Forcepoint ONE Data Security policies enable monitoring and control of the flow of sensitive data throughout an organization.
Data protection comes with a rich set of predefined policies that cover the data requirements for a wide variety of organizations. Policies can be customized to meet an organization's specific needs, ensuring that sensitive data is always protected from unauthorized access, use, and disclosure.
Forcepoint ONE Data Security includes hundreds of predefined policies and content classifiers. Predefined policies help administrators quickly and easily define what type of content is considered a security breach at their organization.
Forcepoint provides a rich set of predefined policies.
Forcepoint ONE Data Security secures your data everywhere. It prevents sensitive data exfiltration across cloud, web, email, and endpoint with DLP (SaaS). Policies and incidents are managed from a single platform hosted in the cloud.
Details of new and updated features, as well as known issues.
Signing into the management portal with multi-factor authentication ensures that your account remains secure.
The Getting Started section, has links to download the agent, links to sections in documentation to get you started using Forcepoint ONE Data Security, and Before you begin information.
Dashboards provide overview on Users, Endpoints, and Devices.
Investigation tab displays a list of all your end-users, alerts or devices allowing you to view and filter related activities to drill down for further information.
Endpoint management enables organizations to centrally manage all their related endpoints through the a single portal, streamlining management and ensuring consistent security throughout the organization.
Manage global settings that apply to all Data Protection policies.
Policies created previously can be edited later on.
Policies created and enabled previously can be disabled later if required.
Policies that were added previously can be deleted.
Predefined policies provide a rich set of policy templates that cover the data requirements for a wide variety of organizational needs.
Display selected category of Predefined Policies using the Filter.
On initial deployment, you can use the Predefined Policy Filter to enable certain policies for your industry.
Custom Policies allow administrators to setup policies as per their specific organizational needs.
Device control is a measure of protection that restricts user access to removable storage devices.
Using the User activity monitoring tab, administrators can customize the IOBs (modify the IoB predefined severity and exclude or include certain users and groups).
Policy elements are the building blocks which include the resources and classifiers.
The Settings dashboard has configuration settings for the email connector, audits logs, and other settings for amazon web service provider.