SlideShare a Scribd company logo
FORCEPOINT Data Loss Prevention (DLP)
DATA PROTECTION IN A ZERO-PERIMETER WORLD
www.forcepoint.com
SECURITY DRIVEN BY THE HUMAN POINT
Data security is a never-ending challenge. On one hand, IT organizations are required to keep up with regulations and
protect intellectual property from targeted attacks and accidental exposure. On the other, they must adapt to macro IT
movements, such as the adoption of cloud applications, hybrid cloud environments and BYOD trends, all of which increase
the ways data can leave your organization.
This expanding attack surface poses the most significant challenge to protecting critical data. Data security teams take
the seemingly logical approach to chase data: find it, catalogue it and control it. Yet this traditional approach to data loss
prevention is no longer effective because it ignores the biggest variable in data security — your people.
Instead of focusing solely on data, security should begin and end with people. The key is to gain visibility into user
interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s
risk and the sensitivity or value of the data.
An organization’s data protection program must consider the human point — the intersection of users, data and networks. In
addition, the enterprise must remain vigilant of data as it moves across the enterprise and highlight the people who create,
touch and move data.
Forcepoint DLP
Data protection must:
 Secure regulated data with a single point of control
for all the applications your people use to create,
store and move data.
 Protect intellectual property with advanced DLP
that analyzes how people use data, coaches your
people to make good decisions with data and
prioritizes incidents by risk.
your people work  data resides
 Cloud Applications (powered by Forcepoint CASB)
 Endpoint
 Network
 Discovery
Visibility  control everywhere
Forcepoint DLP addresses human-centric risk with visibility and control everywhere your people work and everywhere
your data resides. Security teams apply user-risk scoring to focus on the events that matter most and to accelerate
compliance with global data regulations.
Accelerate
Compliance
Empower People
to Protect Data
Advanced Detection
 Control
Respond 
Remediate Risk
www.forcepoint.com
ACCELERATE COMPLIANCE
The modern IT environment presents a daunting
challenge for enterprises aiming to comply with dozens
of global data security regulations, especially as they
move toward cloud applications and mobile workforces.
Many security solutions offer some form of integrated
DLP, such as the type found within cloud applications. Yet
security teams face unwanted complexity and added costs
when deploying and managing separate and inconsistent
policies across endpoints, cloud applications and
networks.
Forcepoint DLP accelerates your compliance efforts by
combining pre-packaged coverage of global regulations
with central control across your IT environment.
Forcepoint DLP efficiently secures sensitive customer
information and regulated data so you can confidently
prove ongoing compliance.
 Regulatory coverage to quickly meet and maintain
compliance with more than 370 policies applicable to
the regulatory demands of 83 countries.
 Locate and remediate regulated data with network,
cloud and endpoint discovery.
 Central control and consistent policies across
the IT environment.
EMPOWER PEOPLE TO PROTECT DATA
DLP with only preventive controls frustrates users who
will circumvent them with the sole intention of completing
a task. Going around security results in unnecessary risk
and inadvertent data exposure.
Forcepoint DLP recognizes your people as the front lines
of today’s cyber threats.
 Discover and control data everywhere it lives,
whether in the cloud or on the network, via email
and at the endpoint.
 Coach employees to make smart decisions, using
messages that guide user actions, educate employees
on policy and validate user intent when interacting
with critical data.
 Securely collaborate with trusted partners using
policy-based auto-encryption that protects data as it
moves outside your organization.
 Apply data classification and tagging by integrating
with leading third-party data classification solutions
(e.g., Microsoft Azure Information Protection, Bolden
James, Titus).
ADVANCED DETECTION AND CONTROLS THAT
FOLLOW THE DATA
Malicious and accidental data breaches are complex
incidents, not single events. Forcepoint DLP is a proven
solution that analyst firms including Gartner, Forrester
and others recognize as a leader within the industry.
Forcepoint’s DLP offerings are available in 2 versions:
DLP for Compliance and DLP for IP Protection.
Forcepoint DLP for Compliance provides critical capability
addressing compliance with features such as:
 Optical Character Recognition (OCR) identifies
data imbedded in images while at rest or in motion
(available with Forcepoint DLP – Network).
 Robust identification for Personally Identifiable
Information (PII) offers data validation checks,
real name detection, proximity analysis and
context identifiers.
 Custom encryption identification exposes data hidden
from discovery and applicable controls.
 Cumulative analysis for drip DLP detection
(i.e., data that leaks out slowly over time).
 Integration with Microsoft Azure Information
Protection analyzes encrypted files and applies
appropriate DLP controls to the data.
Forcepoint DLP for IP Protection applies the most
advanced detection and control of potential data loss with
features such as:
 Machine learning allows users to train the system
to identify relevant, never-before-seen data. Users
provide the engine with positive and negative
examples to flag similar business documents,
source code and more.
 Fingerprinting of structured and unstructured data
