0% found this document useful (0 votes)
66 views53 pages

Data Security Everywhere Executive Pitch - Ext

The document discusses the evolution of data protection, emphasizing the shift from network security to a focus on data as a central asset in the age of AI and compliance. It highlights the critical capabilities needed for data security, including regulatory compliance, data privacy, and controlling data movement, particularly in light of increasing data breaches and cyber threats. Additionally, it outlines the importance of a data-first approach and the integration of AI and Zero Trust principles to enhance data security across various platforms.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views53 pages

Data Security Everywhere Executive Pitch - Ext

The document discusses the evolution of data protection, emphasizing the shift from network security to a focus on data as a central asset in the age of AI and compliance. It highlights the critical capabilities needed for data security, including regulatory compliance, data privacy, and controlling data movement, particularly in light of increasing data breaches and cyber threats. Additionally, it outlines the importance of a data-first approach and the integration of AI and Zero Trust principles to enhance data security across various platforms.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 53

Data Security Everywhere

Stay Secure, Stay Compliant, Stay Mobile

Public © 2024 Forcepoint 1


Evolution of Data Protection

Data as a Central Asset: The Age of AI-Driven Security and the Rise of
Data as a By-Product of Network Security Compliance and Regulation Behavioral Analytics

Focus: Network perimeter - Access Focus: Regulatory Compliance and Data Focus: Behavioral Analytics and Context-
Control, Firewalls, Password Protection Governance Aware Protection

Threats: Malware Threats: Insider threats and targeted Threats: AI-powered attacks, Deepfakes,
attacks (APTs) Data Breaches, Malware, Social
Engineering, Cloud misconfigurations
"Data is the new currency. It has its value, its worth, and it can be
used to drive economies, businesses, and technology.”
1980s - Early 1990s Mid 1990s - Early 2000s 2000s – 2010s 2010s Late 2010s - Present
Erik Qualman, Author of Socialnomics

The Rise of Data Protection - Birth of Cloud and Mobile Transformation: Data in a
Encryption and DLP Borderless World

Focus: Data Integrity and Encryption Focus: Securing Data Beyond the Perimeter

Threats: Phishing, Email-based Threats, Threats: Cloud vulnerabilities, Data


Web Application Vulnerabilities breaches, Ransomware

Increasing Importance of Data

© 2024 Forcepoint 2
Securing Data at its Core
When all else fails, a robust data
security measure can still help
Perimeter Security protect valuable data assets and
mitigate the impact of security
incidents/breaches.​
Network Security

Application Security

Endpoint Security
Sensitive Data
Data Security
PII IP
PHI CGD
PCI Legal

© 2024 Forcepoint 3
AI Transformation is changing everything—and raising questions—even more than Digital Transformation

You need access to GenAI,


but how do you keep your data safe?

Data is crucial in the age of AI

How do you seamlessly enforce


data security everywhere?
(GenAI, SaaS apps, web, endpoints, email, your own apps, etc.)

