I rate Forcepoint Data Loss Prevention eight out of 10. Maybe we can find a better DLP solution, but I always prefer Forcepoint because I have experience and expertise with it.
Consultant at a tech services company with 1,001-5,000 employees
Real User
Top 5
2024-08-26T10:17:05Z
Aug 26, 2024
AI is mostly used when you have to check the DLP inside artificial intelligence, and it is not perfect. We were also looking for SSE solutions, and the point is that Forcepoint could have been a good candidate, but it is located in some bad countries, making it one of the main issues why the tool was no longer a satisfying solution for our company. The tool is also quite heavy. In some cases, it is slow, making it not so comfortable to operate. The tool is fine for the DLP features, especially when you are on an on-premises model with a data center. If you are on the cloud, I would not recommend it. Purview and Forcepoint are almost the same, as both can be used to block, upload data, or send emails. Once something is blocked, you ask the security operations, who will start, to provide us with the document we can look at to see if it is legitimate or not. The incident management process is not based directly on Forcepoint. Forcepoint is used to detect and block, but the response is not done inside of Forcepoint. It is done at the data level. I rate the tool a seven out of ten.
The platform's key features include blocking unauthorized data copying to USB drives, preventing data transfers to the cloud, and discovering, classifying, and monitoring data without causing friction for users. The real-time analytics feature is helpful. It alerts within seconds and promptly informs management of any potential security issues. I suggest thoroughly understanding your organization's data leakage channels and the criticality of your data. With this understanding, you may fully benefit from using DLP. Overall, I rate it an eight out of ten.
You have two primary use cases for encryption: one for USB devices and the other for network-level data, like email. For email encryption, you can use an appliance that encrypts emails before sending them to another recipient. You can set up DLP for USB devices to manage and secure the data copied to the USB. By registering the USB with your DLP administrator or security tool, such as Forcepoint Security Manager, you can ensure that any data transferred to the USB is protected through encryption, preventing unauthorized access. Integrating a DLP solution with your Active Directory is a prerequisite for implementing it in your environment. Ensuring your Active Directory follows best practices and benchmarks is crucial for seamless integration and optimal functionality of the DLP solution. You need to add the Active Directory to the environment. It must be integrated because you cannot block your data if your endpoint is not integrated with the endpoint level. Overall, I rate the solution a nine out of ten.
Technical Support Engineer at a tech services company with 11-50 employees
Reseller
Top 20
2024-06-19T08:05:36Z
Jun 19, 2024
The real-time analytics feature is good, and the tool is really easy to use. I have no concerns regarding the tool. It is easy to integrate the product with other solutions like SIEM solutions. We have multiple products that we have integrated with Forcepoint Data Loss Prevention, including Microsoft. I have only used the machine learning part of the tool, which is easy to use. I recommend the tool to others. I rate the tool an eight out of ten.
Learn what your peers think about Forcepoint Data Loss Prevention. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Speaking about how the tool improves data security and compliance posture, I would say that there are multiple products, one of which is a DLP tool, required from a complaint point of view when it comes to data security. The product's most valuable features for protecting sensitive data revolve around areas like data discovery, data classification, and data leakage. Forcepoint also provides pre-defined templates for data classification covering components like PII, PHI, and PCI. Forcepoint DLP is a leading tool in the market. The policy management and the incident reporting system are very easy since, in our company, we just need to integrate it with our user group and users, based on which we configure the policy and apply it within a fraction of a second. The aforementioned details explain why Forcepoint is leading in the market with respect to DLP products. The data fingerprinting part is a major reason why my company chose Forcepoint Data Loss Prevention. In our company, we need to use areas like PII, PHI, and PCI, so that, though we can share data via emails or any other channels, we get to block specific areas with the fingerprinting feature of Forcepoint Data Loss Prevention . From a DLP perspective, Forcepoint Data Loss Prevention is the best. There are no other competitors who can compete with Forcepoint in the area of DLP. In Forcepoint Data Loss Prevention, the user risk scoring impacts security operations and incident response since it is very easy to deploy from our company's customers' perspective, and it makes their day-to-day operations very easy with respect to incident response. The main benefits of the use of the solution stem from the fact that it ensures that there are no chances of data leakage of any confidential data from inside to outside of the organization. I rate the tool an eight out of ten.
