Forcepoint Data Loss Prevention is a solid product but there is room for improvement.
January 17, 2020

Forcepoint Data Loss Prevention is a solid product but there is room for improvement.

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Forcepoint Data Loss Prevention

We are currently using it on the Security team to track data exfiltration. We also allow Data Custodians from different departments to review incidents to point out anything suspicious.
  • Tracks Removeable media based events well
  • Provides in depth forensic analysis
  • Whitelisting is limited. It should be adjusted so multi-tiered rules can be used accurately
  • Fingerprinting can be too sensitive and when similar (not exactly the same) files are found, it can impede production
  • It has allowed us to create rules around terminated users to ensure no data exfiltration could take place.
  • It has helped us to secure sensitive third party data.
We have not done a ton of testing with alternatives at this point.
Support from Forcepoint has been lacking. When calling in with a high priority issue we rarely are able to work with a technician immediately. The queue waits are very long and when you get through there are no support engineers available and we need to wait for a call back for hours it seems.

Do you think Forcepoint Data Loss Prevention delivers good value for the price?


Are you happy with Forcepoint Data Loss Prevention's feature set?


Did Forcepoint Data Loss Prevention live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Forcepoint Data Loss Prevention go as expected?

I wasn't involved with the implementation phase

Would you buy Forcepoint Data Loss Prevention again?


In scenarios where you are just trying to block specific types of data based on a rule, it can be used very effectively.

If you are trying to use fingerprinting to classify data, Forcepoint is not well suited for this. You would need a separate technology in order to classify data appropriately.