allows data owners to define data types and identify
full and partial matches across business documents,
design plans and databases, and then apply the right
control or policy that matches the data.
 Analytics identify changes in user behavior as
it relates to data interaction such as increased use
of personal email.
4
VISIBILITY EVERYWHERE YOUR PEOPLE
WORK, CONTROL EVERYWHERE YOUR
DATA RESIDES
Forcepoint DLP includes advanced analytics and
regulatory policy templates from a single point of
control with every deployment. Enterprises choose the
deployment options for their IT environment.
RESPOND AND REMEDIATE RISK
Traditional approaches to DLP overload users with
false positives while missing data at risk. Forcepoint
DLP applies advanced analytics to correlate seemingly
unrelated DLP events into prioritized incidents. Incident
Risk Ranking (IRR) provided with Forcepoint DLP fuses
disparate DLP indicators into a framework of Bayesian
belief networks to assess the likelihood of data risk
scenarios, such as data theft and broken business
processes.
 Focus response teams on greatest risk with
prioritized incidents that highlight the people
responsible for risk, the critical data at risk and
common patterns of behavior across users.
 Investigate and respond with workflows that link
disparate events, show context of data at risk and
provide analysts with the information they need
to take action.
 Safeguard user privacy with anonymization
options and access controls.
 Add the context of data into broader user analytics
through deep integrations with Forcepoint Insider
Threat and Forcepoint UEBA.
www.forcepoint.com
Forcepoint DLP –
Endpoint
Forcepoint DLP – Endpoint protects your critical data on Windows and Mac endpoints on and off the corporate network. It includes advanced
protection and control for data at rest (discovery), in motion and in use. It integrates with Microsoft Azure Information Protection to analyze
encrypted data and apply appropriate DLP controls. The solution monitors web uploads, including HTTPS, as well as uploads to cloud services
like Office 365 and Box Enterprise. Full integration with Outlook, Notes and email clients.
Forcepoint DLP –
Cloud Applications
Powered by Forcepoint CASB, DLP – Cloud Applications extends the advanced analytics and single control of Forcepoint DLP to critical cloud
applications, including Office 365, Salesforce, Google Apps, Box and more.
Forcepoint DLP –
Discovery
Forcepoint DLP – Discovery identifies and secures sensitive data across your network, as well as data stored in cloud services like Office 365
and Box Enterprise. Advanced fingerprinting technology identifies regulated data and intellectual property at rest and protects that data by
applying appropriate encryption and controls.
Forcepoint DLP –
Network
Forcepoint DLP – Network delivers the critical enforcement point to stop the theft of data in motion through email and web channels.
The solution helps identify and prevent malicious and accidental data loss from outside attacks or from the growing insider threats.
OCR (Optical Character Recognition) recognizes data within an image. Analytics identify DLP to stop the theft of data one record
at a time and other high-risk user behaviors.
APPENDIX A: DLP SOLUTION COMPONENT OVERVIEW
FORCEPOINT
DLP – ENDPOINT
FORCEPOINT DLP – CLOUD
APPLICATIONS
FORCEPOINT
DLP – DISCOVER
FORCEPOINT
DLP – NETWORK
How is it
Deployed?
Endpoint Agent Forcepoint Cloud
IT Managed
Discovery Server
Network Appliance
or Public Cloud
What is the
primary function?
Collection of
information on the user’s
endpoint
Discovery of data and enforcement of
policies in the cloud or with cloud-de-
livered applications
Discovery, scanning and
remediation of data at rest
within data centers
Visibility and control for
data in motion via the
web and email
Where all is the
Data discovered /
protected at rest?
Windows endpoints
MacOS endpoints
Linux endpoints
Exchange Online
Sharepoint Online
Box
On-premises file servers
and network storage
Sharepoint Server
Exchange Server
Where is
Data in Motion
protected?
Email
Web: HTTP(S)
Printers
Removable media
Mobile devices
File servers / NAS
Uploads  sharing for Google Apps
Uploads  sharing for Office
365/OneDrive
Salesforce.com and Box
Email /Mobile email/
ActiveSync proxy
Web: HTTP(S)
ICAP
Where is Data in
Use protected?
IM, VOIP file sharing,
applications (cloud storage
clients), OS clipboard
During collaboration activities using
cloud applications
Incident Risk
Ranking*
Included Included Included
Optical Character
Recognition
Included Included
Data Classification
Integrations
Microsoft Azure Information Protection, Bolden James, Titus
What data can
I Fingerprint?*
Structured (databases), Unstructured (documents), Binary (non-textual files)
APPENDIX B: DLP SOLUTION COMPONENTS DETAIL
*features available in IP Protection version. See Appendix C for further detail.
ABOUT FORCEPOINT
Forcepoint is transforming cybersecurity by focusing on what matters
most: understanding people’s intent as they interact with critical data
and intellectual property wherever it resides. Our uncompromising
systems enable companies to empower employees with unobstructed
access to confidential data while protecting intellectual property and
simplifying compliance. Based in Austin, Texas, Forcepoint supports
more than 20,000 organizations worldwide. For more about Forcepoint,
visit www.forcepoint.com and follow us on Twitter at @ForcepointSec.
CONTACT
www.forcepoint.com/contact
©2017 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of
Forcepoint. Raytheon is a registered trademark of Raytheon Company. All other
trademarks used in this document are the property of their respective owners.
[BROCHURE_FORCEPOINT_DATA_LOSS_PREVENTION_EN] 400026.112917

