Forcepoint DLP for HIPAA Compliance
December 10, 2019

Forcepoint DLP for HIPAA Compliance

Mark Horste | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source

Overall Satisfaction with Forcepoint Data Loss Prevention

Forcepoint DLP is being used across the organization to identify and locate ePHI on disk and in transit via email.
  • Database Fingerprinting to match my data exactly.
  • Integration with Forcepoint Email and Endpoint Agents.
  • Some inconsistency between module interfaces. Loading approve and block lists.
  • Complicated setup.
  • Largely automated the security process of monitoring email for DLP.
  • Reporting that satisfies auditors both internal and external.
We selected Forcepoint DLP as we already were using their Web and Email filtering products. The integration among their products is very strong and we did not want to introduce too many additional products into our environment. We have limited security resources so a high level of automation was important to us.
Forcepoint DLP and TRITON Enterprise are fully functional and complicated products to administer. We had excellent results with their support of the Web and Email products and have not been disappointed with their support of the DLP product. Our calls are always handled very efficiently and effectively. I would recommend Forcepoint to other users just based on the quality of their tech support.

Do you think Forcepoint Data Loss Prevention delivers good value for the price?

Yes

Are you happy with Forcepoint Data Loss Prevention's feature set?

Yes

Did Forcepoint Data Loss Prevention live up to sales and marketing promises?

Yes

Did implementation of Forcepoint Data Loss Prevention go as expected?

Yes

Would you buy Forcepoint Data Loss Prevention again?

Yes

I like the database fingerprinting for DLP. I can point it to a DB Table of my sensitive customer info and use that to look for data loss. The reporting feature has also been useful as we can setup different levels of alert for different users and different amounts of sensitive data. The alerts can be sent to the offending user, their manager, and the security officer or any combination.