Forcepoint released the next version of its Data Loss Prevention (DLP) solution with Forcepoint DLP 10.0. The latest version preserves the main features of the solution aiming at simplified data security management, data security at scale, and personalized policy enforcement while extending fingerprinting scalability and adding requested personalization features.
Here’s a quick overview of some of the capabilities of this latest release:
Enabling DLP at a greater scale
For all our customers, data continues to grow exponentially. With that growth comes the need to work with larger, more massive data sets. Forcepoint exact data match (structured data) fingerprinting is one area that Forcepoint excels at, helping customers secure some of their most valuable records through fingerprinting. Our Forcepoint DLP customers have used our technology to fingerprint millions of records when protecting their most valuable data. But some of our enterprise customers needed more scalability
Forcepoint DLP 10.0 brings our fingerprinting to another level. Customers are now able to fingerprint 5x more records (up to 100 million records containing up to 600 million cells). Some of our financial institution customers that have made extensive use of our robust fingerprinting capabilities have noticed an added benefit—leading to greater customer confidence and with robust fingerprinting capabilities more new customers. We designed scalable DLP to exceed the data growth needs of even our most demanding customers.
Simplified management, new policy import/export capabilities
Forcepoint has long been an industry leader in simplifying DLP management. With over 1,700+ pre-defined policies/classifiers/templates as well as unified policy capability to define policies across all key channels for data exfiltration from within a single policy, Forcepoint simplifies data security management.
New with Forcepoint 10.0 we are introducing policy import/export capabilities. In the past, customers often needed to create policies in a test environment first and then rewrite them within the production environment. With this new capability, data security professionals can simply export policies from the test environment directly into production, saving customers time and resources for ongoing DLP management.
Personalized enforcement means personalized policies
Many customers use pop-ups for DLP policy enforcement as an effective way to address a specific potential data exfiltration event. They also view these as a teachable opportunity, especially where an actual block is not required. With Personalized enforcement, organizations can further increase the impact of pop-ups by adding their company logo with text that is customized to that specific policy. It’s clear from our testing that these personalized pop-ups resonate more clearly with users. Besides stopping data exfiltration events, personalized enforcement creates a more impactful learning experience for a user. Just like scalable DLP, personalized enforcement is a feature that many of our customers have been requesting.
Monitoring risk to fit your business
In recent research, Forrester notes that “Zero Trust advocates these three core principles: all entities are untrusted by default, least privilege access is enforced, and comprehensive security monitoring is implemented. Through Forcepoint’s Risk-Adaptive Protection comprehensive continuous monitoring is enabled and risky behavior is detected real-time, helping customers identify data breaches before they occur. Two new features were released last month which extend this continuous monitoring by ensuring individual privacy while increasing the power of securing data.
The two new areas are:
- Pseudo-anonymization for RBAC
It’s important that different types of people with different levels of security privileges be involved in monitoring risky behavior. Business analysts often need to look at where risky behavior is occurring but aren’t required to see the private information of the people who are introducing risk into the environment. Data security teams on the other hand require greater detail on individual users who are involved in potentially risky behavior. With Pseudo-anonymization for RBAC, Forcepoint helps organizations protect the privacy of individual users while continuing to evaluate risk and enforce DLP policies based on risky behavior at any moment. For someone in an analyst role, the individual user data is masked and tokenized so they can continue to perform their job duties without seeing detailed user information. This allows more people in the organization to work with the user insights RAP brings without needlessly violating user privacy.
- Customizable Indicators of Behavior (IoBs)
IoBs are at the heart of Forcepoint Risk-Adaptive Protection and the continuous monitoring that makes Forcepoint DLP so powerful. Each IoB looks at a specific potentially risky behavior (e.g. data stockpiling, usage of removable storage, unusually large attachments to personal email, etc.) and then applies a severity to that behavior (low, medium, high, critical). With over 150 IoBs, Forcepoint is extending the usage of RAP to more customers by providing the ability to do customization based on an individual organization’s business and individual needs. If needed, an organization now can enable or disable a specific IoB, change the severity associated with a specific IoB, or apply exceptions to individuals or groups as warranted. Exceptions could be applied for instance for someone in a finance role who needs to move credit card information as part of their work. For organizations who loved the idea of continuous monitoring but wanted IoBs that more closely fit specific business needs within their organization, this expands their ability to reduce false positives/negatives in incident management and also expands their monitoring capabilities, improving their Zero Trust program.
With this release, Forcepoint continues to introduce more innovation to data security. I’ll blog more later this quarter to further elaborate on the Forcepoint Data Security Lifecycle where we help customers discover, classify, monitor and protect all their data everywhere it resides and anywhere people work. Watch also for more about Forcepoint DLP integration with the industry-leading SSE platform, Forcepoint ONE.
If this information is helpful to you read our blog for more interesting and useful content, tips, and guidelines on similar topics. Contact the team of COMPUTER 2000 Bulgaria now if you have a specific question. Our specialists will be assisting you with your query.
Content curated by the team of COMPUTER 2000 on the basis of news in reputable media and marketing materials provided by our partners, companies, and other vendors.
Follow us to learn more
Let’s walk through the journey of digital transformation together.