Overall, I would rate the solution a ten out of ten. It is a really good product. It is very user-friendly, even for admins. However, the support is very low otherwise the product is very good.
It's important to work your way through the console first because you'll need it to manage the solution. There are multiple components and they all need to be understood. I rate this solution nine out of 10.
Regional Solutions Manager Sub Saharan Africa at Infodata Professional Services Limited
Real User
Top 5
2023-03-08T15:50:00Z
Mar 8, 2023
Overall, I would rate it a ten out of ten. If you are considering using Forcepoint DLP, it is miles ahead of its competitors in the realm of DLP. Forcepoint stands out as the clear leader when we compare pure DLP solutions. The closest competitor would be Symantec, but even they are miles behind in terms of capabilities. So, if you're looking for a top-performing DLP solution, Forcepoint is the way to go.
My company uses Forcepoint Data Loss Prevention. I'm using the latest version of the solution because my company updates Forcepoint Data Loss Prevention every time there's a new version. My company has more than one thousand Forcepoint Data Loss Prevention licenses. I would recommend Forcepoint Data Loss Prevention, depending on your scenario and the industry you're working in. The primary consideration for using the solution would be your use cases. If it fits your use case, I'd tell you to go for Forcepoint Data Loss Prevention. The solution is quite mature compared to other DLP products, so my rating for Forcepoint Data Loss Prevention is eight out of ten. My company is a Forcepoint Data Loss Prevention user.
student at a comms service provider with 51-200 employees
Real User
Top 20
2022-12-07T13:44:45Z
Dec 7, 2022
I am a partner. I'm not sure which version of the solution we're using. I'd recommend the solution to others. Overall, I would rate the solution eight out of ten.
I rate the solution eight out of ten. Forcepoint is the best DLP solution in the industry. I have yet to see another DLP solution on the market that provides as much security for endpoints; their endpoint DLP is unbeatable. Forcepoint also has an enormous number of features. It's handy, lightweight, easy to deploy, captures all the details, and never gives false positives; it's an excellent product.
Regional Solutions Manager at a tech services company with 11-50 employees
Real User
Top 20
2020-10-04T07:06:08Z
Oct 4, 2020
With the Forcepoint DLP suite, you are assured of DLP on the network and on the Endpoint of the corporate network.
You can run a discovery scan on the network (servers) as well as on all endpoint devices with the endpoint agent installed. Remediations can also be done from the result of your discovery scan.
Aside from predefined policies which are quite granular, custom policies allow different classifiers ranging from Regular Expressions for unstructured data to Dictionary, key phrases, and structured data (File type)
Inbuilt tagging technology with Forcepoint (called Fingerprinting) enables rules to be applied to file servers, repositories, and shared folders. This is accurate!
With the Forcepoint DLP Cloud Apps, you can extend your DLP policies/rules from on-prem to the cloud with a single click and manage from a single point.
Senior Manager Cyber Security Services & Solutions at Trillium
Vendor
Top 10
2022-10-11T11:05:59Z
Oct 11, 2022
I rate Forcepoint Data Loss Prevention 10 out of 10. It's the best product on the market. When our customers compare it with Symantec, McAfee, or Trend Micro, the response is extremely positive. The product is stable and scalable, and the licensing tiers are fairly simple. It's easy for us to explain to customers which features are available for each pricing tier.
Facility Security Officer at a tech services company with 10,001+ employees
Real User
2022-09-09T14:32:19Z
Sep 9, 2022
I would rate Forcepoint Data Loss Prevention a seven out of ten. It is a good product. I am not overly excited about it, but I believe that all of the software has the same issues that I do. It is the same problems I have had with other software, such as the customer service being slow, something breaking, or there's a patching issue.
Service Delivery Manager at Paramount Computer Systems
Real User
2022-07-03T14:31:00Z
Jul 3, 2022
If you are considering implementing Forcepoint Data Loss Prevention into your organization, be sure to be clear of your initial requirements. Sometimes users are thinking something totally different and the DLP will not meet those needs. Overall, I would rate this solution an eight out of 10.
