Skip to main content
TrustRadius
Forcepoint DLP

Forcepoint DLP

Overview

What is Forcepoint DLP?

Forcepoint DLP promises to address human-centric risk by providing visibility and control everywhere your people work and everywhere your data resides. Security teams apply user-risk scoring to focus on the events that matter most and to accelerate compliance with global data regulations.The…

Read more
Recent Reviews

TrustRadius Insights

Users of Forcepoint DLP have reported that the product effectively monitors critical streams to prevent data leakage and offers ease of …
Continue reading

Stop Data Leakage

7 out of 10
July 13, 2022
Forcepoint Data Loss Prevention is [being] used across [the] organization to safeguard the sending of sensitive data outside the …
Continue reading

Good tool to use!

9 out of 10
December 23, 2019
Incentivized
We use Data Loss Prevention across org and, it addresses problems like Data Loss of PII. We have deployed the agents as well on endpoints.
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Forcepoint DLP?

Forcepoint DLP promises to address human-centric risk by providing visibility and control everywhere your people work and everywhere your data resides. Security teams apply user-risk scoring to focus on the events that matter most and to accelerate compliance with global data…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

82 people also want pricing

Alternatives Pricing

What is Rewind Backups?

Rewind from Third Blink Software in Ontario (dba Rewind) is a service that protects the data that is driving your ecommerce and small to midsize businesses, focusing on backing up data that lives in the cloud – specifically in apps like Shopify, BigCommerce, and QuickBooks Online.

What is MX Layer?

MX Layer is an enterprise security company based in the United States, focusing on providing cloud-based solutions for email security, business continuity, data loss prevention and email archiving services. MX Layer aims to ensure that their comprehensive email security platform protects company's…

Return to navigation

Product Demos

Forcepoint DLP & AWS Security Hub | Forcepoint Integrations Podcast

YouTube
Return to navigation

Product Details

What is Forcepoint DLP?

Forcepoint DLP promises to address human-centric risk by providing visibility and control everywhere your people work and everywhere your data resides. Security teams apply user-risk scoring to focus on the events that matter most and to accelerate compliance with global data regulations.

The vendor promises these benefits:
  • Accelerate compliance
  • Empower people to protect data
  • Advanced detection and controls that follow the data

RESPOND AND REMEDIATE RISK
Traditional approaches to DLP overload users with false positives while missing data at risk. Forcepoint DLP applies advanced analytics to correlate seemingly unrelated DLP events into prioritized incidents. Incident Risk Ranking (IRR) provided with Forcepoint DLP fuses disparate DLP indicators into a framework of Bayesian belief networks to assess the likelihood of data risk scenarios, such as data theft and broken business processes.

VISIBILITY EVERYWHERE YOUR PEOPLE WORK, CONTROL EVERYWHERE YOUR DATA RESIDES
Today’s enterprises are challenged with complicated environments, where data is everywhere and requires the protection of data in places that aren’t managed or owned by the enterprise. Forcepoint DLP for Cloud Applications extends analytics and DLP policies to critical cloud applications so your data is protected, wherever it resides.

Forcepoint DLP Features

  • Supported: Endpoint
  • Supported: Cloud applications
  • Supported: Discovery
  • Supported: Network

Forcepoint DLP Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationNo

Frequently Asked Questions

Symantec Data Loss Prevention and VikingCloud are common alternatives for Forcepoint DLP.

Reviewers rate Support Rating highest, with a score of 5.3.

The most common users of Forcepoint DLP are from Mid-sized Companies (51-1,000 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(65)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Users of Forcepoint DLP have reported that the product effectively monitors critical streams to prevent data leakage and offers ease of management. They have found the API feature in Forcepoint DLP particularly helpful as it allows for automation, addressing the problem of slowness and delays in incident creation. The manager approval process with Network Email has been praised for its ability to effectively notify managers of any user activity.

Forcepoint DLP provides comprehensive coverage, unified data protection, reporting capabilities, and customization options. It also integrates seamlessly with other Forcepoint products, enhancing its usefulness for organizations. Users have highlighted the small footprint and quick data classification capabilities of Forcepoint endpoint DLP, which helps them efficiently protect their data. The availability of good pre-defined policies and a user-friendly interface contribute to the benefits organizations experience in terms of core data protection.