Public © 2024 Forcepoint 4


Data Security Critical Capabilities

Regulatory Compliance
What are the rulesets

Data Privacy vs Data Security


What is the difference

Controlling the Data Movement


Controls to mitigate the risks

© 2025 Forcepoint 5
Regulatory
Compliance

6
Data Security is now a business imperative UNITED NATIONS

U N C TA D

Legislation

71% 9% 15% 5%
Yes Drafted None unknown

137 out of 194 countries have implemented data privacy legislation

© 2024 Forcepoint 7
Cyber & Data Privacy Regulation in Indonesia (2/2)
Cyber & Data Cyber Cyber & Data
Financial Services Authority Regulation No.11 / POJK.03 / Financial Services Authority Letter No. Financial Service Authority Regulation No. 22
2022 Regarding Implementation of Information Technology 29/SEOJK.03/2022 Year 2023
by Commercial Banks Concerning Commercial Bank Cyber ​Security and
Resilience Mentioning about consumer protection in Financial
Article 21
Industry including needs to implement Data Protection
(1) Banks must maintain cyber resilience.
and Privacy for Banks
(2) To maintain cyber resilience as referred to in paragraph Banks are required to conduct periodic cyber maturity
(1), the Bank shall process at least: assessments, using the following methods:
a. identification of assets, threats, and vulnerabilities; Cybersecurity built-in risk assessment Cyber & Data
b. asset protection; Assessment of cybersecurity risk management Central Bank of Indonesia Governor Regulation
c. cyber incident detection; and implementation
No. 20 Year 2023
D. Cyber Incident Response and Recovery Cybersecurity governance
Cyber risk management framework
Article 30 (4c) Cyber risk management process Mentioning about consumer protection including needs
The risk management process of using an IT Service provider Cyber risk control system to implement Data Protection and Privacy for Banks
includes: Assessment of cybersecurity resilience process
c. Determination and monitoring of compliance with data implementation AI Ethics
and/or information security requirements in internal policies Banks are required to conduct periodic security testing
and procedures and in cooperation agreements. using the following methods: Circular Letter Ministry of Communication and
Vulnerability assessment and penetration testing (VAPT) Information No. 9 / 2023
Additional Article 30 (4c): Scenario-based testing
Examples of the scope of data and/or information security Banks are required to report cybersecurity incidents to Implement 9 (nine) AI Ethics principle when implement
required by the Bank are as follows: OJK and build AI System.
1. information security at the organization; Banks are required to establish independent
2. access management; cybersecurity functions AI Ethics
3. encryption and password management; First shipment: by the end of June 2023
4. security and network operation; • Next year: no later than 15 (fifteen) working days after Code of Ethics in Financial Industry by Financial
5. Application Programming Interface (API); the end of the reporting year Service Authority (OJK)
6. data location; and
7. confidentiality of personal data of Bank customers
Implement 5 (Five) AI Ethics principle when implement
and build AI system in Financial Industry.

Source: Deloitte, 2024


Cyber & Data Privacy Regulation in Indonesia (1/2)
Ministry of Communication and Information (MOCI), Central Bank (BI) and Financial Authorities (OJK) are
starting to pay a lot of attention due to recent data breaches, here are the Cyber ​and Data Privacy Regulations
released in the last 2 year.
Personal Data Protection Law (Law No.27/2022)

Article 16 (2e)
The processing of personal data is carried out by protecting the security of personal data from unauthorized access, unauthorized disclosure, unauthorized modification, misuse, destruction
and/or loss of personal data.

Article 35
The personal data controller is obliged to protect and guarantee the security of the personal data processed, by undertaking:
a. preparation and implementation of operational and technical measures to protect personal data that are contrary to the provisions of laws and regulations; and
b. determine the level of security of personal data taking into account the nature and risks of personal data to be protected in the processing of personal data

Article 38
The personal data controller is obliged to protect the personal data from unauthorized processing

Article 39
1) The personal data controller is obliged to prevent personal data from being accessed unlawfully
2) Prevention as referred to in paragraph 1 is carried out by using a security system for the processing of personal data and/or processing of personal data using a reliable, secure, and
responsible electronic system
3) Prevention as referred to in paragraph 2 shall be carried out in accordance with the provisions of laws and regulations

Draft Government Regulation of the Republic of Indonesia


Competency of National Standards of Personal Data Protection Officers
Year Number
related to Law Number 27 of 2022
About
about
Implementing Regulation of Law Number 27 of 2022
Personal Data Protection (PDP)
on Personal Data Protection (PDP)
Released in June 2023
Released on August 31, 2023

Source: Deloitte, 2024


Administrative Sanctions (Chapter VIII)

• Controllers and Processors who violate their obligations are subject to administrative sanctions.
• Mandatory articles and Administrative sanctions

Administrative Sanctions (Chapter VII) Criminal Sanctions (Chapter XIV)

