Discovery and Box Enterprise. Advanced fingerprinting technology identifies regulated data and intellectual property at rest and protects that data by
applying appropriate encryption and controls.
Forcepoint DLP – Forcepoint DLP – Network delivers the critical enforcement point to stop the theft of data in motion through email and web channels.
Network The solution helps identify and prevent malicious and accidental data loss from outside attacks or from the growing insider threats.
OCR (Optical Character Recognition) recognizes data within an image. Analytics identify DLP to stop the theft of data one record
at a time and other high-risk user behaviors.
What is the Collection of Discovery of data and enforcement of Discovery, scanning and Visibility and control for
primary function? information on the user’s policies in the cloud or with cloud-de- remediation of data at rest data in motion via the
endpoint livered applications within data centers web and email
Where is Email Uploads & sharing for Google Apps Email /Mobile email/
Data in Motion Web: HTTP(S) ActiveSync proxy
protected? Printers Uploads & sharing for Office
Removable media 365/OneDrive Web: HTTP(S)
Mobile devices
File servers / NAS Salesforce.com and Box ICAP
Incident Risk
Included Included Included
Ranking*
Optical Character
Included Included
Recognition
Data Classification
Microsoft Azure Information Protection, Bolden James, Titus
Integrations
www.forcepoint.com
ABOUT FORCEPOINT
Forcepoint is transforming cybersecurity by focusing on what matters
most: understanding people’s intent as they interact with critical data
and intellectual property wherever it resides. Our uncompromising
systems enable companies to empower employees with unobstructed
access to confidential data while protecting intellectual property and
simplifying compliance. Based in Austin, Texas, Forcepoint supports
more than 20,000 organizations worldwide. For more about Forcepoint,
visit www.forcepoint.com and follow us on Twitter at @ForcepointSec.
CONTACT
www.forcepoint.com/contact
[BROCHURE_FORCEPOINT_DATA_LOSS_PREVENTION_EN] 400026.112917