If the organization is pretty small, then I can recommend this solution. However, if it's a pretty huge organization, I will step back a little bit because it won't serve its whole purpose. On a scale from one to ten, I would give Forcepoint Data Loss Prevention a six.
Overall, Forcepoint has good strategy and development. It is stable and has not changed as a company for a long time. It is focused on a specific solution and that makes for a good portfolio.
Management Executive at a security firm with 11-50 employees
Real User
2021-09-23T06:48:00Z
Sep 23, 2021
The tool works great but they don't talk about the operationalization of the tool from a process perspective. When people sell DLP solutions, they talk about the efficiency of the tool, but they don't talk about the impact that it has on an organization from a resource perspective. You would need a team to analyze all of the exceptions that you have, like the way they do in a SOC, where you have analysts looking at the incident. They analyze and investigate it, and then determine whether it is positive or negative and something that we have to be worried about. For example, our organization had approximately 70,000 end-users, who were employees. There is quite a large amount of data that is transferred across our network. In our case, if a person is sending more than one credit card credential out of the bank, it was flagged. If it was more than one, you had to have a whole backend process where the analyst had to look at it, then perhaps ask the person why they were sending out this information. When we were first looking at this product, there was nobody who informed the customer as to the complete ecosystem that would be required to have an effective DLP solution in play. My advice for anybody who is looking at Forcepoint is that they need to understand what it is that they are trying to prevent. You cannot be totally dependent on the tool to do everything. This is not a criticism of Forcepoint but rather, a criticism of the way it's sold. The product will do what it's built to do. But, if you're expecting it to automatically manage the incident, then it cannot do everything. It can block, it can monitor, and it can create alerts, but you still need your analysts. For most CSOs or IT managers that are looking to deploy, they must factor in the practical implications of operationalizing it. They need to have a process in place. They need to have an escalation process in place, and they need to have resources like analysts to actually look at the exception reports. This is an effective data leakage solution, it does what it's meant to be doing, and the interfaces are great. The biggest lesson that I have learned from using it is to understand the total cost of ownership. I would rate this solution an eight out of ten.
You definitely need to do a proper calibration of the organization and data flow analysis. Even though there are 1,700 policy templates, each and every organization will have a different set of rules and data to be analyzed. So, data flow analysis is a must with Forcepoint DLP to create a proper policy. Cost-wise, it is a very good product. An organization should really consider this product if they are in process of DLP implementation, or if they are thinking of switching from any other DLP solution. If there is a budget constraint or you need a good DLP solution, I would definitely recommend Forcepoint DLP. I would rate Forcepoint Data Loss Prevention an eight out of 10. There is no DLP that will score a 10.
If an organization is small or medium in size, I would deploy Forcepoint for it. The price and the architecture requirements, and the equipment required for small and medium businesses, is reasonable. For large enterprises, with more than 20,000 users, I would deploy Symantec.
Enterprise Information Security Analyst at a retailer with 5,001-10,000 employees
Real User
2021-04-07T13:32:00Z
Apr 7, 2021
What I can recommend is getting the highest tier of support that you can afford, because it's absolutely critical. I don't know how I would do everything if I had to submit a request and wait several days for it. I don't know how I would keep things going in that situation. With a higher level of support you can call someone and you also have someone who is managing your account. That's also really nice, because you get some extra benefits out of that. I'm very satisfied and would rate it at nine out of 10.
Presales Network & Security Engineer at a tech services company with 51-200 employees
Reseller
2021-02-19T18:03:10Z
Feb 19, 2021
I would certainly recommend this solution to others. It's one of the best DLP solutions on the market. Overall, on a scale from one to ten, I would give this solution a rating of nine.
Senior Lead- Technical at a computer software company with 51-200 employees
Real User
2020-11-24T07:45:22Z
Nov 24, 2020
This is a product that I can recommend to others who are interested in using it. I would suggest evaluating it and do some testing before making a decision. It's a different environment. I would rate this solution a nine out of ten.
Cyber Security Consultant and Technical Manager at a tech services company with 11-50 employees
Real User
2020-09-27T04:10:00Z
Sep 27, 2020
If you are interested in implementing this solution or any DLP solution for that matter, I would advise you to build your own policies first. In short, build your policies and workflows and organize your enterprise well before you implement this solution. On a scale from one to ten, I would give this solution a rating of seven.