Article 57 point 1 Article 67

Violation of the provisions of Article 20 point (1), Article 21, Article 24, Article 25 point (2), Article
Any Person who intentionally and unlawfully obtains or collects Personal Data that does not belong
26 point (3), Article 27, Article 28, Article 29, Article 30, Article 31, Article 32 point (1), Article 33,
to him with the intention of benefiting himself or others which may result in the loss of the Personal
Article 34 point (1), Article 35, Article 36, Article 37, Article 38, Article 39 point (1), Article 40
Data Subject as referred to in Article 65 point (1) shall be punished with a maximum imprisonment
point (1), Article 41 point (1) and point (3), Article 42 point (1), Article 43 point (1), Article 44
of 5 (five) years and/or a maximum fine of Rp5,000,000,000.00 (five billion rupiah).
point (1), Article 45, Article 46 point (1) and point (3), Article 47, Article 48 point (1), Article 49,
Any Person who intentionally and unlawfully discloses Personal Data that does not belong to him
Article 51 point (1) and point (5), Article 52, Article 53 point (1), Article 55 point (2), and Article 56
as referred to in Article 65 point (2) shall be punished with a maximum imprisonment of 4 (four)
point (2) to point (4) are subject to administrative sanctions.
years and/or a maximum fine of Rp4,000,000,000.00 (four billion rupiah).
1. Any Person who intentionally and unlawfully uses Personal Data that does not belong to him
as referred to in Article 65 point (3) shall be punished with a maximum imprisonment of 5
Article 57 point 2 Article 57 point 4
(five) years and/or a maximum fine of Rp5,000,000,000.00 (five billion rupiah).

Administrative sanctions as referred to in point (1) The imposition of administrative


are in the form of: sanctions as referred to in point (2) is
given by the institution.
written warnings;
temporary cessation of Personal Data processing Article 57 point 5 Article 68
activities;
erasure or destruction of Personal Data; and/or
Further provisions regarding the Any Person who intentionally creates false Personal Data or falsifies Personal Data with the intention
a. administrative fines.
procedure for imposing administrative of benefiting himself or others that may cause harm to others as referred to in Article 66 shall be
sanctions as referred to in point (3) are punished with a maximum imprisonment of 6 (six) years and/or a maximum fine of
Article 57 point 3 regulated in a Government Regulation. Rp6,000,000,000.00 (six billion rupiah).

Administrative sanctions in the form of administrative


fines as referred to in point (2) letter d are not higher Article 69
than 2 (two) percent of annual income or annual
receipts for variable violations. In addition to being sentenced to a criminal offense as referred to in Article 67 and Article 68, additional penalties can also be sentenced in the
Reference: Law Number 27 of 2022 about Personal Data Protection form of deprivation of profits and/or property obtained or the results of criminal acts and payment of compensation.
Source: Deloitte, 2024
Privacy vs Security

11
Data Protection vs Data Privacy

Privacy under Supreme Law "Everyone has the right to personal protection, family, honor, dignity and property under his
control, and has the right to a sense of security and protection from the threat of fear to do or
(UUD 1945) not do something which is a human right."

Source : The 1945 Constitution of the Republic of Indonesia Article 28 G Paragraph 1


Data Protection
“Security ≠ Privacy”
”Data protection keeping data secure
from unauthorized access.”
Data Protection Data Privacy

Source : General Data Protection Regulation (GDPR) • Data Security • Approval


• Data Loss Prevention • Transparency
Data Privacy (DLP) Personal Data:
• Relevance
Accuracy /
• Security Information & Integrity • Proportionalities
“Personal Data Protection is the entire Event Management (SIEM)
effort to protect Personal Data in the series Availability • Sensitivity
• Data Encryption
of Data Processing in order to guarantee Accountability
constitutional rights of a Personal Data • Content Limit
subject."

Source : Law Number 27 of 2022 about Personal Data Protection Article 1


Paragraph 2

Source: Deloitte, 2024


The Need for Control

13
Organizations are being pressured to transform more than ever before

Apps &
Intellectual property, Regulated data
Data
Data Is Everywhere

Who should have access?


Why?
Internet
What should they be allowed to
On-prem
do?
Where?

People
Employees, contractors, suppliers, partners, customers
People Work Anywhere

Today, people work anywhere with data everywhere


Public © 2024 Forcepoint 14
How Can We Help?