More Related Content

What's hot

Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
Happiest Minds Technologies
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
Cisco Canada
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
Hussein Al-Sanabani
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Radhakrishnan Govindan
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
Digital Guardian
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
Symantec
 
Microsoft Defender for Endpoint Overview.pptx
Microsoft Defender for Endpoint Overview.pptxMicrosoft Defender for Endpoint Overview.pptx
Microsoft Defender for Endpoint Overview.pptx
BenAissaTaher1
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
Cloudflare
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
Drew Madelung
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
Robert Crane
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Seccuris Inc.
 
SDL: Secure design principles
SDL: Secure design principlesSDL: Secure design principles
SDL: Secure design principles
sluge
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
Liwei Ren任力偉
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
David J Rosenthal
 
DLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsDLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and Algorithms
Liwei Ren任力偉
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Vignesh Ganesan I Microsoft MVP
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
dj1arry
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365
Dock 365
 

What's hot (20)

Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Microsoft Defender for Endpoint Overview.pptx
Microsoft Defender for Endpoint Overview.pptxMicrosoft Defender for Endpoint Overview.pptx
Microsoft Defender for Endpoint Overview.pptx
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
SDL: Secure design principles
SDL: Secure design principlesSDL: Secure design principles
SDL: Secure design principles
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
DLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsDLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and Algorithms
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365
 

Similar to Brochure forcepoint dlp_en

Dlp notes
Dlp notesDlp notes
Dlp notes
anuepcet
 
data-leakage-prevention
 data-leakage-prevention data-leakage-prevention
data-leakage-prevention
anuepcet
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Eryk Budi Pratama
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET Journal
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
Kim Cook
 
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
Ulf Mattsson
 
Clearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionClearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat Protection
CIO Look Magazine
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Storage Switzerland
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
TranVu383073
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
ALI ANWAR, OCP®
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
alexguzman510050
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 
Data protection services lifecycle approach to critical information protection
Data protection services  lifecycle approach to critical information protectionData protection services  lifecycle approach to critical information protection
Data protection services lifecycle approach to critical information protection
Aujas Networks Pvt. Ltd.
 
GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014Ravindran Vasu
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
alex hincapie
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoft
Appsian
 
Dlp Methodology
Dlp MethodologyDlp Methodology
Dlp Methodology
tbeckwith
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
Mighty Guides, Inc.
 
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareExplore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Konverge Technologies Pvt. Ltd.
 

Similar to Brochure forcepoint dlp_en (20)

Dlp notes
Dlp notesDlp notes
Dlp notes
 
data-leakage-prevention
 data-leakage-prevention data-leakage-prevention
data-leakage-prevention
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 
Clearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionClearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat Protection
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Data protection services lifecycle approach to critical information protection
Data protection services  lifecycle approach to critical information protectionData protection services  lifecycle approach to critical information protection
Data protection services lifecycle approach to critical information protection
 
GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoft
 
Dlp Methodology
Dlp MethodologyDlp Methodology
Dlp Methodology
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
 
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareExplore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Brochure forcepoint dlp_en

