For VendorsBlog
Forcepoint DLP

Add to comparison

Forcepoint DLP

Forcepoint DLP addresses human-centric risk with visibility and control everywhere your people work and everywhere your data resides.

Features of product

Проблемы Problem Solving
  • Risk of data loss or damage
  • Risk or Leaks of confidential information
Ценности Business Values
  • Ensure Security and Business Continuity
Матрица сравнения с конкурентами Matrix of comparison with competitors

About Product


Forcepoint DLP accelerates your compliance efforts by combining pre-packaged coverage of global regulations with central control across your IT environment. Forcepoint DLP efficiently secures sensitive customer information and regulated data so you can confidently prove ongoing compliance. Forcepoint DLP provides critical capability addressing compliance with features such as:

  • Optical Character Recognition (OCR) identifies data imbedded in images while at rest or in motion (available with Forcepoint DLP – Network).
  • Robust identification for Personally Identifiable Information (PII) offers data validation checks, real name detection, proximity analysis and context identifiers.
  • Custom encryption identification exposes data hidden from discovery and applicable controls.
  • Cumulative analysis for drip DLP detection (i.e., data that leaks out slowly over time).
  • Integration with Microsoft Azure Information Protection analyzes encrypted files and applies appropriate DLP controls to the data.

Forcepoint DLP applies advanced analytics to correlate seemingly unrelated DLP events into prioritized incidents. Incident Risk Ranking (IRR) provided with Forcepoint DLP fuses disparate DLP indicators into a framework of Bayesian belief networks to assess the likelihood of data risk scenarios, such as data theft and broken business processes. Forcepoint DLP includes advanced analytics and regulatory policy templates from a single point of control with every deployment. Enterprises choose the deployment options for their IT environment.




Network protection
Endpoint protection
Cloud support
Enterprise email control
Webmail control
Instant messengers control
Internet traffic control
Encrypted traffic control
External/removable devices control
Policy templates

Features of users

Роли заинтересованных сотрудников Stakeholders Roles
  • Chief Information Officer
  • Chief IT Security Officer
  • IT Security and Risk Management
Признаки применимости Company requirements
  • GDPR Compliance
  • Internet access is available for employees
  • IT Security Department in company
  • PCI DSS Compliance
  • Personal data operation
  • Сonfidential data

Work flow chart