The integration of all data vectors on a single console is another valuable use case for Forcepoint DLP. Users have successfully utilized the product to protect their organization's confidential data, particularly in web and email data protection scenarios. With its ability to prevent data loss and breaches, provide better visibility and control over data, improve compliance, and automate IT security work, Forcepoint DLP has proven to be a valuable tool for businesses. Daily analysis of DLP reports helps track users' activities related to sensitive information and easily identify suspicious activity. Additionally, by implementing data protection policies across thousands of devices and enabling centralized monitoring and actions on incidents, organizations can effectively safeguard their sensitive information.

Websense, now part of Forcepoint, has been widely used to prevent users from uploading company documents to external websites or attaching them to personal emails. It has successfully addressed internal internet abuse issues by cutting down on desktop problems and preventing pop-ups. Globally utilized for web security purposes, Websense performs functions such as monitoring, filtering traffic, web caching, proxy server operation, content filtering, inspection of end-user web traffic, and blocking inappropriate site categories. It is also leveraged for internet traffic filtering, email spam filtering, and DLP across multiple offices and locations.

Websense Data Security Suite has been instrumental in protecting valuable intellectual property, proprietary information, and sensitive data like electronic healthcare records and credit card data. Users have reported successful detection of the transmission of company confidential documents and violations of corporate policies. By adding security to internet-bound traffic, securing IP, and controlling bandwidth costs, Websense offers important benefits and use cases. Furthermore, it is used extensively for implementing endpoint DLP, content gateway, web filtering, URL filtering, and email security. Users have found Websense to be easy to navigate, user-friendly, and have had positive experiences with the product.

Forcepoint has made improvements to their product and has shown remarkable improvement in customer service. It is being widely used as a Web Security and DLP solution across organizations. The primary use case for Forcepoint is PII data loss prevention, helping prevent unauthorized disclosure of member data and discovering the actual location where PHI resides and how it is shared. The threshold feature in Forcepoint DLP triggers an alarm to the administrator for further review when a set amount of PHI is shared externally.

Forcepoint DLP is extensively used to identify and locate ePHI on disk and in transit via email. It effectively stops data loss via USB storage devices, especially concerning internal employees. This makes it particularly valuable for the health insurance industry, enabling compliance with regulations such as PCI, HITRUST, HIPAA, etc. It addresses problems like Data Loss of PII and is deployed on endpoints to flag attachments and messages containing customer PII or proprietary information.

Forcepoint DLP serves as a web proxy that monitors and warns users about potentially unauthorized data printing, storing, or sharing. It helps track data exfiltration and allows Data Custodians from different departments to review incidents. Users have recommended Forcepoint DLP for clients starting their data loss prevention journey with endpoint protection before moving on to network data loss prevention. With its ability to prevent data leakage and protect critical data on employee devices regardless of location, Forcepoint DLP strengthens web security while providing visibility and control over abnormal activities.

This all contributes to the overall objective of using Forcepoint DLP enterprise-wide: preventing intentional or unintentional data leakage from the organization. It protects valuable data on Cloud, servers, and on-premises systems while providing confidence in controlling abnormal activities that could lead to data breaches. The capture of incidents with low false positives ensures efficient incident management and response.

Effective Endpoint Data Loss Prevention Module: Users have found the Forcepoint Endpoint DLP module highly effective in securing data at endpoints, such as Microsoft Excel and other Microsoft capabilities, email, FTP, and Active Sync. Reviewers have specifically praised its OCR capabilities for preventing sensitive data theft through embedded text recognition in images.

Flexible Filtering and Customization: The software provides a great range of flexibility and features that allow users to filter web content and block access to undesirable or infected sites. Reviewers appreciate the ability to customize filtering based on user/group/domain, IP address, or range, enhancing their control over web access.

Seamless Integration with Firewall: Users have praised the seamless functionality between Forcepoint Endpoint DLP and the firewall. This integration has been particularly appreciated for its ease of use and efficient security management.

Difficult and Tedious Deployment: Users have found deployment on multiple servers to be difficult and tedious, often requiring significant effort and time to set up the system as per their specific requirements.