General Manager - Presales Cloud & Security at a tech vendor with 1,001-5,000 employees
Real User
2020-09-10T07:35:43Z
Sep 10, 2020
Before implementing this solution, you need to have an understanding of your environment. You need full visibility. Many customers are not aware of their environment and where all of the data is. In summary, it's a fantastic product. I would rate Forcepoint Data Loss Prevention a ten out of ten.
Information Security Senior Expert at Wafaassurance
Real User
2020-01-26T09:26:00Z
Jan 26, 2020
We were on Office 365 on the cloud. It wasn't enough. Since then, we've described our policy to Apple Mail and have elaborated out information classification. Afterward, we invited the business and the strategic entity to workshops to classify the data effectively and try the solution after implementing the DLP. We use a hybrid deployment model and acquired the solution with the hybrid functionality to help protect our sensitive data in the inter-managed hybrid space. The solution has been good, and it has responded to our needs. As a group, we were afraid of the safety around our sensitive data which was exchanged in our mail. We had an obligation to protect the data classified as confidential or restricted. The solution, since implementation, has helped us to protect our data and mitigate risk effectively. ForcePoint also offers a bundle that includes modules that cover URL filtering and app data for other DLPs. It's very good. Based on my experience, I advise any other organizations to test, try, and to be convinced by the solution before fully implementing it. Users will need to define exactly what it is they need from it and what their exact needs are to effectively deploy it. I think every user will appreciate that solution. We've experienced a lot of cyberattacks, so the DLP is necessary for us and would be beneficial to any company that has critical activities or has staff that exchanges sensitive data. I'd rate the solution nine out of ten.
Advice that I would give to someone looking into implementing Forcepoint DLP is to take care and compare it to other solutions. Other solutions may have a more established reputation because Forcepoint is a new name on the market. But I would recommend taking a look at all the technical features and the pricing as part of their consideration before making a decision. On a scale from one to ten where one is the worst and ten is the best, I would rate Forcepoint DLP as a nine-out-of-ten. The thing that would make it a ten for me would be for the company to improve the technical implementation. It should be better organized.
Regional Solutions Manager at a tech services company with 11-50 employees
Real User
Top 20
2019-09-24T05:43:00Z
Sep 24, 2019
I'm a Forcepoint reseller. I typically handle the on-premises deployment model, but I do have a client who is currently moving to the cloud. I would rate the solution nine out of ten.
Owner at a tech services company with 11-50 employees
Reseller
2019-08-12T05:57:00Z
Aug 12, 2019
My advice would be to make sure that you do a BOT at the beginning before you take any DLP decision, do a BOT. If you're going with Forcepoint, ensure that you have the prices locked down properly, and the user licenses clearly defined. Then finally, ensure that you sign the right support, you get the right support contract, or support flavor with them. Then you do your sizing properly, especially if you are using Office 365, because Office 365, the mini-environment, has huge performance issues around solutions. So be sure to do your sizing properly. I rate this solution a seven out of ten. I am really impressed by the interface and management console but the requirements are very high and the response time is too slow.
If I were to give some advice, I would say don't try to do it all at once, it won't work. Know that you're going to go. It's different from building line-of-business solutions. Whereas from a line-of-business solution you work from the outside in, with security programs you work from the inside out. You have to get your data governance in place, as well as information security governance. You need to assign who will be responsible. Decide who to send information to if something does happen. All that has to happen before you begin trying to bring in a system. You have to know your organization well enough to be able to configure a product to make effective use of it. Don't do it unless you have the guts to do it. I would rate this solution as eight out of ten. There are better solutions, but this was better when it came out. When it did come out, this was the best solution we could find. At the same time, I don't know if I would rate anything else higher than that now, either. Every security tool that we have seen has pluses and minuses, advantages and disadvantages. Another reason we didn't go with the IQ or any management type of component is the deconstruction and the reconstruction of existing security roles. The biggest problem information security has today is the decoupling and deconstruction of active directory designated accounts which for all practical purposes were based on functionality. One role can have multiple pieces of functionality associated with it, so going to a role-based type of solution muddies the waters. The vernacular needs to change to be more adaptable if they're gonna put out the configuration types of solutions.
