Forcepoint’s mission is to foster safe and trusting environments through a comprehensive security solution that understands digital identities and their cyber behaviors to protect employees and critical data everywhere. Forcepoint achieves this mission by simplifying security for global businesses and governments. The company’s all-in-one, truly cloud-native platform makes it easy to adopt Zero Trust, Security Service Edge (SSE), and Secure Access Service Edge (SASE), by preventing the theft or loss of sensitive data and intellectual property no matter where people are working. Rather than offering a static one-size fits all approach, Forcepoint solutions inherently understand how people interact with data, providing secure access while enabling employees to create value. Forcepoint creates safe, trusted environments for customers and their employees to achieve their highest potential while reducing risk.
Do You Manage Peer Insights at Forcepoint?
Access Vendor Portal to update and manage your profile.
The standout feature is the use of Machine Learning (ML) for classification. Instead of just looking for a 16-digit number (which could be a credit card or just a serial number), Forcepoint DSPM understands the context of the document. It can distinguish between a legal contract, a financial statement, and a casual email with much higher precision than manual tagging. In modern hybrid environments, developers often spin up RDS instances or S3 buckets that the security team doesn't know about. I like how Forcepoint DSPM automatically discovers these unmanaged data stores. It shows you data you didn't even know you had, which is usually where the biggest risks lie.
nothing is functioning as expected
Forcepoint DPSM stands out for its capacity to turn dark data into actionable security insights by infusing unparalleled categorization precision with automated remediation
What do you dislike most about the product or service? The primary pain point isn't the technology itself, but the Initial Noise and Tuning Phase. Resource Intensity during Scanning: When you first point a DSPM tool at massive, unstructured data lakes or legacy on-premise file shares, the initial discovery phase can be heavy on network and CPU resources. It requires careful scheduling. The False Discovery of Context: While the AI is advanced, it can still struggle with highly industry-specific jargon that hasn't been fed into its training model yet. You might find Internal Confidential tags on documents that are actually public-facing templates. Complex Licensing: Like many enterprise security products, the transition from the legacy Forcepoint DLP modules to the new DSPM/Data Security Everywhere suite can be commercially confusing. Understanding exactly which connectors are included versus add-ons takes time.
the product is not ready to go live
1. For on premise air gapped environment, you rely on a single host to scan vs setting up multiple scanners to report to main console. 2. Updating license on premise in air gapped does require you run a command each time for reinstall of charts vs plugging new license key into web UI. 3. Importing cert for air gapped deployment requires a specific tool ran for creating cert, requires a command line and reinstall of charts and restart of service vs a web UI to upload.