Skip to main content
TrustRadius
Forcepoint DLP

Forcepoint DLP

Overview

What is Forcepoint DLP?

Forcepoint DLP promises to address human-centric risk by providing visibility and control everywhere your people work and everywhere your data resides. Security teams apply user-risk scoring to focus on the events that matter most and to accelerate compliance with global data regulations.The…

Read more
Recent Reviews

TrustRadius Insights

Users of Forcepoint DLP have reported that the product effectively monitors critical streams to prevent data leakage and offers ease of …
Continue reading

Stop Data Leakage

7 out of 10
July 13, 2022
Forcepoint Data Loss Prevention is [being] used across [the] organization to safeguard the sending of sensitive data outside the …
Continue reading

Good tool to use!

9 out of 10
December 23, 2019
Incentivized
We use Data Loss Prevention across org and, it addresses problems like Data Loss of PII. We have deployed the agents as well on endpoints.
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Forcepoint DLP?

Forcepoint DLP promises to address human-centric risk by providing visibility and control everywhere your people work and everywhere your data resides. Security teams apply user-risk scoring to focus on the events that matter most and to accelerate compliance with global data…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

83 people also want pricing

Alternatives Pricing

What is Rewind Backups?

Rewind from Third Blink Software in Ontario (dba Rewind) is a service that protects the data that is driving your ecommerce and small to midsize businesses, focusing on backing up data that lives in the cloud – specifically in apps like Shopify, BigCommerce, and QuickBooks Online.

What is MX Layer?

MX Layer is an enterprise security company based in the United States, focusing on providing cloud-based solutions for email security, business continuity, data loss prevention and email archiving services. MX Layer aims to ensure that their comprehensive email security platform protects company's…

Return to navigation

Product Demos

Forcepoint DLP & AWS Security Hub | Forcepoint Integrations Podcast

YouTube
Return to navigation

Product Details

What is Forcepoint DLP?

Forcepoint DLP promises to address human-centric risk by providing visibility and control everywhere your people work and everywhere your data resides. Security teams apply user-risk scoring to focus on the events that matter most and to accelerate compliance with global data regulations.

The vendor promises these benefits:
  • Accelerate compliance
  • Empower people to protect data
  • Advanced detection and controls that follow the data

RESPOND AND REMEDIATE RISK
Traditional approaches to DLP overload users with false positives while missing data at risk. Forcepoint DLP applies advanced analytics to correlate seemingly unrelated DLP events into prioritized incidents. Incident Risk Ranking (IRR) provided with Forcepoint DLP fuses disparate DLP indicators into a framework of Bayesian belief networks to assess the likelihood of data risk scenarios, such as data theft and broken business processes.

VISIBILITY EVERYWHERE YOUR PEOPLE WORK, CONTROL EVERYWHERE YOUR DATA RESIDES
Today’s enterprises are challenged with complicated environments, where data is everywhere and requires the protection of data in places that aren’t managed or owned by the enterprise. Forcepoint DLP for Cloud Applications extends analytics and DLP policies to critical cloud applications so your data is protected, wherever it resides.

Forcepoint DLP Features

  • Supported: Endpoint
  • Supported: Cloud applications
  • Supported: Discovery
  • Supported: Network

Forcepoint DLP Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationNo

Frequently Asked Questions

Symantec Data Loss Prevention and VikingCloud are common alternatives for Forcepoint DLP.

Reviewers rate Support Rating highest, with a score of 5.3.

The most common users of Forcepoint DLP are from Mid-sized Companies (51-1,000 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(68)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Users of Forcepoint DLP have reported that the product effectively monitors critical streams to prevent data leakage and offers ease of management. They have found the API feature in Forcepoint DLP particularly helpful as it allows for automation, addressing the problem of slowness and delays in incident creation. The manager approval process with Network Email has been praised for its ability to effectively notify managers of any user activity.

Forcepoint DLP provides comprehensive coverage, unified data protection, reporting capabilities, and customization options. It also integrates seamlessly with other Forcepoint products, enhancing its usefulness for organizations. Users have highlighted the small footprint and quick data classification capabilities of Forcepoint endpoint DLP, which helps them efficiently protect their data. The availability of good pre-defined policies and a user-friendly interface contribute to the benefits organizations experience in terms of core data protection.