I suggest that before implementing this solution, people should decide which servers they want to keep at which location. This is a good strategy because after implementation and deployment, changing the server position creates problems. Proper homework is necessary before the full deployment. This is one of the best solutions in the world but without support for our local language, Bangla, I cannot rate it ten out of ten. Overall, I would rate this solution a nine out of ten.
The first advice is that you should know what data you need to protect then you can implement everything. If you know what you need it'll be a lot easier. You also need good hardware and resources in the computer hardware to be able to implement. I would rate it an eight out of ten. An eight because you need to have a lot of security experience to properly implement it, in order to know what you need to activate. It's not a plug and play solution.
Forcepoint Data Loss Prevention (DLP) is a data loss prevention tool that protects users from advanced threats and data breaches. Forcepoint DLP’s technologies can quickly identify and protect sensitive data and provide insight and awareness into attacks on endpoint devices both on and off the network.
With company data constantly on the move, data security teams must have visibility and control across all channels - endpoint, web, network, email, and cloud. Forcepoint DLP provides...
I rate Forcepoint Data Loss Prevention eight out of 10. Maybe we can find a better DLP solution, but I always prefer Forcepoint because I have experience and expertise with it.
AI is mostly used when you have to check the DLP inside artificial intelligence, and it is not perfect. We were also looking for SSE solutions, and the point is that Forcepoint could have been a good candidate, but it is located in some bad countries, making it one of the main issues why the tool was no longer a satisfying solution for our company. The tool is also quite heavy. In some cases, it is slow, making it not so comfortable to operate. The tool is fine for the DLP features, especially when you are on an on-premises model with a data center. If you are on the cloud, I would not recommend it. Purview and Forcepoint are almost the same, as both can be used to block, upload data, or send emails. Once something is blocked, you ask the security operations, who will start, to provide us with the document we can look at to see if it is legitimate or not. The incident management process is not based directly on Forcepoint. Forcepoint is used to detect and block, but the response is not done inside of Forcepoint. It is done at the data level. I rate the tool a seven out of ten.
The platform's key features include blocking unauthorized data copying to USB drives, preventing data transfers to the cloud, and discovering, classifying, and monitoring data without causing friction for users. The real-time analytics feature is helpful. It alerts within seconds and promptly informs management of any potential security issues. I suggest thoroughly understanding your organization's data leakage channels and the criticality of your data. With this understanding, you may fully benefit from using DLP. Overall, I rate it an eight out of ten.
You have two primary use cases for encryption: one for USB devices and the other for network-level data, like email. For email encryption, you can use an appliance that encrypts emails before sending them to another recipient. You can set up DLP for USB devices to manage and secure the data copied to the USB. By registering the USB with your DLP administrator or security tool, such as Forcepoint Security Manager, you can ensure that any data transferred to the USB is protected through encryption, preventing unauthorized access. Integrating a DLP solution with your Active Directory is a prerequisite for implementing it in your environment. Ensuring your Active Directory follows best practices and benchmarks is crucial for seamless integration and optimal functionality of the DLP solution. You need to add the Active Directory to the environment. It must be integrated because you cannot block your data if your endpoint is not integrated with the endpoint level. Overall, I rate the solution a nine out of ten.
The real-time analytics feature is good, and the tool is really easy to use. I have no concerns regarding the tool. It is easy to integrate the product with other solutions like SIEM solutions. We have multiple products that we have integrated with Forcepoint Data Loss Prevention, including Microsoft. I have only used the machine learning part of the tool, which is easy to use. I recommend the tool to others. I rate the tool an eight out of ten.
Overall, the solution is an eight out of ten.
