Forcepoint DLP - March 2019



Forcepoint Customer Testimonial

The Forcepoint DLP solution supports data classification and proper data use, and enables protection and management of sensitive data.

IT Systems Analyst, Small Business Computer Hardware Company

Forcepoint Customer Testimonial

Forcepoint DLP provides visibility on the flow of sensitive data within the user’s normal activities.

Julio César Castañeda Reyes, Chief Information Security Officer, Accendo Banco S.A.

Forcepoint Customer Testimonial

We were able to prevent loss of confidential documents going to a potential competitor through resigned employees.

Chief Security Officer, Small Business Metals & Mining Company

Forcepoint Customer Testimonial

Sending Data Knowingly or Unknowingly

Forcepoint DLP helped protect against data going into the wrong hands and helped take action against individuals sending data unknowingly or knowingly.

Chief Information Officer, Medium Enterprise Pharmaceuticals Company

Forcepoint Customer Statistic

Quickly and Accurately Find Data

85% of customers agree that having the ability to quickly and accurately find regulated data is very valuable in preventing data loss.

Forcepoint Customer Statistic

Find Regulated Data

100% of customers agree that having the ability to quickly and accurately find regulated data is valuable in preventing data loss.

Forcepoint Customer Statistic

89% of customers agree that having the ability to reduce security response time to potential data events is very valuable in preventing data loss.

Forcepoint Customer Statistic

Reduce Response Time

100% of customers agree that having the ability to reduce security response time to potential data events is valuable in preventing data loss.

100%

Forcepoint Customer Statistic

Reduce Investigation Time

88% of customers agree that having the ability to reduce false positives and security investigation time is very valuable in preventing data loss.

88%

Forcepoint Customer Statistic

Reduce False Positives

100% of customers agree that having the ability to reduce false positives and security investigation time is valuable in preventing data loss.

100%

Forcepoint Customer Statistic

Automate Enforcement

99% of customers agree that having the ability to surface anomalies and automate enforcement at signs of risk is valuable in preventing data loss.

99%

Forcepoint Customer Statistic

One Console for Cloud, Networks, Devices

87% of customers agree that having the ability to manage data from one console across cloud, networks, and devices is very valuable in preventing data loss.

87%

Forcepoint Customer Statistic

Manage Data from One Console

100% of customers agree that having the ability to manage data from one console across cloud, networks, and devices is valuable in preventing data loss.

100%

Forcepoint Customer Statistic

Automating High-Risk Activities

85% of surveyed customers reported that having automated policy enforcement in responding to and protecting against high-risk activities is very valuable.

85%

Forcepoint Customer Statistic

Automated Policy Enforcement

100% of surveyed customers reported that having automated policy enforcement in responding to and protecting against high-risk activities is valuable.

100%

Forcepoint Customer Statistic

Graduated Policy Enforcement

98% of surveyed customers reported that having the ability to apply graduated policy enforcement correlated to risk level is valuable.

98%

Forcepoint Customer Statistic

Proactively Address Risky Users

93% of customers agreed that the ability to proactively address risky individuals would allow more efficient staff utilization.

Forcepoint Customer Statistic

Context Around Alerts

88% of surveyed customers reported that having context around alerts in order to understand end users’ intent is very important.

Forcepoint Customer Statistic

Understanding User Intent

99% of surveyed customers reported that having context around alerts in order to understand end users’ intent is important.

99%

Forcepoint Customer Statistic

Accelerating Compliance

95% of surveyed customers reported Forcepoint DLP valuable in accelerating compliance for regulated data.

Forcepoint Customer Statistic

Meet Partner Requirements

1 of 5 surveyed customers chose to implement DLP in order to meet partner requirements.

Forcepoint Customer Statistic

Meet Industry Regulations

4 out of 5 surveyed customers chose to implement DLP in order to see and control data that’s subject to regulation in their industry.

Forcepoint Customer Statistic

Control Regulated Data

80% of surveyed Banking and Financial Services customers reported that the ability to see and control data that’s subject to regulation prompted them to implement DLP.

80%

Forcepoint Customer Statistic

Prevent Data Loss Event

1 in 7 surveyed customers reported that the desire to prevent a data loss event like a competitor experienced prompted them to implement DLP.

Forcepoint Customer Statistic

Protect Critical IP and Data

81% of surveyed customers reported that the need to protect critical intellectual property or sensitive data were challenges that prompted them to implement DLP.

Forcepoint Customer Testimonial

Visibility and the ability to restrict data flowing out of the organization has significantly reduced instances of data loss.

IT Director, Medium Enterprise Financial Services Company

Forcepoint Customer Testimonial

Forcepoint has kept us in compliance for many industry standards and therefore continued business development.

IT Manager, Medium Enterprise Health Care Company

Forcepoint Customer Testimonial

Forcepoint has provided visibility into areas that were previously difficult to achieve. Having the ability to look for data at rest with discovery and protect data in motion with both the network-based inspection as well as the data endpoint allows for great flexibility.

IT Systems Analyst, State & Local Government

Forcepoint Customer Testimonial

Being able to have policies that vary for different employees/groups is very helpful. The OCR functionality is critical for detecting sensitive data.

IT Manager, Medium Enterprise Hospitality Company

Forcepoint Customer Testimonial

The implementation of DLP enables stakeholders to have reasonable assurance that our sensitive data are protected from insider threats. Moreover, it promotes awareness and encourages team members to handle sensitive data securely.

Application Manager, Large Enterprise Hospitality Company

Forcepoint Customer Testimonial

Forcepoint DLP has many predefined policies which I have not seen in any other product. These policies cover all the data which is at risk and which needs to be protected. I am completely satisfied with Forcepoint DLP.

IT Systems Analyst, Global 500 Computer Services Company

Forcepoint Customer Testimonial

We have been able to detect and gradually prevent the exit of high volumes of PII/SPI information from the organization. With our fine-tuned policies and associated DLP pop-up warning feedback to end users, we’ve been able to bring about a cultural change towards data to a great extent.

Aman Sharma, Security Manager, Info Edge India Limited

Forcepoint Customer Testimonial

We are able to see where the sensitive data is and how it moves across networks. We are able to see a data breach if it happens.

Tomáš Michalka, IT Specialist, Gratex International

Forcepoint Customer Testimonial

We know where our sensitive data is now. We know in real-time when sensitive data moves.

Michael Reilly, IT Director, United Physicians

Forcepoint Customer Testimonial

With Forcepoint we have been able to monitor and close gaps where users have been freely able to exfiltrate data before.

Steven Weis, Engineer, Progrexion

Forcepoint Customer Testimonial

We have been able to automate some processes that are helping prevent accidental disclosure of unsecured PII.

Philip Clerico, Engineer, Georgia United Credit Union

Forcepoint Research

Which (if any) of the following conditions are you experiencing with your current DLP implementation?

Difficult to set up or adjust policies to effectively detect different types of data exfiltration
60%
Too many alarms or alerts to triage
39%
Static conditions (policies are either permissive or constrictive)
34%
Difficult to staff appropriately for unknown future challenges and risks
33%
Restricted to one policy for all (difficult to customize for groups or individuals)
25%