Skip to main content
TrustRadius
Forcepoint DLP

Forcepoint DLP

Overview

What is Forcepoint DLP?

Forcepoint DLP promises to address human-centric risk by providing visibility and control everywhere your people work and everywhere your data resides. Security teams apply user-risk scoring to focus on the events that matter most and to accelerate compliance with global data regulations.The…

Read more
Recent Reviews

TrustRadius Insights

Users of Forcepoint DLP have reported that the product effectively monitors critical streams to prevent data leakage and offers ease of …
Continue reading

Stop Data Leakage

7 out of 10
July 13, 2022
Forcepoint Data Loss Prevention is [being] used across [the] organization to safeguard the sending of sensitive data outside the …
Continue reading

Good tool to use!

9 out of 10
December 23, 2019
Incentivized
We use Data Loss Prevention across org and, it addresses problems like Data Loss of PII. We have deployed the agents as well on endpoints.
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Forcepoint DLP?

Forcepoint DLP promises to address human-centric risk by providing visibility and control everywhere your people work and everywhere your data resides. Security teams apply user-risk scoring to focus on the events that matter most and to accelerate compliance with global data…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

83 people also want pricing

Alternatives Pricing

What is Rewind Backups?

Rewind from Third Blink Software in Ontario (dba Rewind) is a service that protects the data that is driving your ecommerce and small to midsize businesses, focusing on backing up data that lives in the cloud – specifically in apps like Shopify, BigCommerce, and QuickBooks Online.

What is MX Layer?

MX Layer is an enterprise security company based in the United States, focusing on providing cloud-based solutions for email security, business continuity, data loss prevention and email archiving services. MX Layer aims to ensure that their comprehensive email security platform protects company's…

Return to navigation

Product Demos

Forcepoint DLP & AWS Security Hub | Forcepoint Integrations Podcast

YouTube
Return to navigation

Product Details

What is Forcepoint DLP?

Forcepoint DLP promises to address human-centric risk by providing visibility and control everywhere your people work and everywhere your data resides. Security teams apply user-risk scoring to focus on the events that matter most and to accelerate compliance with global data regulations.

The vendor promises these benefits:
  • Accelerate compliance
  • Empower people to protect data
  • Advanced detection and controls that follow the data

RESPOND AND REMEDIATE RISK
Traditional approaches to DLP overload users with false positives while missing data at risk. Forcepoint DLP applies advanced analytics to correlate seemingly unrelated DLP events into prioritized incidents. Incident Risk Ranking (IRR) provided with Forcepoint DLP fuses disparate DLP indicators into a framework of Bayesian belief networks to assess the likelihood of data risk scenarios, such as data theft and broken business processes.

VISIBILITY EVERYWHERE YOUR PEOPLE WORK, CONTROL EVERYWHERE YOUR DATA RESIDES
Today’s enterprises are challenged with complicated environments, where data is everywhere and requires the protection of data in places that aren’t managed or owned by the enterprise. Forcepoint DLP for Cloud Applications extends analytics and DLP policies to critical cloud applications so your data is protected, wherever it resides.

Forcepoint DLP Features

  • Supported: Endpoint
  • Supported: Cloud applications
  • Supported: Discovery
  • Supported: Network

Forcepoint DLP Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationNo

Frequently Asked Questions

Symantec Data Loss Prevention and VikingCloud are common alternatives for Forcepoint DLP.

Reviewers rate Support Rating highest, with a score of 5.3.

The most common users of Forcepoint DLP are from Mid-sized Companies (51-1,000 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(68)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Users of Forcepoint DLP have reported that the product effectively monitors critical streams to prevent data leakage and offers ease of management. They have found the API feature in Forcepoint DLP particularly helpful as it allows for automation, addressing the problem of slowness and delays in incident creation. The manager approval process with Network Email has been praised for its ability to effectively notify managers of any user activity.

