TrustRadius: an HG Insights company

Forcepoint DLP

Score6.3 out of 10

74 Reviews and Ratings

What is Forcepoint DLP?

Forcepoint DLP promises to address human-centric risk by providing visibility and control everywhere your people work and everywhere your data resides. Security teams apply user-risk scoring to focus on the events that matter most and to accelerate compliance with global data regulations.

The vendor promises these benefits:
  • Accelerate compliance
  • Empower people to protect data
  • Advanced detection and controls that follow the data

RESPOND AND REMEDIATE RISK
Traditional approaches to DLP overload users with false positives while missing data at risk. Forcepoint DLP applies advanced analytics to correlate seemingly unrelated DLP events into prioritized incidents. Incident Risk Ranking (IRR) provided with Forcepoint DLP fuses disparate DLP indicators into a framework of Bayesian belief networks to assess the likelihood of data risk scenarios, such as data theft and broken business processes.

VISIBILITY EVERYWHERE YOUR PEOPLE WORK, CONTROL EVERYWHERE YOUR DATA RESIDES
Today’s enterprises are challenged with complicated environments, where data is everywhere and requires the protection of data in places that aren’t managed or owned by the enterprise. Forcepoint DLP for Cloud Applications extends analytics and DLP policies to critical cloud applications so your data is protected, wherever it resides.

Top Performing Features

  • Data Encryption

    Data encryption to ensure data privacy

    Category average: 7.7

Areas for Improvement

Ultimate Forcepoint DLP Review.

Use Cases and Deployment Scope

-For every outside communication via email, this product is being used. It protects sensitive information contained in Aadhar cards, PDFs, etc, attached to emails. It verifies everything that an email contains, including the destination email address, subject, attachments, and more.

Pros

  • Attachment Scanning.
  • Email Scanning.
  • Policy Granular Controls.

Cons

  • Policy Granular Controls.
  • Agents communications with DLP.
  • Integration should be simple.
  • Upgradation should be simple.

Return on Investment

  • Reduced Data Breach Risk.
  • Improved Compliance.
  • Risk-Adaptive Protection.
  • Operational Efficiency.

Usability

Alternatives Considered

Barracuda Web Application Firewall, F5 Big-IP Advanced WAF and CheckPoint

Other Software Used

F5 Big-IP Advanced WAF, Barracuda Application Protection, CheckPoint

Forcepoint Data Loss Prevention for Businesses Review

Use Cases and Deployment Scope

Forcepoint Data Loss Prevention is used in our organization to protect sensitive data from being sent digitally to other users either inside or outside of our organization from corporate devices. We use this in tandem with the Forcepoint endpoint protection as an all-in-one security suite to protect our users and our devices.

Pros

  • N/A, in our experience, the version of Forcepoint Data Loss Prevention we used was bulky, difficult to install, and didn't meet our requirements well enough.

Cons

  • Forcepoint Data Loss Prevention -- customization in what we want to protect
  • In our experience, the client installed on computers is difficult, if not impossible, to fully uninstall

Return on Investment

  • Negative -- took an immense amount of work and disruption to uninstall from all endpoints
  • Negative -- much more expensive than competitors for the feature suite you get in return

Usability

Alternatives Considered

Microsoft 365

Other Software Used

Microsoft 365, Microsoft Intune, Apple Business Essentials

One of the best data leakage prevention tool in market

Use Cases and Deployment Scope

Ws are using this product to prevent data from leakage from internal environment to outside public environment. We have deployed this product on all internal systems via endpoints and also on our email server. This product captures DLP incidents with very less false positives and it is very good in functionality.We can easily deploy policies and it has a easy to use interface.

Pros

  • Incidents identification and escalation is easy
  • Policy deployment is easy
  • Blocking access to users

Cons

  • Deployment on multiple servers is difficult
  • Data discovery can be improved
  • Machine learning technique can be improved

Return on Investment

  • Effective organisation wide data protection
  • Compliance with regulations
  • Increase in customer trust

Alternatives Considered

Zscaler Internet Access

Other Software Used

Archer Integrated Risk Management Platform, Microsoft Teams, PortSwigger Burp Suite

Forcepoint - Simple to use DLP

Use Cases and Deployment Scope

We are using Forcepoint DLP for preventing users from intentionally or unintentionally leaking data from the organization whether they are in office premises or working from home or working from branch offices or working from elsewhere. We restrict users to upload business-critical data to a website, USB device or even through any application.

Pros

  • Data leak prevention, as it is meant to do
  • Application control, monitoring and blocking on users system
  • Device control
  • Website blocking

Cons

  • Integration with Network DLP and other tools
  • Deployment is tedious as there are multiple servers for multiple services
  • Connectivity is not secure

Return on Investment

  • Does not support Linux
  • Requires more servers
  • High maintenance and multiple servers and services we need to take handle

Alternatives Considered

Endpoint Protector by CoSoSys, Palo Alto Networks SaaS Security (formerly Aperture) and Digital Guardian

Other Software Used

Palo Alto Networks Advanced URL Filtering, Palo Alto Networks Cortex XDR (Traps), Palo Alto Networks Prisma Access

Effective and powerful endpoint DLP security solution

Use Cases and Deployment Scope

Our entire organization depends on Forcepoint Data Loss Prevention to protect our valuable data on Cloud, server and on-premises. Powerful tool that helps to protect data at rest, data in-motion and data in use giving us the visibility and control to every abnormal activity by the user within our networked environment.

Pros

  • Cloud secure data protection.
  • Unified policy enforcement.
  • Risk-adaptive protection based on user behavior.

Cons

  • The way to discover data at risk can be improved.
  • Additional cost to professional support.
  • Improvement to reporting days per week.

Return on Investment

  • Automatic control to access and usage.
  • Cost-effective DLP solution.
  • Automated policy enforcement that accelerates compliance.

Alternatives Considered

Proofpoint Insider Threat Management (ObserveIT) and McAfee One Time Password (Discontinued)

Other Software Used

Bitglass, Versa SASE