Forcepoint Data Security Cloud | DLP policies enable monitoring and control of the flow of sensitive data throughout an organization.
Policy elements are the building blocks which include the resources and classifiers.
Forcepoint Data Security Cloud | DLP secures your data everywhere. The Data Loss Prevention (DLP) application prevents sensitive data exfiltration across cloud, web, email, and endpoint. Policies and incidents are managed from a single platform hosted in the cloud.
Details of new and updated features, as well as resolved and known issues.
Forcepoint Data Security Cloud is the common management portal for all Forcepoint offered services.
The Getting Started section, has links to download the endpoint agent. Before you bring highlights important ore-requisites that must be addressed before attempting to install the agent while the Quick links section has direct links to important sections in online help.
Dashboards provide overview on Users, Endpoints, and Devices.
Investigation tab displays a list of all your end-users, alerts or devices allowing you to view and filter related activities to drill down for further information.
Endpoint management enables organizations to centrally manage all their related endpoints through the a single portal, streamlining management and ensuring consistent security throughout the organization.
Data protection comes with a rich set of predefined policies that cover the data requirements for a wide variety of organizations. Policies can be customized to meet an organization's specific needs, ensuring that sensitive data is always protected from unauthorized access, use, and disclosure.
Device control is a measure of protection that restricts user access to removable storage devices.
Using the User activity monitoring tab, administrators can customize the IOBs (modify the IoB predefined severity and exclude or include certain users and groups).
Resources collectively define the data sources and destinations, endpoint device or application used, or policy action to take when a violation is detected (permit and audit, confirm or block).
Policies use content classifiers to describe the data that is being protected. Content can be classified according to file properties, file labeling, key phrases, regular expression (regex) patterns, and dictionaries. Administrators can access the Classifiers in the cloud portal by navigating to Policy > Policy Elements > Classifiers.
The Settings dashboard has configuration settings for the email connector, audits logs, and other settings for amazon web service provider.