Forcepoint DLP provides comprehensive coverage, unified data protection, reporting capabilities, and customization options. It also integrates seamlessly with other Forcepoint products, enhancing its usefulness for organizations. Users have highlighted the small footprint and quick data classification capabilities of Forcepoint endpoint DLP, which helps them efficiently protect their data. The availability of good pre-defined policies and a user-friendly interface contribute to the benefits organizations experience in terms of core data protection.

The integration of all data vectors on a single console is another valuable use case for Forcepoint DLP. Users have successfully utilized the product to protect their organization's confidential data, particularly in web and email data protection scenarios. With its ability to prevent data loss and breaches, provide better visibility and control over data, improve compliance, and automate IT security work, Forcepoint DLP has proven to be a valuable tool for businesses. Daily analysis of DLP reports helps track users' activities related to sensitive information and easily identify suspicious activity. Additionally, by implementing data protection policies across thousands of devices and enabling centralized monitoring and actions on incidents, organizations can effectively safeguard their sensitive information.

Websense, now part of Forcepoint, has been widely used to prevent users from uploading company documents to external websites or attaching them to personal emails. It has successfully addressed internal internet abuse issues by cutting down on desktop problems and preventing pop-ups. Globally utilized for web security purposes, Websense performs functions such as monitoring, filtering traffic, web caching, proxy server operation, content filtering, inspection of end-user web traffic, and blocking inappropriate site categories. It is also leveraged for internet traffic filtering, email spam filtering, and DLP across multiple offices and locations.

Websense Data Security Suite has been instrumental in protecting valuable intellectual property, proprietary information, and sensitive data like electronic healthcare records and credit card data. Users have reported successful detection of the transmission of company confidential documents and violations of corporate policies. By adding security to internet-bound traffic, securing IP, and controlling bandwidth costs, Websense offers important benefits and use cases. Furthermore, it is used extensively for implementing endpoint DLP, content gateway, web filtering, URL filtering, and email security. Users have found Websense to be easy to navigate, user-friendly, and have had positive experiences with the product.

Forcepoint has made improvements to their product and has shown remarkable improvement in customer service. It is being widely used as a Web Security and DLP solution across organizations. The primary use case for Forcepoint is PII data loss prevention, helping prevent unauthorized disclosure of member data and discovering the actual location where PHI resides and how it is shared. The threshold feature in Forcepoint DLP triggers an alarm to the administrator for further review when a set amount of PHI is shared externally.

Forcepoint DLP is extensively used to identify and locate ePHI on disk and in transit via email. It effectively stops data loss via USB storage devices, especially concerning internal employees. This makes it particularly valuable for the health insurance industry, enabling compliance with regulations such as PCI, HITRUST, HIPAA, etc. It addresses problems like Data Loss of PII and is deployed on endpoints to flag attachments and messages containing customer PII or proprietary information.

Forcepoint DLP serves as a web proxy that monitors and warns users about potentially unauthorized data printing, storing, or sharing. It helps track data exfiltration and allows Data Custodians from different departments to review incidents. Users have recommended Forcepoint DLP for clients starting their data loss prevention journey with endpoint protection before moving on to network data loss prevention. With its ability to prevent data leakage and protect critical data on employee devices regardless of location, Forcepoint DLP strengthens web security while providing visibility and control over abnormal activities.

This all contributes to the overall objective of using Forcepoint DLP enterprise-wide: preventing intentional or unintentional data leakage from the organization. It protects valuable data on Cloud, servers, and on-premises systems while providing confidence in controlling abnormal activities that could lead to data breaches. The capture of incidents with low false positives ensures efficient incident management and response.

Effective Endpoint Data Loss Prevention Module: Users have found the Forcepoint Endpoint DLP module highly effective in securing data at endpoints, such as Microsoft Excel and other Microsoft capabilities, email, FTP, and Active Sync. Reviewers have specifically praised its OCR capabilities for preventing sensitive data theft through embedded text recognition in images.

Flexible Filtering and Customization: The software provides a great range of flexibility and features that allow users to filter web content and block access to undesirable or infected sites. Reviewers appreciate the ability to customize filtering based on user/group/domain, IP address, or range, enhancing their control over web access.