Speaking about how the tool improves data security and compliance posture, I would say that there are multiple products, one of which is a DLP tool, required from a complaint point of view when it comes to data security. The product's most valuable features for protecting sensitive data revolve around areas like data discovery, data classification, and data leakage. Forcepoint also provides pre-defined templates for data classification covering components like PII, PHI, and PCI. Forcepoint DLP is a leading tool in the market. The policy management and the incident reporting system are very easy since, in our company, we just need to integrate it with our user group and users, based on which we configure the policy and apply it within a fraction of a second. The aforementioned details explain why Forcepoint is leading in the market with respect to DLP products. The data fingerprinting part is a major reason why my company chose Forcepoint Data Loss Prevention. In our company, we need to use areas like PII, PHI, and PCI, so that, though we can share data via emails or any other channels, we get to block specific areas with the fingerprinting feature of Forcepoint Data Loss Prevention . From a DLP perspective, Forcepoint Data Loss Prevention is the best. There are no other competitors who can compete with Forcepoint in the area of DLP. In Forcepoint Data Loss Prevention, the user risk scoring impacts security operations and incident response since it is very easy to deploy from our company's customers' perspective, and it makes their day-to-day operations very easy with respect to incident response. The main benefits of the use of the solution stem from the fact that it ensures that there are no chances of data leakage of any confidential data from inside to outside of the organization. I rate the tool an eight out of ten.
Overall, I rate the solution a nine out of ten.
Overall, I would rate the solution a ten out of ten. It is a really good product. It is very user-friendly, even for admins. However, the support is very low otherwise the product is very good.
I rate Forcepoint Data Loss Prevention a nine out of ten.
I rate Forcepoint Data Loss Prevention a five out of ten.
It's important to work your way through the console first because you'll need it to manage the solution. There are multiple components and they all need to be understood. I rate this solution nine out of 10.
Its availability as an on-premises solution is something that I like most about the product. Overall, I rate this solution a nine out of ten.
Overall, I would rate it a ten out of ten. If you are considering using Forcepoint DLP, it is miles ahead of its competitors in the realm of DLP. Forcepoint stands out as the clear leader when we compare pure DLP solutions. The closest competitor would be Symantec, but even they are miles behind in terms of capabilities. So, if you're looking for a top-performing DLP solution, Forcepoint is the way to go.
My company uses Forcepoint Data Loss Prevention. I'm using the latest version of the solution because my company updates Forcepoint Data Loss Prevention every time there's a new version. My company has more than one thousand Forcepoint Data Loss Prevention licenses. I would recommend Forcepoint Data Loss Prevention, depending on your scenario and the industry you're working in. The primary consideration for using the solution would be your use cases. If it fits your use case, I'd tell you to go for Forcepoint Data Loss Prevention. The solution is quite mature compared to other DLP products, so my rating for Forcepoint Data Loss Prevention is eight out of ten. My company is a Forcepoint Data Loss Prevention user.
I am a partner. I'm not sure which version of the solution we're using. I'd recommend the solution to others. Overall, I would rate the solution eight out of ten.
I rate the solution eight out of ten. Forcepoint is the best DLP solution in the industry. I have yet to see another DLP solution on the market that provides as much security for endpoints; their endpoint DLP is unbeatable. Forcepoint also has an enormous number of features. It's handy, lightweight, easy to deploy, captures all the details, and never gives false positives; it's an excellent product.
With the Forcepoint DLP suite, you are assured of DLP on the network and on the Endpoint of the corporate network.
You can run a discovery scan on the network (servers) as well as on all endpoint devices with the endpoint agent installed. Remediations can also be done from the result of your discovery scan.
Aside from predefined policies which are quite granular, custom policies allow different classifiers ranging from Regular Expressions for unstructured data to Dictionary, key phrases, and structured data (File type)
Inbuilt tagging technology with Forcepoint (called Fingerprinting) enables rules to be applied to file servers, repositories, and shared folders. This is accurate!
With the Forcepoint DLP Cloud Apps, you can extend your DLP policies/rules from on-prem to the cloud with a single click and manage from a single point.
I rate Forcepoint Data Loss Prevention 10 out of 10. It's the best product on the market. When our customers compare it with Symantec, McAfee, or Trend Micro, the response is extremely positive. The product is stable and scalable, and the licensing tiers are fairly simple. It's easy for us to explain to customers which features are available for each pricing tier.
I would rate Forcepoint Data Loss Prevention a seven out of ten. It is a good product. I am not overly excited about it, but I believe that all of the software has the same issues that I do. It is the same problems I have had with other software, such as the customer service being slow, something breaking, or there's a patching issue.
If you are considering implementing Forcepoint Data Loss Prevention into your organization, be sure to be clear of your initial requirements. Sometimes users are thinking something totally different and the DLP will not meet those needs. Overall, I would rate this solution an eight out of 10.