Improvement Needed in Data Discovery and Machine Learning Techniques: Some users feel that the data discovery and machine learning techniques of the product need improvement. They believe that these features are not as effective or accurate as desired, leading to challenges in identifying and protecting sensitive data.

Lack of Integration with Network DLP and Other Tools: Users have expressed frustration over the lack of integration with Network DLP tools. This limitation makes it challenging for organizations to seamlessly incorporate the product into their existing security infrastructure, hindering efficient data protection measures.

Users who have reviewed Forcepoint DLP commonly recommend the following:

  1. Deploying correctly and following business processes: Users have found that Forcepoint DLP can be effective if it is deployed correctly and if business processes are followed and updated. They emphasize the importance of implementing the solution properly to maximize its effectiveness.

  2. Selecting Forcepoint DLP for comprehensive data loss prevention: Users recommend choosing Forcepoint DLP because it offers a complete package of data loss prevention capabilities. They appreciate that the product addresses various aspects of data security.

  3. Utilizing advanced features: Users suggest that Forcepoint DLP stands out as the best option for advanced features like OCR (Optical Character Recognition). They highlight the product's ability to provide advanced functionalities for enhanced data protection.

Attribute Ratings

Reviews

(1-25 of 34)
Companies can't remove reviews or game the system. Here's why
Piyush Mittal | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Ws are using this product to prevent data from leakage from internal environment to outside public environment. We have deployed this product on all internal systems via endpoints and also on our email server. This product captures DLP incidents with very less false positives and it is very good in functionality.We can easily deploy policies and it has a easy to use interface.
  • Incidents identification and escalation is easy
  • Policy deployment is easy
  • Blocking access to users
  • Deployment on multiple servers is difficult
  • Data discovery can be improved
  • Machine learning technique can be improved
It's very user friendly and easy to use. Rules can be managed on user-friendly interface web site console. For-example, violation can be release via management module. It provide prevention sensitive data against accidental data loss and compromised. Rule set sometimes work, sometimes does not work. There is no OCR feature. Forcepoint DLP tool does not have any AI feature that can learn user behavior or data and produces alarm.
July 13, 2022