Seamless Integration with Firewall: Users have praised the seamless functionality between Forcepoint Endpoint DLP and the firewall. This integration has been particularly appreciated for its ease of use and efficient security management.

Difficult and Tedious Deployment: Users have found deployment on multiple servers to be difficult and tedious, often requiring significant effort and time to set up the system as per their specific requirements.

Improvement Needed in Data Discovery and Machine Learning Techniques: Some users feel that the data discovery and machine learning techniques of the product need improvement. They believe that these features are not as effective or accurate as desired, leading to challenges in identifying and protecting sensitive data.

Lack of Integration with Network DLP and Other Tools: Users have expressed frustration over the lack of integration with Network DLP tools. This limitation makes it challenging for organizations to seamlessly incorporate the product into their existing security infrastructure, hindering efficient data protection measures.

Users who have reviewed Forcepoint DLP commonly recommend the following:

  1. Deploying correctly and following business processes: Users have found that Forcepoint DLP can be effective if it is deployed correctly and if business processes are followed and updated. They emphasize the importance of implementing the solution properly to maximize its effectiveness.

  2. Selecting Forcepoint DLP for comprehensive data loss prevention: Users recommend choosing Forcepoint DLP because it offers a complete package of data loss prevention capabilities. They appreciate that the product addresses various aspects of data security.

  3. Utilizing advanced features: Users suggest that Forcepoint DLP stands out as the best option for advanced features like OCR (Optical Character Recognition). They highlight the product's ability to provide advanced functionalities for enhanced data protection.

Attribute Ratings

Reviews

(1-13 of 13)
Companies can't remove reviews or game the system. Here's why
Piyush Mittal | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Ws are using this product to prevent data from leakage from internal environment to outside public environment. We have deployed this product on all internal systems via endpoints and also on our email server. This product captures DLP incidents with very less false positives and it is very good in functionality.We can easily deploy policies and it has a easy to use interface.
  • Incidents identification and escalation is easy
  • Policy deployment is easy
  • Blocking access to users
  • Deployment on multiple servers is difficult
  • Data discovery can be improved
  • Machine learning technique can be improved
It's very user friendly and easy to use. Rules can be managed on user-friendly interface web site console. For-example, violation can be release via management module. It provide prevention sensitive data against accidental data loss and compromised. Rule set sometimes work, sometimes does not work. There is no OCR feature. Forcepoint DLP tool does not have any AI feature that can learn user behavior or data and produces alarm.
July 13, 2022