Public 18
Sensitive data is now outside and exposed

Web Generative AI Unmanaged SaaS Managed SaaS Private Apps Datacenter Email

Managed Unmanaged Corporate/HQ Branch Office IoT Factory

© 2024 Forcepoint 19
Public
Our DLP Capabilities – 1600+ Prebuilt

Structured and Unstructured data, can ingest directly from


PreciseID Fingerprinting databases, documents, spreadsheets, etc. and provides high
confidence detection for even small subsets of data leaving an
organization

Unstructured data, registered and learned automatically by providing


Machine Learning DLP with both positive and negative samples of content, e.g., drawings,
ses

code, etc.
rea

300+ predefined available in various languages. Intelligent data type


NLP Scripts detection based on described content with contextual helpers for
Inc

accuracy
Meta-Data (Files, Emails, etc) , integrated with Microsoft
acy

Classification Labels Purview Information Protection, Forcepoint Data Classification


and others. Supports any file labelling and classification tool
cur
Ac

Over 900 file types detected based on true file type to identify
File-Types all file types regardless of if they are renamed to avoid
detection

Perl based regular expressions to provide


Regular Expressions wide, deep and accurate detection of
content

Over 1,000 pre-defined regulatory and


Keywords/Phrases compliance keyword, phrase and dictionary-
based detections

Public 20
We bring data security and networking together to eliminate gaps & redundancies

Data Security

Data
Policies
Data-first Approach
Convergence Network
Policies

SSE / SASE

Public © 2024 Forcepoint 21


One set of policies, powered by AI and Zero Trust, enforced everywhere

Cloud Apps

Web

Private Apps
Data
Policies

Network
Custom Apps Data Security Everywhere
Policies

Storage Empowering people to work anywhere,


with data everywhere

Email

Data-first SASE
Architecture
Endpoints

Public © 2024 Forcepoint 22


Forcepoint Enterprise DLP

Control all customer data with one single policy


Replace broad, sweeping rules with individualized, adaptive
data security that doesn’t slow down our customer's
employees. Block actions only where you need to, and drive
productivity
Simplify compliance with predefined policies

View and control all of the customer's data with the industry's largest
pre-defined policy library. Ensure regulatory compliance across 80+
countries for GDPR, CCPA and more. Deploy data classification with
Boldon James and Azure Information Protection.

Protect critical intellectual property with unsurpassed accuracy

Protect PII and PHI, company financials, trade secrets, credit card data,
and other pieces of sensitive customer data-even in images. Follow
intellectual property (IP) in both structured and unstructured forms and
stop low & slow data theft even when user devices are off-network.

Prevent data breaches automatically

Automatically block actions based


on an individual user's risk level with
Risk-adaptive data protection.

Public 23
Predefined Classifiers

Public
Public
Securing the data core across multiple channels

Endpoint and Email Web Proxy Remote Browser Isolation

DLP Policies
managed by FSM

Forcepoint Security Manager

Isolated Container
Forcepoint MTA DLP

Pixel Stream (Secure Streaming)


Reputation
Anti- Analysis Behavioral HTML/CSS (Secure Rendering)
Malware Sandboxing

Mail Flow Rules Smart Isolation


URL Anti-Spam/
Classification ACE Phishing

Real-time Real-time
Forcepoint Remote
Security Data
Browser Isolation
Classification Classification
Real-time
Internet Content
Classification

Outbound email

Endpoint Endpoint Endpoint Endpoint Endpoint Endpoint Endpoint Endpoint Endpoint

Public
What is the Future of Data Security?

Cloud Native and Hybrid DLP Privacy and Compliance Driven DLP Real-Time and Context-Aware DLP

• Protects data across hybrid • Granular compliance features • Contextual decision making: Makes
environments • Adherence to Global regulatory decisions based on users’ activities
• Protection regardless of where data requirements • Automated policy enforcement
resides (on-premise, cloud, endpoint) • Compliance reporting • Real-time responses to Data Breaches
and Exfiltration attempts

AI Powered, Autonomous DLP Integrated, Cross Channel DLP Zero Trust DLP Platform

• Reduce reliance on pre-set rules • Unified security ecosystem for • Behavioural analytics
• Learn and Adapt based on patterns of comprehensive and automated • Risk-based access controls,
normal behavior protection • Identity-driven policies
• More effective at detecting anomalous • Consistent data security protection
actions across ALL channels
• AI driven content recognition and
classification