  • 1. FORCEPOINT Data Loss Prevention (DLP) DATA PROTECTION IN A ZERO-PERIMETER WORLD
  • 2. www.forcepoint.com SECURITY DRIVEN BY THE HUMAN POINT Data security is a never-ending challenge. On one hand, IT organizations are required to keep up with regulations and protect intellectual property from targeted attacks and accidental exposure. On the other, they must adapt to macro IT movements, such as the adoption of cloud applications, hybrid cloud environments and BYOD trends, all of which increase the ways data can leave your organization. This expanding attack surface poses the most significant challenge to protecting critical data. Data security teams take the seemingly logical approach to chase data: find it, catalogue it and control it. Yet this traditional approach to data loss prevention is no longer effective because it ignores the biggest variable in data security — your people. Instead of focusing solely on data, security should begin and end with people. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. In addition, the enterprise must remain vigilant of data as it moves across the enterprise and highlight the people who create, touch and move data. Forcepoint DLP Data protection must: Secure regulated data with a single point of control for all the applications your people use to create, store and move data. Protect intellectual property with advanced DLP that analyzes how people use data, coaches your people to make good decisions with data and prioritizes incidents by risk. your people work data resides Cloud Applications (powered by Forcepoint CASB) Endpoint Network Discovery Visibility control everywhere Forcepoint DLP addresses human-centric risk with visibility and control everywhere your people work and everywhere your data resides. Security teams apply user-risk scoring to focus on the events that matter most and to accelerate compliance with global data regulations. Accelerate Compliance Empower People to Protect Data Advanced Detection Control Respond Remediate Risk
  • 3. www.forcepoint.com ACCELERATE COMPLIANCE The modern IT environment presents a daunting challenge for enterprises aiming to comply with dozens of global data security regulations, especially as they move toward cloud applications and mobile workforces. Many security solutions offer some form of integrated DLP, such as the type found within cloud applications. Yet security teams face unwanted complexity and added costs when deploying and managing separate and inconsistent policies across endpoints, cloud applications and networks. Forcepoint DLP accelerates your compliance efforts by combining pre-packaged coverage of global regulations with central control across your IT environment. Forcepoint DLP efficiently secures sensitive customer information and regulated data so you can confidently prove ongoing compliance. Regulatory coverage to quickly meet and maintain compliance with more than 370 policies applicable to the regulatory demands of 83 countries. Locate and remediate regulated data with network, cloud and endpoint discovery. Central control and consistent policies across the IT environment. EMPOWER PEOPLE TO PROTECT DATA DLP with only preventive controls frustrates users who will circumvent them with the sole intention of completing a task. Going around security results in unnecessary risk and inadvertent data exposure. Forcepoint DLP recognizes your people as the front lines of today’s cyber threats. Discover and control data everywhere it lives, whether in the cloud or on the network, via email and at the endpoint. Coach employees to make smart decisions, using messages that guide user actions, educate employees on policy and validate user intent when interacting with critical data. Securely collaborate with trusted partners using policy-based auto-encryption that protects data as it moves outside your organization. Apply data classification and tagging by integrating with leading third-party data classification solutions (e.g., Microsoft Azure Information Protection, Bolden James, Titus). ADVANCED DETECTION AND CONTROLS THAT FOLLOW THE DATA Malicious and accidental data breaches are complex incidents, not single events. Forcepoint DLP is a proven solution that analyst firms including Gartner, Forrester and others recognize as a leader within the industry. Forcepoint’s DLP offerings are available in 2 versions: DLP for Compliance and DLP for IP Protection. Forcepoint DLP for Compliance provides critical capability addressing compliance with features such as: Optical Character Recognition (OCR) identifies data imbedded in images while at rest or in motion (available with Forcepoint DLP – Network). Robust identification for Personally Identifiable Information (PII) offers data validation checks, real name detection, proximity analysis and context identifiers. Custom encryption identification exposes data hidden from discovery and applicable controls. Cumulative analysis for drip DLP detection (i.e., data that leaks out slowly over time). Integration with Microsoft Azure Information Protection analyzes encrypted files and applies appropriate DLP controls to the data. Forcepoint DLP for IP Protection applies the most advanced detection and control of potential data loss with features such as: Machine learning allows users to train the system to identify relevant, never-before-seen data. Users provide the engine with positive and negative examples to flag similar business documents, source code and more. Fingerprinting of structured and unstructured data allows data owners to define data types and identify full and partial matches across business documents, design plans and databases, and then apply the right control or policy that matches the data. Analytics identify changes in user behavior as it relates to data interaction such as increased use of personal email.