Stop Data Leakage

Score 7 out of 10
Vetted Review
Verified User
Forcepoint Data Loss Prevention is [being] used across [the] organization to safeguard the sending of sensitive data outside the organization. We solve problems where users should not be able to send any company information for their personal use, such as sending files [that] are not sensitive but still the company's data. Also, we have to monitor what incidents are triggered by the endpoint for us to keep track, monitoring incidents through images using OCR, and using risk score to get the details of which user tried to violate the policy more often, even if it was blocked for him.
  • Performing finger printing
  • Performing discovery tasks
  • Detecting data from images using OCR
  • Pre-defined policies
  • Agent communication with data loss prevention servers
  • Getting unwanted incidents using pre-defined policies
If any organization doesn't want to share data outside the organization. It is always recommended to use user-defined policies to avoid any false incidents and using up drive space. Using the management console is easy to understand and you get everything in a systematic manner.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We are using Forcepoint DLP for preventing users from intentionally or unintentionally leaking data from the organization whether they are in office premises or working from home or working from branch offices or working from elsewhere. We restrict users to upload business-critical data to a website, USB device or even through any application.
  • Data leak prevention, as it is meant to do
  • Application control, monitoring and blocking on users system
  • Device control
  • Website blocking
  • Integration with Network DLP and other tools
  • Deployment is tedious as there are multiple servers for multiple services
  • Connectivity is not secure
Forcepoint Data Loss Prevention is very well suited for organizations where [the] user count is more than 200 users. These users can be work from home users or users visiting the office premises or even branch office users. As Forcepoint is only supported on Windows and MAC operating systems, it is less likely to be suitable for such environments.
Olivia Jayy | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Our entire organization depends on Forcepoint Data Loss Prevention to protect our valuable data on Cloud, server and on-premises. Powerful tool that helps to protect data at rest, data in-motion and data in use giving us the visibility and control to every abnormal activity by the user within our networked environment.
  • Cloud secure data protection.
  • Unified policy enforcement.
  • Risk-adaptive protection based on user behavior.
  • The way to discover data at risk can be improved.
  • Additional cost to professional support.
  • Improvement to reporting days per week.
Effective tool that safeguards our data with a single policy and simplifies compliance with predefined policies, and the automatic access control and usage is very convenient to our web and networked environments. Forcepoint Data Loss Prevention protects our critical intellectual property with unsurpassed accuracy and provides a secure mobile application access to data on and off network.
Brandon Smith | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Forcepoint Data Loss Prevention is a data loss prevention software and due to the nature of this category, this tool is used as a web proxy all across our organization. It is used enterprise-wide in my organization. This tool has been installed on all of the PCs, laptops, and servers that we own. This software has ensured us how and when people are attempting to print, store, and even share data with potentially unauthorized teams.
  • It has predominantly protected us from unauthorized parties and has provided us with better visibility and control over our data.
  • This software has also successfully prevented us from both malicious and accidental tasks, which are quite flexible actions when it comes to the violation of data loss prevention policies.
  • This product has been successful in improving compliance and even mitigating compliance violations, which further facilitated IT security.
  • I think there is room for improvement, as the user interface is slightly rough and difficult to adopt in the beginning. The software also hangs up at a few instances, which leads to some wasting of time and annoyance, but other than that, this software is good. The technical staff should work on the complexities for a better user experience.
  • This tool would have been more effective if whitelisting was not restricted, as it should be able to adjust just so it can be read accurately.
  • Fingerprinting is a little too sensitive, which should also be further strengthened when files are found.
I find this tool to be a great product, as it comes in really very handy. This product is great when it comes to scenarios where you are just trying to block some specific types of information and data out of your company.
Bhuwan Chandra | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We are a solutions provider to our clients who are facing compliance and security issues. There are multiple modules in Forcepoint and we recommend clients start their data loss prevention journey with Forcepoint Endpoint Data Loss Prevention and later on to move to Forcepoint Network Data Loss Prevention. Forcepoint Endpoint Data Loss Prevention takes time to be established in the client environment and multiple policy fine-tunings are required to remove the false positives. We also recommended starting the data loss prevention journey with a small fraction of users--say 50 and 100 users at the initial level.
  • The Forcepoint Endpoint Data Loss Prevention Endpoint module is applied to secure data being used at endpoints, like from Microsoft Excel and other Microsoft capabilities, also other functions like email and FTP, Active Sync, etc. It secures the data in use at the endpoint.
  • The Forcepoint Endpoint Data Loss Prevention Network Module is applied for the traffic being used in network capabilities like email, FTP, and web. It also secures the data on the move in the network.
  • Forcepoint Data Discover--the capability to discover the data which is sensitive for the organization and lies across the network; with the discovery tool, we can define the data, which is important based on regulatory and compliance risk.
  • OCR (optical character recognition) capabilities also come with the Data Discover Module, by which we can see the embedded text inside the image and that helps to prevent sensitive data theft.
  • Forcepoint technical support--specially for users who go with essential support--is challenging to get support on time. You need the ticket to be raised long beforehand to get support from TAC. However, in the case of enterprise support, its is not like this technical person will come on a priority basis.
  • However it comes with higher prices, especially for SMB, it is allowed to pay that amount for support only.
Forcepoint Endpoint Data Loss Prevention suited the environment where data movement is heavily regulated and complies with compliance like PCI-DSS, HIPAA, SOC Type-2, etc. Also, if the organization wants to see a holistic view of the security posture of the organization and imports logs from endpoints and network for data movement. The best part of Forcepoint Endpoint Data Loss Prevention is the reporting part, while another OEMs in the market share logs details only, Forcepoint Endpoint Data Loss Prevention has a reporting part where you can generate reports with compliance format. Forcepoint Endpoint Data Loss Prevention also integrates with different SIEM solutions available in the market.
February 14, 2017

Websense makes sense!