The integration of all data vectors on a single console is another valuable use case for Forcepoint DLP. Users have successfully utilized the product to protect their organization's confidential data, particularly in web and email data protection scenarios. With its ability to prevent data loss and breaches, provide better visibility and control over data, improve compliance, and automate IT security work, Forcepoint DLP has proven to be a valuable tool for businesses. Daily analysis of DLP reports helps track users' activities related to sensitive information and easily identify suspicious activity. Additionally, by implementing data protection policies across thousands of devices and enabling centralized monitoring and actions on incidents, organizations can effectively safeguard their sensitive information.

Websense, now part of Forcepoint, has been widely used to prevent users from uploading company documents to external websites or attaching them to personal emails. It has successfully addressed internal internet abuse issues by cutting down on desktop problems and preventing pop-ups. Globally utilized for web security purposes, Websense performs functions such as monitoring, filtering traffic, web caching, proxy server operation, content filtering, inspection of end-user web traffic, and blocking inappropriate site categories. It is also leveraged for internet traffic filtering, email spam filtering, and DLP across multiple offices and locations.

Websense Data Security Suite has been instrumental in protecting valuable intellectual property, proprietary information, and sensitive data like electronic healthcare records and credit card data. Users have reported successful detection of the transmission of company confidential documents and violations of corporate policies. By adding security to internet-bound traffic, securing IP, and controlling bandwidth costs, Websense offers important benefits and use cases. Furthermore, it is used extensively for implementing endpoint DLP, content gateway, web filtering, URL filtering, and email security. Users have found Websense to be easy to navigate, user-friendly, and have had positive experiences with the product.

Forcepoint has made improvements to their product and has shown remarkable improvement in customer service. It is being widely used as a Web Security and DLP solution across organizations. The primary use case for Forcepoint is PII data loss prevention, helping prevent unauthorized disclosure of member data and discovering the actual location where PHI resides and how it is shared. The threshold feature in Forcepoint DLP triggers an alarm to the administrator for further review when a set amount of PHI is shared externally.

Forcepoint DLP is extensively used to identify and locate ePHI on disk and in transit via email. It effectively stops data loss via USB storage devices, especially concerning internal employees. This makes it particularly valuable for the health insurance industry, enabling compliance with regulations such as PCI, HITRUST, HIPAA, etc. It addresses problems like Data Loss of PII and is deployed on endpoints to flag attachments and messages containing customer PII or proprietary information.

Forcepoint DLP serves as a web proxy that monitors and warns users about potentially unauthorized data printing, storing, or sharing. It helps track data exfiltration and allows Data Custodians from different departments to review incidents. Users have recommended Forcepoint DLP for clients starting their data loss prevention journey with endpoint protection before moving on to network data loss prevention. With its ability to prevent data leakage and protect critical data on employee devices regardless of location, Forcepoint DLP strengthens web security while providing visibility and control over abnormal activities.

This all contributes to the overall objective of using Forcepoint DLP enterprise-wide: preventing intentional or unintentional data leakage from the organization. It protects valuable data on Cloud, servers, and on-premises systems while providing confidence in controlling abnormal activities that could lead to data breaches. The capture of incidents with low false positives ensures efficient incident management and response.

Effective Endpoint Data Loss Prevention Module: Users have found the Forcepoint Endpoint DLP module highly effective in securing data at endpoints, such as Microsoft Excel and other Microsoft capabilities, email, FTP, and Active Sync. Reviewers have specifically praised its OCR capabilities for preventing sensitive data theft through embedded text recognition in images.

Flexible Filtering and Customization: The software provides a great range of flexibility and features that allow users to filter web content and block access to undesirable or infected sites. Reviewers appreciate the ability to customize filtering based on user/group/domain, IP address, or range, enhancing their control over web access.

Seamless Integration with Firewall: Users have praised the seamless functionality between Forcepoint Endpoint DLP and the firewall. This integration has been particularly appreciated for its ease of use and efficient security management.

Difficult and Tedious Deployment: Users have found deployment on multiple servers to be difficult and tedious, often requiring significant effort and time to set up the system as per their specific requirements.

Improvement Needed in Data Discovery and Machine Learning Techniques: Some users feel that the data discovery and machine learning techniques of the product need improvement. They believe that these features are not as effective or accurate as desired, leading to challenges in identifying and protecting sensitive data.

Lack of Integration with Network DLP and Other Tools: Users have expressed frustration over the lack of integration with Network DLP tools. This limitation makes it challenging for organizations to seamlessly incorporate the product into their existing security infrastructure, hindering efficient data protection measures.