  • 4. 4 VISIBILITY EVERYWHERE YOUR PEOPLE WORK, CONTROL EVERYWHERE YOUR DATA RESIDES Forcepoint DLP includes advanced analytics and regulatory policy templates from a single point of control with every deployment. Enterprises choose the deployment options for their IT environment. RESPOND AND REMEDIATE RISK Traditional approaches to DLP overload users with false positives while missing data at risk. Forcepoint DLP applies advanced analytics to correlate seemingly unrelated DLP events into prioritized incidents. Incident Risk Ranking (IRR) provided with Forcepoint DLP fuses disparate DLP indicators into a framework of Bayesian belief networks to assess the likelihood of data risk scenarios, such as data theft and broken business processes. Focus response teams on greatest risk with prioritized incidents that highlight the people responsible for risk, the critical data at risk and common patterns of behavior across users. Investigate and respond with workflows that link disparate events, show context of data at risk and provide analysts with the information they need to take action. Safeguard user privacy with anonymization options and access controls. Add the context of data into broader user analytics through deep integrations with Forcepoint Insider Threat and Forcepoint UEBA.
  • 5. www.forcepoint.com Forcepoint DLP – Endpoint Forcepoint DLP – Endpoint protects your critical data on Windows and Mac endpoints on and off the corporate network. It includes advanced protection and control for data at rest (discovery), in motion and in use. It integrates with Microsoft Azure Information Protection to analyze encrypted data and apply appropriate DLP controls. The solution monitors web uploads, including HTTPS, as well as uploads to cloud services like Office 365 and Box Enterprise. Full integration with Outlook, Notes and email clients. Forcepoint DLP – Cloud Applications Powered by Forcepoint CASB, DLP – Cloud Applications extends the advanced analytics and single control of Forcepoint DLP to critical cloud applications, including Office 365, Salesforce, Google Apps, Box and more. Forcepoint DLP – Discovery Forcepoint DLP – Discovery identifies and secures sensitive data across your network, as well as data stored in cloud services like Office 365 and Box Enterprise. Advanced fingerprinting technology identifies regulated data and intellectual property at rest and protects that data by applying appropriate encryption and controls. Forcepoint DLP – Network Forcepoint DLP – Network delivers the critical enforcement point to stop the theft of data in motion through email and web channels. The solution helps identify and prevent malicious and accidental data loss from outside attacks or from the growing insider threats. OCR (Optical Character Recognition) recognizes data within an image. Analytics identify DLP to stop the theft of data one record at a time and other high-risk user behaviors. APPENDIX A: DLP SOLUTION COMPONENT OVERVIEW FORCEPOINT DLP – ENDPOINT FORCEPOINT DLP – CLOUD APPLICATIONS FORCEPOINT DLP – DISCOVER FORCEPOINT DLP – NETWORK How is it Deployed? Endpoint Agent Forcepoint Cloud IT Managed Discovery Server Network Appliance or Public Cloud What is the primary function? Collection of information on the user’s endpoint Discovery of data and enforcement of policies in the cloud or with cloud-de- livered applications Discovery, scanning and remediation of data at rest within data centers Visibility and control for data in motion via the web and email Where all is the Data discovered / protected at rest? Windows endpoints MacOS endpoints Linux endpoints Exchange Online Sharepoint Online Box On-premises file servers and network storage Sharepoint Server Exchange Server Where is Data in Motion protected? Email Web: HTTP(S) Printers Removable media Mobile devices File servers / NAS Uploads sharing for Google Apps Uploads sharing for Office 365/OneDrive Salesforce.com and Box Email /Mobile email/ ActiveSync proxy Web: HTTP(S) ICAP Where is Data in Use protected? IM, VOIP file sharing, applications (cloud storage clients), OS clipboard During collaboration activities using cloud applications Incident Risk Ranking* Included Included Included Optical Character Recognition Included Included Data Classification Integrations Microsoft Azure Information Protection, Bolden James, Titus What data can I Fingerprint?* Structured (databases), Unstructured (documents), Binary (non-textual files) APPENDIX B: DLP SOLUTION COMPONENTS DETAIL *features available in IP Protection version. See Appendix C for further detail.
  • 6. ABOUT FORCEPOINT Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people’s intent as they interact with critical data and intellectual property wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide. For more about Forcepoint, visit www.forcepoint.com and follow us on Twitter at @ForcepointSec. CONTACT www.forcepoint.com/contact ©2017 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. Raytheon is a registered trademark of Raytheon Company. All other trademarks used in this document are the property of their respective owners. [BROCHURE_FORCEPOINT_DATA_LOSS_PREVENTION_EN] 400026.112917