Score 7 out of 10
Vetted Review
Verified User
Incentivized
Websense is used in implementing endpoint DLP, as a content gateway, a web filter, a URL filter and also e-mail security. It provides real-time scanning of websites and caching both of which are really important features to us at our organization. Overall [it's] easy to navigate (user-friendly) and has a UI with a few issues here and there, but still we are happy with the product.
  • Real-time scanning
  • Caching capabilities
  • Easy to implement changes with good and clean UI
  • Sometimes needs rebooting of appliances as throughput reduces
  • Support improvement needed
  • Navigating to appliances could be better
Websense requires some work but is good with the DLP appliances. The content gateway needs some improvement and the endpoint agent has affected performance in some cases. All in all, it does the job but not without a good investment of work and time!
Score 2 out of 10
Vetted Review
Verified User
Incentivized
Websense is deployed corporately to provide content filtering and inspection of end user web traffic. The business had asked IT for more visibility into what users are doing on the internet and to block categories of site deemed inappropriate.
  • Easy to generate reports on user activity.
  • Can run on appliances or server hardware.
  • Up to date web site categorization.
  • Support is a joke at the moment. Support staff have told us they are unsure whether they will lose their jobs so they are not performing 100%.
  • Has been difficult to get WCCP integration working with Nexus switches (approximately 9 months in and still have issues).
  • SQL configuration is difficult and often has issues.
Traditional filtering seems to work okay. The web content gateway is not very easy to use and work with.
Bill Rieger | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We are using Websense mostly for it's Malware and Spyware filtering. We do little URL filtering but the filters that have put in place have been very effective. We use Websense through out the entire enterprise of our company this includes UK and Asia. It has cut down on the time spent by PC technicians have to remove Spyware, malware and adware on our users PC. This has also cut down on time spent on reloading pc that were infected as well.
  • It does a great job at stopping users from going to "infected" sites and sites that are undesirable.
  • It has a great range of flexibility and features. We have used it to lock down a server "production" computer that need only a limited amount of access to internet sites. It allows us to also filter by user/group/domain and even IP address or range.
  • Implementation was a little rough but once the product is up and running it is very stable.
  • Websense could do some improvement in the Support group. Long wait times and long times for follow-up.
  • Working with the support center and the sales engineers has been a little rough. We ran into problems where the support group did not understand how the sales engineer set up our design.
  • It would be also helpful if that you could sort in the knowledge base on just your current version you are running.
During the setup and design make sure that they have other companies using the same model and design that you are using. We ran into a big disconnect on this issue due to our configuration and working with Websense Support.
June 13, 2014

Honest Review

Score 7 out of 10
Vetted Review
Verified User
Incentivized
We use Websense for Internet traffic filtering, email spam filtering, and DLP. It is used in all offices of our company; from the headquarters in Chicago to a remote office in Hong Kong. It blocks spam and compromised and unproductive websites for our users. If we don't want sensitive data to leave the company, we can also fingerprint data to be used by the DLP endpoint.
  • Websense is an all-inclusive product that handles email, web, and DLP in one interface.
  • Websense has a lot of different options to implement their solutions from software to onsite appliance to the cloud.
  • I think the support is lacking at times or takes a long time to get a return call from a tech; I've been on hold for 5hrs at one time.
  • It would be nice if they explained in more detail the different filtering options they provide either online or by a sales person. Our rep wasn't very knowledgeable and steered us to a 3rd party vendor to help explain the software.
  • It would be nice if there was an all in one appliance that handled email and web.
  • I was hoping there was an endpoint client that doesn't filter web traffic when it's on a public network.
Is there a failover solution in case the software\appliance fails? What private data gets sent to the cloud for the remote solution filtering? What data gets filtered? We're having issues with https filtering if we don't buy the appliance. What protocols can the software\appliance block? Does it have layer 7 blocking?
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Websense was implemented to protect the organization from external and internal internet abuse. It successfully cut down on desktop issues, prevented pop-ups and prevented internal issues of internet abuse. In the end it it gave the CEO and IT relief as the cost of the product more than paid for itself in reduced support of desktops. We used it across the whole organization as an internet proxy.