Stop Data Leakage

Score 7 out of 10
Vetted Review
Verified User
Forcepoint Data Loss Prevention is [being] used across [the] organization to safeguard the sending of sensitive data outside the organization. We solve problems where users should not be able to send any company information for their personal use, such as sending files [that] are not sensitive but still the company's data. Also, we have to monitor what incidents are triggered by the endpoint for us to keep track, monitoring incidents through images using OCR, and using risk score to get the details of which user tried to violate the policy more often, even if it was blocked for him.
  • Performing finger printing
  • Performing discovery tasks
  • Detecting data from images using OCR
  • Pre-defined policies
  • Agent communication with data loss prevention servers
  • Getting unwanted incidents using pre-defined policies
If any organization doesn't want to share data outside the organization. It is always recommended to use user-defined policies to avoid any false incidents and using up drive space. Using the management console is easy to understand and you get everything in a systematic manner.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We are using Forcepoint DLP for preventing users from intentionally or unintentionally leaking data from the organization whether they are in office premises or working from home or working from branch offices or working from elsewhere. We restrict users to upload business-critical data to a website, USB device or even through any application.
  • Data leak prevention, as it is meant to do
  • Application control, monitoring and blocking on users system
  • Device control
  • Website blocking
  • Integration with Network DLP and other tools
  • Deployment is tedious as there are multiple servers for multiple services
  • Connectivity is not secure
Forcepoint Data Loss Prevention is very well suited for organizations where [the] user count is more than 200 users. These users can be work from home users or users visiting the office premises or even branch office users. As Forcepoint is only supported on Windows and MAC operating systems, it is less likely to be suitable for such environments.
Olivia Jayy | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Our entire organization depends on Forcepoint Data Loss Prevention to protect our valuable data on Cloud, server and on-premises. Powerful tool that helps to protect data at rest, data in-motion and data in use giving us the visibility and control to every abnormal activity by the user within our networked environment.
  • Cloud secure data protection.
  • Unified policy enforcement.
  • Risk-adaptive protection based on user behavior.
  • The way to discover data at risk can be improved.
  • Additional cost to professional support.
  • Improvement to reporting days per week.
Effective tool that safeguards our data with a single policy and simplifies compliance with predefined policies, and the automatic access control and usage is very convenient to our web and networked environments. Forcepoint Data Loss Prevention protects our critical intellectual property with unsurpassed accuracy and provides a secure mobile application access to data on and off network.
Brandon Smith | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Forcepoint Data Loss Prevention is a data loss prevention software and due to the nature of this category, this tool is used as a web proxy all across our organization. It is used enterprise-wide in my organization. This tool has been installed on all of the PCs, laptops, and servers that we own. This software has ensured us how and when people are attempting to print, store, and even share data with potentially unauthorized teams.
  • It has predominantly protected us from unauthorized parties and has provided us with better visibility and control over our data.
  • This software has also successfully prevented us from both malicious and accidental tasks, which are quite flexible actions when it comes to the violation of data loss prevention policies.
  • This product has been successful in improving compliance and even mitigating compliance violations, which further facilitated IT security.
  • I think there is room for improvement, as the user interface is slightly rough and difficult to adopt in the beginning. The software also hangs up at a few instances, which leads to some wasting of time and annoyance, but other than that, this software is good. The technical staff should work on the complexities for a better user experience.
  • This tool would have been more effective if whitelisting was not restricted, as it should be able to adjust just so it can be read accurately.
  • Fingerprinting is a little too sensitive, which should also be further strengthened when files are found.
I find this tool to be a great product, as it comes in really very handy. This product is great when it comes to scenarios where you are just trying to block some specific types of information and data out of your company.
Flavio Pereira | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Forcepoint Data Loss Prevention is exceptional and has pleased me and IT. So far it has only been implemented at our headquarters. And the biggest problem we had was the fear of data leakage through corporate equipment and devices. This Forcepoint DLP solution now protects critical data through encryption and prevents information theft from our devices, even in cases of theft, where we create action plans to execute in those cases. Along with other tools, it has improved our information security and we are happy with this product.
  • Effective data leakage protection
  • Email security
  • URL filter
  • It has a graphical interface for creating security rules
  • Device information theft protection
  • Good price
  • URL filter with few categories
  • Small instabilities
I would recommend Forcepoint Data Loss Prevention; it can be used in any scenario, best suited for small and medium-sized operations. It is easy to use and configure through its graphical interface, being able to create rules within rules, exceptions and add devices for specific users. It is a way to inhibit and protect the network from data theft that is now more serious than the hardware itself. Management can be done remotely and from any device. Forcepoint support is very good; we've already had an NGFW at a branch and we like the customer service.
Gabriel Silva | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
The Forcepoint Data Loss Prevention solution has been used throughout our organization's region. There are two main problems to be solved with Forcepoint Data Loss Prevention: the first is protecting critical data on employee devices, such as smartphones, pen drives, and notebooks, regardless of their location, and the second is strengthening web security with resources for endpoint protection, with web content filtering, email security, and proxy. The experience has been positive and my team and I are enjoying it; security has been improved and problems have decreased.
  • Web content filter and proxy
  • Can be expanded on demand
  • Prevents theft of corporate information
  • Fingerprint feature
  • Cryptography
  • High-level and quality Forcepoint support
  • More customization is lacking in the web content filter feature
  • Reports of some false positives
  • GUI is not so fluid
It requires a certain knowledge in information security but the solution is very good and we recommend it for any scenario. It's a way to enhance security, prevent theft of sensitive device information, and maintain an extra layer of security with URL filtering. Overall, it's easy to use and set up. Forcepoint support is a good thing and I liked it when I asked for technical support to do a configuration. The solution can be a good alternative to protect USB pen drives and prevent information theft in case of unpredictable theft.
Tribett Requena | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use Forcepoint Endpoint Data Loss Prevention to avoid data leakage and protection. We carry out data monitoring and offer this solution to customers who require it.
  • Drip data loss prevention monitoring
  • Digital data printing/OCR
  • Unified data protection coverage
  • Risk-based policy enforcement and native behavioral analysis
  • Initial setup is not that simple
  • It does not have an integration API
  • Machine learning technologies and OSR technologies would be better
Forcepoint Endpoint Data Loss Prevention is perfect for information security and compliance management and the IT department, cyber security consulting services, legal business, and large companies that need to manage and control information leakage and ensure compliance with company policies.
Bhuwan Chandra | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We are a solutions provider to our clients who are facing compliance and security issues. There are multiple modules in Forcepoint and we recommend clients start their data loss prevention journey with Forcepoint Endpoint Data Loss Prevention and later on to move to Forcepoint Network Data Loss Prevention. Forcepoint Endpoint Data Loss Prevention takes time to be established in the client environment and multiple policy fine-tunings are required to remove the false positives. We also recommended starting the data loss prevention journey with a small fraction of users--say 50 and 100 users at the initial level.
  • The Forcepoint Endpoint Data Loss Prevention Endpoint module is applied to secure data being used at endpoints, like from Microsoft Excel and other Microsoft capabilities, also other functions like email and FTP, Active Sync, etc. It secures the data in use at the endpoint.
  • The Forcepoint Endpoint Data Loss Prevention Network Module is applied for the traffic being used in network capabilities like email, FTP, and web. It also secures the data on the move in the network.
  • Forcepoint Data Discover--the capability to discover the data which is sensitive for the organization and lies across the network; with the discovery tool, we can define the data, which is important based on regulatory and compliance risk.
  • OCR (optical character recognition) capabilities also come with the Data Discover Module, by which we can see the embedded text inside the image and that helps to prevent sensitive data theft.
  • Forcepoint technical support--specially for users who go with essential support--is challenging to get support on time. You need the ticket to be raised long beforehand to get support from TAC. However, in the case of enterprise support, its is not like this technical person will come on a priority basis.
  • However it comes with higher prices, especially for SMB, it is allowed to pay that amount for support only.
Forcepoint Endpoint Data Loss Prevention suited the environment where data movement is heavily regulated and complies with compliance like PCI-DSS, HIPAA, SOC Type-2, etc. Also, if the organization wants to see a holistic view of the security posture of the organization and imports logs from endpoints and network for data movement. The best part of Forcepoint Endpoint Data Loss Prevention is the reporting part, while another OEMs in the market share logs details only, Forcepoint Endpoint Data Loss Prevention has a reporting part where you can generate reports with compliance format. Forcepoint Endpoint Data Loss Prevention also integrates with different SIEM solutions available in the market.
February 28, 2020