Users who have reviewed Forcepoint DLP commonly recommend the following:

  1. Deploying correctly and following business processes: Users have found that Forcepoint DLP can be effective if it is deployed correctly and if business processes are followed and updated. They emphasize the importance of implementing the solution properly to maximize its effectiveness.

  2. Selecting Forcepoint DLP for comprehensive data loss prevention: Users recommend choosing Forcepoint DLP because it offers a complete package of data loss prevention capabilities. They appreciate that the product addresses various aspects of data security.

  3. Utilizing advanced features: Users suggest that Forcepoint DLP stands out as the best option for advanced features like OCR (Optical Character Recognition). They highlight the product's ability to provide advanced functionalities for enhanced data protection.

Attribute Ratings

Reviews

(1-8 of 8)
Companies can't remove reviews or game the system. Here's why
Piyush Mittal | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Ws are using this product to prevent data from leakage from internal environment to outside public environment. We have deployed this product on all internal systems via endpoints and also on our email server. This product captures DLP incidents with very less false positives and it is very good in functionality.We can easily deploy policies and it has a easy to use interface.
  • Incidents identification and escalation is easy
  • Policy deployment is easy
  • Blocking access to users
  • Deployment on multiple servers is difficult
  • Data discovery can be improved
  • Machine learning technique can be improved
It's very user friendly and easy to use. Rules can be managed on user-friendly interface web site console. For-example, violation can be release via management module. It provide prevention sensitive data against accidental data loss and compromised. Rule set sometimes work, sometimes does not work. There is no OCR feature. Forcepoint DLP tool does not have any AI feature that can learn user behavior or data and produces alarm.
July 13, 2022

Stop Data Leakage

Score 7 out of 10
Vetted Review
Verified User
Forcepoint Data Loss Prevention is [being] used across [the] organization to safeguard the sending of sensitive data outside the organization. We solve problems where users should not be able to send any company information for their personal use, such as sending files [that] are not sensitive but still the company's data. Also, we have to monitor what incidents are triggered by the endpoint for us to keep track, monitoring incidents through images using OCR, and using risk score to get the details of which user tried to violate the policy more often, even if it was blocked for him.
  • Performing finger printing
  • Performing discovery tasks
  • Detecting data from images using OCR
  • Pre-defined policies
  • Agent communication with data loss prevention servers
  • Getting unwanted incidents using pre-defined policies
If any organization doesn't want to share data outside the organization. It is always recommended to use user-defined policies to avoid any false incidents and using up drive space. Using the management console is easy to understand and you get everything in a systematic manner.
Gabriel Silva | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
The Forcepoint Data Loss Prevention solution has been used throughout our organization's region. There are two main problems to be solved with Forcepoint Data Loss Prevention: the first is protecting critical data on employee devices, such as smartphones, pen drives, and notebooks, regardless of their location, and the second is strengthening web security with resources for endpoint protection, with web content filtering, email security, and proxy. The experience has been positive and my team and I are enjoying it; security has been improved and problems have decreased.
  • Web content filter and proxy
  • Can be expanded on demand
  • Prevents theft of corporate information
  • Fingerprint feature
  • Cryptography
  • High-level and quality Forcepoint support
  • More customization is lacking in the web content filter feature
  • Reports of some false positives
  • GUI is not so fluid
It requires a certain knowledge in information security but the solution is very good and we recommend it for any scenario. It's a way to enhance security, prevent theft of sensitive device information, and maintain an extra layer of security with URL filtering. Overall, it's easy to use and set up. Forcepoint support is a good thing and I liked it when I asked for technical support to do a configuration. The solution can be a good alternative to protect USB pen drives and prevent information theft in case of unpredictable theft.
Bhuwan Chandra | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We are a solutions provider to our clients who are facing compliance and security issues. There are multiple modules in Forcepoint and we recommend clients start their data loss prevention journey with Forcepoint Endpoint Data Loss Prevention and later on to move to Forcepoint Network Data Loss Prevention. Forcepoint Endpoint Data Loss Prevention takes time to be established in the client environment and multiple policy fine-tunings are required to remove the false positives. We also recommended starting the data loss prevention journey with a small fraction of users--say 50 and 100 users at the initial level.
  • The Forcepoint Endpoint Data Loss Prevention Endpoint module is applied to secure data being used at endpoints, like from Microsoft Excel and other Microsoft capabilities, also other functions like email and FTP, Active Sync, etc. It secures the data in use at the endpoint.
  • The Forcepoint Endpoint Data Loss Prevention Network Module is applied for the traffic being used in network capabilities like email, FTP, and web. It also secures the data on the move in the network.
  • Forcepoint Data Discover--the capability to discover the data which is sensitive for the organization and lies across the network; with the discovery tool, we can define the data, which is important based on regulatory and compliance risk.
  • OCR (optical character recognition) capabilities also come with the Data Discover Module, by which we can see the embedded text inside the image and that helps to prevent sensitive data theft.
  • Forcepoint technical support--specially for users who go with essential support--is challenging to get support on time. You need the ticket to be raised long beforehand to get support from TAC. However, in the case of enterprise support, its is not like this technical person will come on a priority basis.
  • However it comes with higher prices, especially for SMB, it is allowed to pay that amount for support only.
Forcepoint Endpoint Data Loss Prevention suited the environment where data movement is heavily regulated and complies with compliance like PCI-DSS, HIPAA, SOC Type-2, etc. Also, if the organization wants to see a holistic view of the security posture of the organization and imports logs from endpoints and network for data movement. The best part of Forcepoint Endpoint Data Loss Prevention is the reporting part, while another OEMs in the market share logs details only, Forcepoint Endpoint Data Loss Prevention has a reporting part where you can generate reports with compliance format. Forcepoint Endpoint Data Loss Prevention also integrates with different SIEM solutions available in the market.
Score 2 out of 10
Vetted Review
Verified User
Incentivized
The IT department implements and manages the product, and it is deployed across the environment.
  • Notify of problems
  • Stability
  • Customer Service
Due to the lack of responsiveness on support issues I cannot say it is well suited anywhere.
Score 6 out of 10
Vetted Review
Verified User
Incentivized
Forcepoint Data Loss Prevention is used across the organization. As a financial institution it is imperative that we take steps to insure customer data and ensure that when sensitive data leaves the organization it is done in a secure manner for sound business purposes. Forcepoint DLP is one of the tools we use to flag attachments and messages that may contain customer PII or proprietary information. Mistakes happen, so educating users is not an adequate preventive control.
  • Provisioning canned policies such as PII, PCI and PHI data detection.
  • Ability to detect sensitive data in compressed (zipped) attachments.
  • Inability to OCR and detect PII delivered as a screenshot or image file.
  • Lacking ability to alert when compressed file is password protected.
Google Drive allows a user to browse locally using an applet that resembles Windows Explorer. In this scenario, Forcepoint Data Loss Prevention is unable to enforce restrictions. Therefore, the only preventive control is to block Google Drive entirely, which reduces access to cloud storage solutions.
February 01, 2016