We test drove other products but they just did not compare in terms of reporting, ease of use and out of the box categories.
  • We implemented time based internet use. At lunch hour non work related websites were free to use and other parts of the day employees had 1/2 hour to freely surf. Setting this up on Websense was a breeze and helped reduce initial complaints from end users during implementation.
  • An added bonus of Websense was the ad/pop-up blocking. Not only did this save on bandwidth, but it also in the end drastically reduced the number of desktop issues we had from malware related internet surfing. Rebuilding or troubleshooting desktops ended up being a thing of the past.
  • Maintenance of Websense was particularly easy. The pre-canned categories as well as the daily updates to the lists were accurate and rarely did we have to manually add websites to an allow list. This made administration of Websense straightforward and easy. In the end it just ran and ran with very minimal maintenance on our end.
  • Initial install can be confusing. After I implemented it 3 or 4 times it was fairly straight forward.
  • Having a planning tool for how many users and what size of server would be a plus. When we implemented it was kind of a best guess based on 3 different setups.
  • Would be nice if they implemented a feature where if a user came to a page that was blocked (and they felt like it should be open) that they could click on a link which would generate an email or put into a report for administrators to review.
I personally think that every organization should have a form of Websense. The initial cost and on going support is easily paid for and it makes it easier on IT administrators and the organization more secure in the end. To me Websense is a no-brainer and I now run a web filter at home because of it.
Shivam Agarwal | TrustRadius Reviewer
Score 6 out of 10
Vetted Review
Verified User
Incentivized
a) It's being used for web security and monitoring and filtering the traffic. Also Websense is used as web caching and proxy server.
b) It's being used globally.
c) Managing the Security policies
  • Web Security Policies are detailed and we can control the traffic till application layer level. Software is good.
  • Their database for websites is good.
  • The management (Triton Server) is good as central management for all appliances placed globally.
  • Their Hardware is not good.
  • Support needs improvement.
If you have cost issues don't buy as it's costly. You might get away with some cheaper products in same field. If you have money then go ahead but make sure about the support. Use premium support and keep the sales guy's phone number handy.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Websense Data Security Suite is used by our customers who want to protect large amounts of intellectual property and other proprietary information. We have seen it implemented in single departments who have specific business needs and across entire organizations who are using it to protect everything from intellectual property to electronic healthcare records to credit card data.
  • Multiple channels for enforcement of policies (web, e-mail, copy/paste, saving to USB, etc.)
  • Simple and easy to understand policy definitions
  • Built in policies and definitions make it easy to design and publish policies applicable to any industry or type of data
  • The GUI can be a little messy to navigate as advanced configuration items are not always categorized in the sections you'd expect them to be.
  • Major upgrades can be a long and arduous process but thankfully come few and far in between compared to other security products.
  • Error messages in the GUI are sometimes less than helpful or not verbose enough to diagnose problems without opening the command line.
For customers who are expecting absolute protection of their data, Websense Data Security is not suitable. However, no DLP solution on the market is completely unbreakable or cannot be circumvented. Customers should be made aware that no security product is perfect and that dedicated individuals are going to find a way around any security measures you put in place. Key questions to ask during selection are:

  • What types of data are you looking to protect? PHI, PII, cardholder data, proprietary, intellectual property, or a combination?
  • Who currently handles these data types?
  • What types of methods do they use for accessing and managing them?
  • What level of security do you expect to get out of the product?
Customers who are realistic about the fact that a DLP solution is meant to prevent most unauthorized movement of data and will not prevent all are perfect candidates for Websense Data Security Suite.
Return to navigation