Forcepoint DLP is great

Score 10 out of 10
Vetted Review
Verified User
Incentivized
It is used across our whole organization. It is helping us prevent unauthorized disclosure of member data.
  • Prevents data from leaving that we want to protect
  • Ensures data leaving is encrypted if that is what we want
  • Takes some time to get it tuned
  • Requires tuning from time to time
It is easy to use and manage. Reviewing all the hits for items you are looking for requires the staff. Custom rules are easy to create.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We are currently using it on the Security team to track data exfiltration. We also allow Data Custodians from different departments to review incidents to point out anything suspicious.
  • Tracks Removeable media based events well
  • Provides in depth forensic analysis
  • Whitelisting is limited. It should be adjusted so multi-tiered rules can be used accurately
  • Fingerprinting can be too sensitive and when similar (not exactly the same) files are found, it can impede production
In scenarios where you are just trying to block specific types of data based on a rule, it can be used very effectively.

If you are trying to use fingerprinting to classify data, Forcepoint is not well suited for this. You would need a separate technology in order to classify data appropriately.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Forcepoint DLP is used bankwide. It addresses problems with data loss to network storage sites.
  • Ability to identify PII
  • Ability to alert on PII violations
  • Ability to block uploads to all Personal Network Storage and Backup sites
We use an on-prem Forcepoint web protection solution. So far, the limitations found in the DLP are specifically related to the ability for the product to completely block uploads to online storage sites like drive.google.com. There are some sites that Forcepoint can handle well. But not all.
Score 2 out of 10
Vetted Review
Verified User
Incentivized
The IT department implements and manages the product, and it is deployed across the environment.
  • Notify of problems
  • Stability
  • Customer Service
Due to the lack of responsiveness on support issues I cannot say it is well suited anywhere.
December 31, 2019