Websense DSS

Score 7 out of 10
Vetted Review
Verified User
Incentivized
Websense Data Security Suite was used to monitor users to detect transmission of company confidential documents. The DSS solution was fairly successful in this effort and helped us to detect many violations of our corporate policies. The cautions for this product are scalability and reliability. The DSS product seems to have issues scaling above 8000 to 10000 nodes.
  • Keyword matching is very good.
  • Large list of applications that can be monitored.
  • Reporting is very user friendly.
  • We had issues scaling the management environment to over 10,000 nodes.
  • We had many false positives with the fingerprinting technology.
  • The agent can be a large drag on endpoints.
The product seems to be more suited to mid size and small businesses than to large enterprises.
June 13, 2014

Honest Review

Score 7 out of 10
Vetted Review
Verified User
Incentivized
We use Websense for Internet traffic filtering, email spam filtering, and DLP. It is used in all offices of our company; from the headquarters in Chicago to a remote office in Hong Kong. It blocks spam and compromised and unproductive websites for our users. If we don't want sensitive data to leave the company, we can also fingerprint data to be used by the DLP endpoint.
  • Websense is an all-inclusive product that handles email, web, and DLP in one interface.
  • Websense has a lot of different options to implement their solutions from software to onsite appliance to the cloud.
  • I think the support is lacking at times or takes a long time to get a return call from a tech; I've been on hold for 5hrs at one time.
  • It would be nice if they explained in more detail the different filtering options they provide either online or by a sales person. Our rep wasn't very knowledgeable and steered us to a 3rd party vendor to help explain the software.
  • It would be nice if there was an all in one appliance that handled email and web.
  • I was hoping there was an endpoint client that doesn't filter web traffic when it's on a public network.
Is there a failover solution in case the software\appliance fails? What private data gets sent to the cloud for the remote solution filtering? What data gets filtered? We're having issues with https filtering if we don't buy the appliance. What protocols can the software\appliance block? Does it have layer 7 blocking?
Return to navigation