Forcepoint Data Guard

Problems that solves

No control over data access

Unauthorized access to corporate IT systems and data

Risk or Leaks of confidential information

Risk of attacks by hackers

Risk of data loss or damage

High costs


Reduce Costs

Ensure Security and Business Continuity

Manage Risks

Forcepoint Data Guard

Forcepoint Data Guard - Secure data and file transfer between physically separated networks


The need for secure collaboration and information sharing continues to increase between and within government agencies. To protect this sensitive data from the persistent threat of a cyber-attack, penetration and data loss, only the most secure methods should be utilized. The sharing and movement of data are essential to the rapid, accurate and precise execution of our customers’ missions. Forcepoint Data Guard enables the bi-directional, automated transfer of highly complex data — including real-time streaming video — between multiple domains, and targets specific high assurance security requirements found in government environments.
Forcepoint Data Guard is the ideal choice for customers that require the highest degree of sensitive data protection for national and mission security.

The Forcepoint Advantage
  • Eliminates costly and time-consuming manual data transfers
  • Delivers byte-level deep content inspection, data validation and filtering that can be tailored to customer-specific security policies, requirements and risks
  • Enables real-time video streaming (MPEG2-TS)
  • Supports TCP and UDP over IP and adaptability for custom interfaces
  • Provides highly customizable data validation rules for maximum flexibility
  • Streamlines the SIEM alert and monitoring process with rapid data transfer from lower-level networks to a single higher-level network
  • Derived from the Common Criteria-evaluated, Red Hat Enterprise Linux 7 secure operating system with Security Enhanced Linux (SELinux) modules

Scheme of work

 Scheme of work

User features

Roles of Interested Employees

Chief Executive Officer

Chief Information Officer

Chief IT Security Officer

Organizational Features

IT Security Department in company

Internet access is available for employees

GDPR Compliance

Personal data operation