0% found this document useful (0 votes)
213 views6 pages

Forcepoint: Data Loss Prevention (DLP)

The document discusses Forcepoint Data Loss Prevention (DLP) software. It provides visibility and control over data across networks, endpoints, and cloud applications. The software aims to accelerate compliance with regulations, empower users to securely handle data, and respond to risks through advanced detection and prioritization of incidents.

Uploaded by

acamposbr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
213 views6 pages

Forcepoint: Data Loss Prevention (DLP)

The document discusses Forcepoint Data Loss Prevention (DLP) software. It provides visibility and control over data across networks, endpoints, and cloud applications. The software aims to accelerate compliance with regulations, empower users to securely handle data, and respond to risks through advanced detection and prioritization of incidents.

Uploaded by

acamposbr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

FORCEPOINT Data Loss Prevention (DLP)

DATA PROTECTION IN A ZERO-PERIMETER WORLD


Forcepoint DLP
SECURITY DRIVEN BY THE HUMAN POINT
Data security is a never-ending challenge. On one hand, IT organizations are required to keep up with regulations and
protect intellectual property from targeted attacks and accidental exposure. On the other, they must adapt to macro IT
movements, such as the adoption of cloud applications, hybrid cloud environments and BYOD trends, all of which increase
the ways data can leave your organization.

This expanding attack surface poses the most significant challenge to protecting critical data. Data security teams take
the seemingly logical approach to chase data: find it, catalogue it and control it. Yet this traditional approach to data loss
prevention is no longer effective because it ignores the biggest variable in data security — your people.

Instead of focusing solely on data, security should begin and end with people. The key is to gain visibility into user
interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s
risk and the sensitivity or value of the data.

An organization’s data protection program must consider the human point — the intersection of users, data and networks. In
addition, the enterprise must remain vigilant of data as it moves across the enterprise and highlight the people who create,
touch and move data.

Data protection must: Visibility & control everywhere


 Secure regulated data with a single point of control
for all the applications your people use to create,
your people work & data resides
store and move data.
 Cloud Applications (powered by Forcepoint CASB)
 Protect intellectual property with advanced DLP
that analyzes how people use data, coaches your  Endpoint
people to make good decisions with data and  Network
prioritizes incidents by risk.
 Discovery

Accelerate Empower People Advanced Detection Respond &


Compliance to Protect Data & Control Remediate Risk

Forcepoint DLP addresses human-centric risk with visibility and control everywhere your people work and everywhere
your data resides. Security teams apply user-risk scoring to focus on the events that matter most and to accelerate
compliance with global data regulations.

www.forcepoint.com
ACCELERATE COMPLIANCE  Apply data classification and tagging by integrating
with leading third-party data classification solutions
The modern IT environment presents a daunting
(e.g., Microsoft Azure Information Protection, Bolden
challenge for enterprises aiming to comply with dozens
James, Titus).
of global data security regulations, especially as they
move toward cloud applications and mobile workforces.
Many security solutions offer some form of integrated ADVANCED DETECTION AND CONTROLS THAT
DLP, such as the type found within cloud applications. Yet FOLLOW THE DATA
security teams face unwanted complexity and added costs Malicious and accidental data breaches are complex
when deploying and managing separate and inconsistent incidents, not single events. Forcepoint DLP is a proven
policies across endpoints, cloud applications and solution that analyst firms including Gartner, Forrester
networks. and others recognize as a leader within the industry.
Forcepoint’s DLP offerings are available in 2 versions:
Forcepoint DLP accelerates your compliance efforts by DLP for Compliance and DLP for IP Protection.
combining pre-packaged coverage of global regulations
with central control across your IT environment. Forcepoint DLP for Compliance provides critical capability
Forcepoint DLP efficiently secures sensitive customer addressing compliance with features such as:
information and regulated data so you can confidently
prove ongoing compliance.  Optical Character Recognition (OCR) identifies
data imbedded in images while at rest or in motion
 Regulatory coverage to quickly meet and maintain (available with Forcepoint DLP – Network).
compliance with more than 370 policies applicable to  Robust identification for Personally Identifiable
the regulatory demands of 83 countries. Information (PII) offers data validation checks,
 Locate and remediate regulated data with network, real name detection, proximity analysis and
cloud and endpoint discovery. context identifiers.
 Central control and consistent policies across  Custom encryption identification exposes data hidden
the IT environment. from discovery and applicable controls.
 Cumulative analysis for drip DLP detection
EMPOWER PEOPLE TO PROTECT DATA (i.e., data that leaks out slowly over time).
DLP with only preventive controls frustrates users who  Integration with Microsoft Azure Information
will circumvent them with the sole intention of completing Protection analyzes encrypted files and applies
a task. Going around security results in unnecessary risk appropriate DLP controls to the data.
and inadvertent data exposure.
Forcepoint DLP for IP Protection applies the most
Forcepoint DLP recognizes your people as the front lines advanced detection and control of potential data loss with
of today’s cyber threats. features such as:

 Discover and control data everywhere it lives,  Machine learning allows users to train the system
whether in the cloud or on the network, via email to identify relevant, never-before-seen data. Users
and at the endpoint. provide the engine with positive and negative
 Coach employees to make smart decisions, using examples to flag similar business documents,
messages that guide user actions, educate employees source code and more.
on policy and validate user intent when interacting  Fingerprinting of structured and unstructured data
with critical data. allows data owners to define data types and identify
 Securely collaborate with trusted partners using full and partial matches across business documents,
policy-based auto-encryption that protects data as it design plans and databases, and then apply the right
moves outside your organization. control or policy that matches the data.
 Analytics identify changes in user behavior as
it relates to data interaction such as increased use

www.forcepoint.com
of personal email. VISIBILITY EVERYWHERE YOUR PEOPLE
RESPOND AND REMEDIATE RISK WORK, CONTROL EVERYWHERE YOUR
DATA RESIDES
Traditional approaches to DLP overload users with
false positives while missing data at risk. Forcepoint Forcepoint DLP includes advanced analytics and
DLP applies advanced analytics to correlate seemingly regulatory policy templates from a single point of
unrelated DLP events into prioritized incidents. Incident control with every deployment. Enterprises choose the
Risk Ranking (IRR) provided with Forcepoint DLP fuses deployment options for their IT environment.
disparate DLP indicators into a framework of Bayesian
belief networks to assess the likelihood of data risk
scenarios, such as data theft and broken business
processes.

 Focus response teams on greatest risk with


prioritized incidents that highlight the people
responsible for risk, the critical data at risk and
common patterns of behavior across users.
 Investigate and respond with workflows that link
disparate events, show context of data at risk and
provide analysts with the information they need
to take action.
 Safeguard user privacy with anonymization
options and access controls.
 Add the context of data into broader user analytics
through deep integrations with Forcepoint Insider
Threat and Forcepoint UEBA.

4
APPENDIX A: DLP SOLUTION COMPONENT OVERVIEW

Forcepoint DLP – Forcepoint DLP – Endpoint protects your critical data on Windows and Mac endpoints on and off the corporate network. It includes advanced
Endpoint protection and control for data at rest (discovery), in motion and in use. It integrates with Microsoft Azure Information Protection to analyze
encrypted data and apply appropriate DLP controls. The solution monitors web uploads, including HTTPS, as well as uploads to cloud services
like Office 365 and Box Enterprise. Full integration with Outlook, Notes and email clients.

Forcepoint DLP – Powered by Forcepoint CASB, DLP – Cloud Applications extends the advanced analytics and single control of Forcepoint DLP to critical cloud
Cloud Applications applications, including Office 365, Salesforce, Google Apps, Box and more.

Forcepoint DLP – Forcepoint DLP – Discovery identifies and secures sensitive data across your network, as well as data stored in cloud services like Office 365
Discovery and Box Enterprise. Advanced fingerprinting technology identifies regulated data and intellectual property at rest and protects that data by
applying appropriate encryption and controls.

Forcepoint DLP – Forcepoint DLP – Network delivers the critical enforcement point to stop the theft of data in motion through email and web channels.
Network The solution helps identify and prevent malicious and accidental data loss from outside attacks or from the growing insider threats.
OCR (Optical Character Recognition) recognizes data within an image. Analytics identify DLP to stop the theft of data one record
at a time and other high-risk user behaviors.

APPENDIX B: DLP SOLUTION COMPONENTS DETAIL

FORCEPOINT FORCEPOINT DLP – CLOUD FORCEPOINT FORCEPOINT


DLP – ENDPOINT APPLICATIONS DLP – DISCOVER DLP – NETWORK

How is it IT Managed Network Appliance


Endpoint Agent Forcepoint Cloud
Deployed? Discovery Server or Public Cloud

What is the Collection of Discovery of data and enforcement of Discovery, scanning and Visibility and control for
primary function? information on the user’s policies in the cloud or with cloud-de- remediation of data at rest data in motion via the
endpoint livered applications within data centers web and email

Where all is the On-premises file servers


Windows endpoints Exchange Online
Data discovered / and network storage
protected at rest?
MacOS endpoints Sharepoint Online
Sharepoint Server
Linux endpoints Box
Exchange Server

Where is Email Uploads & sharing for Google Apps Email /Mobile email/
Data in Motion Web: HTTP(S) ActiveSync proxy
protected? Printers Uploads & sharing for Office
Removable media 365/OneDrive Web: HTTP(S)
Mobile devices
File servers / NAS Salesforce.com and Box ICAP

Where is Data in IM, VOIP file sharing,


During collaboration activities using
Use protected? applications (cloud storage
cloud applications
clients), OS clipboard

Incident Risk
Included Included Included
Ranking*

Optical Character
Included Included
Recognition

Data Classification
Microsoft Azure Information Protection, Bolden James, Titus
Integrations

What data can


Structured (databases), Unstructured (documents), Binary (non-textual files)
I Fingerprint?*

*features available in IP Protection version. See Appendix C for further detail.

www.forcepoint.com
ABOUT FORCEPOINT
Forcepoint is transforming cybersecurity by focusing on what matters
most: understanding people’s intent as they interact with critical data
and intellectual property wherever it resides. Our uncompromising
systems enable companies to empower employees with unobstructed
access to confidential data while protecting intellectual property and
simplifying compliance. Based in Austin, Texas, Forcepoint supports
more than 20,000 organizations worldwide. For more about Forcepoint,
visit www.forcepoint.com and follow us on Twitter at @ForcepointSec.

CONTACT
www.forcepoint.com/contact

©2017 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of


Forcepoint. Raytheon is a registered trademark of Raytheon Company. All other
trademarks used in this document are the property of their respective owners.

[BROCHURE_FORCEPOINT_DATA_LOSS_PREVENTION_EN] 400026.112917

You might also like