Public © 2024 Forcepoint 26


A Full Lifecycle Approach for Enabling Data Security Everywhere

Discover Prioritize Monitor

Classify Protect

GenA SaaS Endpoint We Emai Custom


One policy, enforced everywhere I Apps s b l Apps

Ongoing Visibility Real-time Control

Public © 2024 Forcepoint 27


Forcepoint Data Security Posture
Management
powered by Getvisibility

Public © 2025 Forcepoint 31


Public © 2024 Forcepoint
Modernize with Data Security Posture Management (DSPM)
AI-powered automation across the whole data security lifecycle

Discover where your sensitive data resides

Classify data to make policies and reporting consistent

Prioritize where to focus data security efforts the most

Protect intellectual property and regulated data everywhere

Monitor risk to data to dynamically adapt policies


AI-powered Data Security
Posture Management (DSPM)

Public © 2024 Forcepoint 33


DSPM provides visibility and control to prevent data risks—proactively

Discover Prioritize Monitor

Classify Protect

Data Security Posture Management Data Loss Risk-Adaptive


Prevention (DLP) Protection
(DSPM) and (RAP)
Secure Service Edge
(SSE)

Where What Who How


See (and fix) redundant, obsolete & Understand and differentiate data to Ensure that data has the right access Control the way that people get to
trivial (ROT) copies of data in the define and automate security policies permissions so that the only the right and use sensitive data
cloud, on-prem, and endpoints more accurately, more efficiently people can use it

Public © 2024 Forcepoint 34


Forcepoint DSPM
AI-powered data discovery and classification with real-time risk reporting and remediation orchestration

Fast, comprehensive AI-powered


discovery data classification
In the cloud (Amazon, Microsoft, Powered by a highly trained
Google) and on-prem; scan 50‑dimensional model that also
~1M files per hour learns as it goes

Real-time monitoring Automated


and risk assessment remediation
Check access permissions Fix many data risks in
and other data risks in near near real-time without costly
real‑time add‑ons

Workflow orchestration
Track data ownership and accountability to ensure actions taken are aligned
with the responsibilities of each stakeholder

Public © 2024 Forcepoint 35


Large Financial Institution – needing total view into their data to prevent further breaches.

Challenges
• Stop leakage of sensitive data from employee’s mailboxes. Breach had already taken place showing their email to be a
large point of potential exfiltration.

Approach
• Use Forcepoint Data Visibility to do a major scan before legal was to get involved.
• 5 days to scan across 2.5TB of raw data, 9 million emails with attachments in 5 different languages.

Results
• Completed total scan of 2.5TB in just 2 ½ days!
• Were able to identify sensitive email content and remove sensitive data.
• Just one email had bank account details and screenshots of bank statements covering billions of dollars.

Public
Modernize and automate the data security lifecycle with AI-powered DSPM technologies

Increase Productivity

Enable faster, safer data access and sharing for better innovation & collaboration

Cut Costs

Automate to save time/resources on investigations & remediation; save on cyber insurance

Reduce Risk

Prevent breaches by uncovering and fixing sensitive data misuse

Streamline Compliance

Gain true visibility and control over sensitive data throughout your organization

Public © 2024 Forcepoint 37


Understand your data better

Public © 2025 Forcepoint 38


Advanced Classification
DSPM contextualizes your data

Public © 2024 Forcepoint


Public © 2024 Forcepoint
USE CASE 1 Data Discovery and Classification

Public © 2024 Forcepoint


© 2024 Forcepoint
USE CASE 2 Risk Analysis

Public © 2024 Forcepoint


USE CASE 3 Data Controls & Workflows

Public © 2024 Forcepoint


Get started with a Forcepoint Data Risk Assessment (DRA)

Scan in your own environment

Forcepoint-certified personnel analyze scans, produce report

Highlights key issues


• Data assets
• Risk Impact
• Shadow data
• Overexposed data
• Over-privileged users
• Unprotected data
• Data sovereignty

See for yourself how Forcepoint DSPM helps you


See. Secure. Simplify.