I rate Forcepoint Data Loss Prevention a seven out of ten.
If the organization is pretty small, then I can recommend this solution. However, if it's a pretty huge organization, I will step back a little bit because it won't serve its whole purpose. On a scale from one to ten, I would give Forcepoint Data Loss Prevention a six.
Overall, Forcepoint has good strategy and development. It is stable and has not changed as a company for a long time. It is focused on a specific solution and that makes for a good portfolio.
The tool works great but they don't talk about the operationalization of the tool from a process perspective. When people sell DLP solutions, they talk about the efficiency of the tool, but they don't talk about the impact that it has on an organization from a resource perspective. You would need a team to analyze all of the exceptions that you have, like the way they do in a SOC, where you have analysts looking at the incident. They analyze and investigate it, and then determine whether it is positive or negative and something that we have to be worried about. For example, our organization had approximately 70,000 end-users, who were employees. There is quite a large amount of data that is transferred across our network. In our case, if a person is sending more than one credit card credential out of the bank, it was flagged. If it was more than one, you had to have a whole backend process where the analyst had to look at it, then perhaps ask the person why they were sending out this information. When we were first looking at this product, there was nobody who informed the customer as to the complete ecosystem that would be required to have an effective DLP solution in play. My advice for anybody who is looking at Forcepoint is that they need to understand what it is that they are trying to prevent. You cannot be totally dependent on the tool to do everything. This is not a criticism of Forcepoint but rather, a criticism of the way it's sold. The product will do what it's built to do. But, if you're expecting it to automatically manage the incident, then it cannot do everything. It can block, it can monitor, and it can create alerts, but you still need your analysts. For most CSOs or IT managers that are looking to deploy, they must factor in the practical implications of operationalizing it. They need to have a process in place. They need to have an escalation process in place, and they need to have resources like analysts to actually look at the exception reports. This is an effective data leakage solution, it does what it's meant to be doing, and the interfaces are great. The biggest lesson that I have learned from using it is to understand the total cost of ownership. I would rate this solution an eight out of ten.
You definitely need to do a proper calibration of the organization and data flow analysis. Even though there are 1,700 policy templates, each and every organization will have a different set of rules and data to be analyzed. So, data flow analysis is a must with Forcepoint DLP to create a proper policy. Cost-wise, it is a very good product. An organization should really consider this product if they are in process of DLP implementation, or if they are thinking of switching from any other DLP solution. If there is a budget constraint or you need a good DLP solution, I would definitely recommend Forcepoint DLP. I would rate Forcepoint Data Loss Prevention an eight out of 10. There is no DLP that will score a 10.
If an organization is small or medium in size, I would deploy Forcepoint for it. The price and the architecture requirements, and the equipment required for small and medium businesses, is reasonable. For large enterprises, with more than 20,000 users, I would deploy Symantec.
What I can recommend is getting the highest tier of support that you can afford, because it's absolutely critical. I don't know how I would do everything if I had to submit a request and wait several days for it. I don't know how I would keep things going in that situation. With a higher level of support you can call someone and you also have someone who is managing your account. That's also really nice, because you get some extra benefits out of that. I'm very satisfied and would rate it at nine out of 10.
I would certainly recommend this solution to others. It's one of the best DLP solutions on the market. Overall, on a scale from one to ten, I would give this solution a rating of nine.
This is a product that I can recommend to others who are interested in using it. I would suggest evaluating it and do some testing before making a decision. It's a different environment. I would rate this solution a nine out of ten.
If you are interested in implementing this solution or any DLP solution for that matter, I would advise you to build your own policies first. In short, build your policies and workflows and organize your enterprise well before you implement this solution. On a scale from one to ten, I would give this solution a rating of seven.
Before implementing this solution, you need to have an understanding of your environment. You need full visibility. Many customers are not aware of their environment and where all of the data is. In summary, it's a fantastic product. I would rate Forcepoint Data Loss Prevention a ten out of ten.
If anyone is looking for simplicity in a DLP solution, they must go with Forcepoint. On a scale between one and ten, I would rate Forcepoint a nine.