Forcepoint in action

John Keenan | TrustRadius Reviewer
Score 5 out of 10
Vetted Review
Verified User
Incentivized
Forcepoint is used as a web proxy across the vast majority of the organization. The DLP product is used to monitor how and when people attempt to print, store or share data with potentially unauthorized parties. The DLP product is then used to warn people about the potential impacts that such behavior has.
  • Captures email attachments in their entirety.
  • Recognizes printing.
  • Limits on sizes of files.
  • The reports require lots of clicking to get to.
As a bundled package, we've kept Forcepoint DLP around because we need the capability. Our current on-prem deployment requires a bit of management and one of the things that always seems to be problematic is inserting a proxy. Some traffic doesn't like WCCP, other traffic doesn't like proxies. It quickly becomes a technical finger pointing session in almost any troubleshooting effort. And Forcepoint tech support isn't terribly interested in solving my problems so if their software is operating as they intend it to, then they don't really care if it's impeding our business.
December 23, 2019

Good tool to use!

Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use Data Loss Prevention across org and, it addresses problems like Data Loss of PII. We have deployed the agents as well on endpoints.
  • Prevents Data Loss
  • Allows us to see what files are being touched
  • Masking
  • Changing regex
Great tool that has come in handy. We send many emails and deal with PII, so it's great to have a tool that looks out for our data. Sometimes the GUI can run slow but for the most part, we have not had any issues and things run smoothly.
Score 6 out of 10
Vetted Review
Verified User
Incentivized
Forcepoint Data Loss Prevention is used across the organization. As a financial institution it is imperative that we take steps to insure customer data and ensure that when sensitive data leaves the organization it is done in a secure manner for sound business purposes. Forcepoint DLP is one of the tools we use to flag attachments and messages that may contain customer PII or proprietary information. Mistakes happen, so educating users is not an adequate preventive control.
  • Provisioning canned policies such as PII, PCI and PHI data detection.
  • Ability to detect sensitive data in compressed (zipped) attachments.
  • Inability to OCR and detect PII delivered as a screenshot or image file.
  • Lacking ability to alert when compressed file is password protected.
Google Drive allows a user to browse locally using an applet that resembles Windows Explorer. In this scenario, Forcepoint Data Loss Prevention is unable to enforce restrictions. Therefore, the only preventive control is to block Google Drive entirely, which reduces access to cloud storage solutions.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use Forcepoint DLP across the whole organization in the US and China. We are in the health insurance industry and need to be compliant with PCI, HITRUST, HIPAA, etc. Forcepoint DLP enables us to protect sensitive information.
  • Blocks sensitive data from uploading to Internet via Forcepoint proxy.
  • Blocks sensitive data transmitted between application and even clipboard by Forcepoint DLP endpoint.
  • Does not support latest medicare id format - MBI.
  • Different to make whitelist and exception
It is good if you are also using Forcepoint web content gateway or Endpoint. You need to create regex pattern for MBI if you want to catch this latest medicare ID format.
Ted Jan | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Forcepoint DLP is used enterprise-wide at my company. We have the agent installed on every desktop/laptop that we own. Its primary usage is to stop data loss via USB storage devices. Being a financial company, we are very concerned about data loss from internal employees. Forcepoint has been able to help us track the movement of data to USB drives and block them.
  • Audit Data Transfers to USB
  • Block Data Transfers to USB
  • Policies can be difficult to create
  • Overwhelming amount of data is collected
Forcepoint DLP is ideal for companies that have dedicated IT staff to monitor it. There is a lot of data that is collected and it requires constant monitoring in order to determine whether or not people are moving data in or out of your environment. Creating policies, even test policies can be tricky in Forcepoint. A few times, we've created policies that we thought would only affect a small subset of users and instead they impacted the whole enterprise, so it's really important that a group/team of people really understand how to use this tool. If your company is concerned about data loss via USB, this is a good tool to use.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
My organization uses Forcepoint Data Loss Prevention across the organization to address PHI stored in the organization. The use of Forcepoint DLP has helped us discover the actual location where PHI resides and how the user shares the PHI. We are able to set a threshold on the amount of PHI to share externally and it will trigger the alarm to the administrator for further review.
  • Track location of PHI.
  • Track confidential information.
  • The implementation is tougher than we initially thought.
  • It would be great to just add the solution that requires seamless implementation.
Forcepoint Data Loss Prevention does what we intended it to do. It tracks all PHI stored in the company and track the movement of PHI. It also has the capability to block the user from sharing PHI depending on how you have it on the setting. Overall, it is a return of investment for my company because it will prevent malicious insider from sharing valuable data to external parties.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Forcepoint DLP is being used across the organization to identify and locate ePHI on disk and in transit via email.
  • Database Fingerprinting to match my data exactly.
  • Integration with Forcepoint Email and Endpoint Agents.
  • Some inconsistency between module interfaces. Loading approve and block lists.
  • Complicated setup.
I like the database fingerprinting for DLP. I can point it to a DB Table of my sensitive customer info and use that to look for data loss. The reporting feature has also been useful as we can setup different levels of alert for different users and different amounts of sensitive data. The alerts can be sent to the offending user, their manager, and the security officer or any combination.
December 10, 2019