Public © 2024 Forcepoint 44


Dynamic User
Protection Overview

Public © 2024 Forcepoint 45


Dynamic User Protection Components (GA)

Neo
Agent

DUP “Neo” Agent Cloud Management Console Indicators of Behavior (IOB’s)

<30 second install, automatic SAAS delivery of tenant Forcepoint’s innovative


updates management, investigation, approach to behavioral
 On & off network continuous and reporting console. analytics.
enforcement Future versions will include Assesses user behavior and
 Risk scoring & transport for deep forensic investigation DLP incidents to provide real-
time risk scoring at the end
DLP & CSG capabilities and other
point.
 Significant footprint & enhancements.
Powers DLP action plan
performance improvements triggers in version one of DUP

Forcepoint Public
Public
Context and Risk Aware Data Protection

Forcepoint Cloud

Access patterns

Users
N
D
L
P
D
U
P
DLP Incidents + IOBs
DUP Usage & C
IdaaS
E A
O
Unified
Behavioral Data Activity
S SaaS Apps
B
Agent
Analytics Sentiment Messaging

IOB examples

Incidents
• Hoarding large amounts of data

DLP
• Syncing agent to personal cloud Risk Score
• Frequently coping files to USB
• Active on job hunting sites
• Suspicious app transfers DLP as a Service

Email
Web CASB
Cloud

Public
Use Case Example

1. Neo end point facilitates visibility into user


behavior

2. IOB’s provide meaningful analysis of user risk


IOBs
3. Integration between DUP and Forcepoint DLP
provide real-time adjustment of action plans based
on user risk

BLOCK

ENCRYPT
CONFIRM

Automated DLP Action Plans

Public
Risk-Adaptive Protection
Automate insights/enforcement with contextual security—boost productivity & simplify operations

Risk Score 90-100 Block All ▼ 90 Block All


Enforce without false positives
Risk Score 70-89 USB file encryption ▼ Uploads to
personal Dropbox
Risk Score 40-69 Audit and Confirm ▼

Risk Score 1-39 Audit only ▼


65 Audit and Confirm
coach people to avoid incidents
Risk Score 0 Audit without Forensics ▼
Captures
screen image

20 Audit only

Working
normally

Risk-based Policies Risk Score User Actions Accurate Protection

Make digital security more like the real world Zero Trust Continuous Monitoring Focus on highest risk

Public © 2025 Forcepoint 49


Security doesn’t have to be difficult
5 Steps to Data Security Everywhere

AI-powered discovery,
classification, orchestration Risk-Adaptive Protection

Security. Simplified.
Cloud Web

DLP CASB* DLP Email


SWG
No Agent
DLP Email
DLP Endpoint BYOD
Managed
Device
BYOD Connector
on-site

Server Apps
Cloud Apps + Endpoint +
BYOD Web Email

*Add ZTNA to replace VPNs for accessing private ‘cloud’ apps

Public Learn More » Skip Ahead » © 2024 Forcepoint 55


Simplify data security across cloud apps and endpoint devices
One set of policies, one console

Cloud
Bring enterprise-class DLP (1700+ built-in policies) wherever needed

Extend traditional endpoint DLP to the cloud or DLP CASB*


modern cloud-first data security to the endpoint

Migrate managed device agents to a universal app


DLP Endpoint BYOD
Eliminate need for multiple systems, manual syncing

Cloud Apps + Endpoint + BYOD

*Add ZTNA to replace VPNs for accessing private ‘cloud’ apps

Public 5 Steps » Skip Ahead » © 2024 Forcepoint 56


Modernize with Data Security Posture Management (DSPM)
AI-powered automation for discovery, classification, orchestration

Discover where your sensitive data resides

Classify data to make policies and reporting consistent

Prioritize where to focus data security efforts the most

Protect intellectual property and regulated data everywhere

Monitor risk to data to dynamically adapt policies


AI-powered discovery,
classification, orchestration

Public 5 Steps » Skip Ahead » © 2024 Forcepoint 57


Take security to the next level with Risk-Adaptive Protection
Automation that use Zero Trust to make digital security work more like the real world

Give people access to the data you trust them to use

Continuously monitor for risky behavior

If people make mistakes or show poor judgement, dynamically


narrow the ‘guardrails’, increase logging, adapt

Focus harshest actions (blocking) on people who pose the most risk—
without causing problems for everyone else