We were on Office 365 on the cloud. It wasn't enough. Since then, we've described our policy to Apple Mail and have elaborated out information classification. Afterward, we invited the business and the strategic entity to workshops to classify the data effectively and try the solution after implementing the DLP. We use a hybrid deployment model and acquired the solution with the hybrid functionality to help protect our sensitive data in the inter-managed hybrid space. The solution has been good, and it has responded to our needs. As a group, we were afraid of the safety around our sensitive data which was exchanged in our mail. We had an obligation to protect the data classified as confidential or restricted. The solution, since implementation, has helped us to protect our data and mitigate risk effectively. ForcePoint also offers a bundle that includes modules that cover URL filtering and app data for other DLPs. It's very good. Based on my experience, I advise any other organizations to test, try, and to be convinced by the solution before fully implementing it. Users will need to define exactly what it is they need from it and what their exact needs are to effectively deploy it. I think every user will appreciate that solution. We've experienced a lot of cyberattacks, so the DLP is necessary for us and would be beneficial to any company that has critical activities or has staff that exchanges sensitive data. I'd rate the solution nine out of ten.
Advice that I would give to someone looking into implementing Forcepoint DLP is to take care and compare it to other solutions. Other solutions may have a more established reputation because Forcepoint is a new name on the market. But I would recommend taking a look at all the technical features and the pricing as part of their consideration before making a decision. On a scale from one to ten where one is the worst and ten is the best, I would rate Forcepoint DLP as a nine-out-of-ten. The thing that would make it a ten for me would be for the company to improve the technical implementation. It should be better organized.
My advice would be to use these same components. I would rate this solution an eight out of ten.
It is better to use this solution first, before using others. Overall it's a nice product. I would rate this solution a nine out of ten.
I'm a Forcepoint reseller. I typically handle the on-premises deployment model, but I do have a client who is currently moving to the cloud. I would rate the solution nine out of ten.
My advice would be to make sure that you do a BOT at the beginning before you take any DLP decision, do a BOT. If you're going with Forcepoint, ensure that you have the prices locked down properly, and the user licenses clearly defined. Then finally, ensure that you sign the right support, you get the right support contract, or support flavor with them. Then you do your sizing properly, especially if you are using Office 365, because Office 365, the mini-environment, has huge performance issues around solutions. So be sure to do your sizing properly. I rate this solution a seven out of ten. I am really impressed by the interface and management console but the requirements are very high and the response time is too slow.
If I were to give some advice, I would say don't try to do it all at once, it won't work. Know that you're going to go. It's different from building line-of-business solutions. Whereas from a line-of-business solution you work from the outside in, with security programs you work from the inside out. You have to get your data governance in place, as well as information security governance. You need to assign who will be responsible. Decide who to send information to if something does happen. All that has to happen before you begin trying to bring in a system. You have to know your organization well enough to be able to configure a product to make effective use of it. Don't do it unless you have the guts to do it. I would rate this solution as eight out of ten. There are better solutions, but this was better when it came out. When it did come out, this was the best solution we could find. At the same time, I don't know if I would rate anything else higher than that now, either. Every security tool that we have seen has pluses and minuses, advantages and disadvantages. Another reason we didn't go with the IQ or any management type of component is the deconstruction and the reconstruction of existing security roles. The biggest problem information security has today is the decoupling and deconstruction of active directory designated accounts which for all practical purposes were based on functionality. One role can have multiple pieces of functionality associated with it, so going to a role-based type of solution muddies the waters. The vernacular needs to change to be more adaptable if they're gonna put out the configuration types of solutions.
I suggest that before implementing this solution, people should decide which servers they want to keep at which location. This is a good strategy because after implementation and deployment, changing the server position creates problems. Proper homework is necessary before the full deployment. This is one of the best solutions in the world but without support for our local language, Bangla, I cannot rate it ten out of ten. Overall, I would rate this solution a nine out of ten.
Go for it. I would recommend this solution.
The first advice is that you should know what data you need to protect then you can implement everything. If you know what you need it'll be a lot easier. You also need good hardware and resources in the computer hardware to be able to implement. I would rate it an eight out of ten. An eight because you need to have a lot of security experience to properly implement it, in order to know what you need to activate. It's not a plug and play solution.