Forcepoint DLP Review

Score 9 out of 10
Vetted Review
Verified User
Incentivized
It's being used across the whole organization. The main purpose is PII data loss prevention.
  • Easy to use
  • Easy to manage
  • Technical documentation is too complicated
  • Too many products with different names. So, it can get confusing which product does what.
Well suited for smaller organizations like ours.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We are currently using Forcepoint as our URL filtering solution. This takes a lot of the research out of whether a site should be accessed or not especially with the real-time filter enabled. Most our access out to the internet is blocked before we are even aware that there is an issue with the site. and can just be rendered a non-issue.

  • Easy access to which categories would be blocked or allowed.
  • Real-time blocking of hazardous sites.
  • Expandable.
  • Remote filtering is not as advanced as we would like.
  • Support time is not as quick as needed in most cases.
  • Upgrades of appliances and software is not as easy as other solutions.
  • HTTPS inspection needs to hand a valid cert and doesnt work correctly with all vendors.
Overall usage and configuration of Forcepoint is pretty straight forward. There a few things harder then others to get working correctly, but once configured correctly things work great.
David Stanfield | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Although I am not part of the original team that implemented the Websense/Forcepoint system I have made large scale changes to improve upon its efficiency and resolve performance issues due to incorrectly deployed parts of the system. My overall experience has been good. Forcepoint has come a long way with their product and the features being made available over the next couple of versions are exciting and needed. The Forcepoint team has been very good to work with and they have shown remarkable improvement in customer service and technical support.
Forcepoint is being used as our Web Security and DLP solution and that is across the whole organization.
  • It is a very complete solution that addresses a wide range of different security issues and it does it well.
  • Forcepoint's Technical Support is on the ball. They have improved greatly over the last 3 years.
  • The level of professionalism from Forcepoint really completes the picture.
  • I do have some issues with Forcepoint but they do listen to their customers. Many of our issues have been addressed.
For a complete Web Security solution this is a good choice. For a simple solution look elsewhere.
February 14, 2017

Websense makes sense!

Score 7 out of 10
Vetted Review
Verified User
Incentivized
Websense is used in implementing endpoint DLP, as a content gateway, a web filter, a URL filter and also e-mail security. It provides real-time scanning of websites and caching both of which are really important features to us at our organization. Overall [it's] easy to navigate (user-friendly) and has a UI with a few issues here and there, but still we are happy with the product.
  • Real-time scanning
  • Caching capabilities
  • Easy to implement changes with good and clean UI
  • Sometimes needs rebooting of appliances as throughput reduces
  • Support improvement needed
  • Navigating to appliances could be better
Websense requires some work but is good with the DLP appliances. The content gateway needs some improvement and the endpoint agent has affected performance in some cases. All in all, it does the job but not without a good investment of work and time!
Alan Matson, CCNA:S, MCP | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We currently use Websense to protect our web and data security channels. We have a number of Websense proxies deployed world wide protecting users in both large and small offices. Using Websense allowed us to add security to our internet bound traffic while securing our IP and keeping our bandwidth costs down from users browsing non-work related sites.
  • Content Filtering
  • Real Time security
  • Caching
  • DLP
  • A more centralized UI, different components have different UIs to log into
  • Better integration with third party products, they used to support SQUID but they no longer do
I have tried many proxy solutions from BlueCoat, to TMG/ISA, to Cisco WSA and nothing has compared to the ease of use of Websense and the flexibility. Sure there are always things missing but overall Websense has the best I have found.
Return to navigation