Risk-Adaptive Protection

Pioneered by Forcepoint

Public 5 Steps » Skip Ahead » © 2024 Forcepoint 58


Control website uploads/downloads by people, server apps, IoT, and more
Web security that’s close to people and data: cloud | network | endpoint

Keep sensitive data in, malware out


Web
Use same policies, dashboards everywhere: cloud | network | endpoint

Safeguard managed & agentless devices (Wi-Fi, BYOD, IoT) DLP SWG
• Enforce in cloud or at network edge
No Agent
Go direct for more efficient bandwidth, location-aware apps
• Enforce on endpoint (up to 2X faster) or at network edge Managed BYOD
Device on-site

Inspect data uploaded from server apps to web storage Server Apps
Web

Public 5 Steps » Skip Ahead » © 2024 Forcepoint 59


Prevent the #1 form of data theft: unauthorized email contents
Security that’s easy to deploy in minutes

Control what can be emailed out of your organization


Email
Complement in-bound threat protection solutions

Apply same data security policies, dashboards everywhere Email


DLP
Connector
Manage incidents in same console

Email

Public 5 Steps » Skip Ahead » © 2024 Forcepoint 60


The Forrester Wave™: Data Security Platforms, Q1 2023
Forcepoint recognized as a “Leader”

“Forcepoint delivers on a data-centric approach for Zero Trust.


Forcepoint offers a range of capabilities for data classification, DLP, insider
threat, encryption, and more. The market is now seeing the impact of its
2021 acquisition by private equity firm Francisco Partners and its new
leadership. The influx of capital and operational expertise is reflected in its
strong execution roadmap, and its investment in talent, strategy, and
product is yielding results.”

“Organizations seeking a strong technology partner for


enabling a Zero Trust approach and risk-adaptive data
security controls should consider Forcepoint."

The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave™ are trademarks of Forrester Research,
Inc. The Forrester Wave™ is a graphical representation of Forrester’s call on a market and is plotted using a detailed spreadsheet with
exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester
Wave™. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.

Public Download Report » © 2024 Forcepoint 62


Forcepoint does Data Security Everywhere better than anybody else

Recognized Industry Firsts Expansive Protection


Leader in Forrester Wave Data-First SASE platform Broadest enforcement channels
for Data Security Platforms (integrated CASB, SWG, ZTNA with DLP, malware
defenses, distributed enforcement)
APIs for adding to custom apps
Visionary in first Gartner Single- Risk-Adaptive Protection
Vendor SASE Magic Quadrant Comprehensive threat protection
Secure SD-WAN

Easy to Use AI-Powered Unparalleled Accuracy


1700+ built-in policies AI-based classification, prioritization, Detection of 900+ file types
orchestration
Integrated into SSE/SASE gateways ML-based content recognition
Pathway to DSPM
Single-pane management of policies Structured & unstructured data
and incidents

Public © 2024 Forcepoint 63


Impact of unified Data Security Everywhere over maintaining fragmented products

up to

31% *
91% *
$600k /year**
Improvement customers estimate that Customers who felt one platform for DLP IT savings from not buying/maintaining a
unified DLP policies would have on: policies across cloud, web, private apps second data security solution, recreating
would improve overall data security policies, or reconciling gaps
Reduced Complexity, Staff Productivity,
Reduced Reporting Effort plus, gains from
Increased Productivity for Users
(hours per month * number of users)

*IDC White Paper, sponsored by Forcepoint, The Quest for a Single Set of Unified DLP Policies, IDC #US51335023, Jan 2024 **$100k license + 4 admins * ($25k policy recreation + $100k incident management)

Public Download Report » © 2024 Forcepoint 64


Empower your people and your business with Forcepoint

Increase Cut
Productivity Costs

Data Security Everywhere


AI | Zero Trust | DSPM | Risk-Adaptive | DLP | Email | CASB | ZTNA | SWG | RBI | CDR | SD-WAN

Reduce Streamline
Risk Compliance

Public © 2024 Forcepoint 65

You might also like