Getting started
Forcepoint Data Security Posture Management (Forcepoint DSPM) allows organizations to locate and classify sensitive data across data stores, assess the risks associated with this data’s exposure based on its sensitivity, and implement access controls to the data.
Key components
Forcepoint DSPM has the following features:
Sizing
Server sizing indicates the utilization of Forcepoint DSPM.
Installation
Estimate hardware capacity needs
A VM or server with the following specifications:
Pattern matching
The pattern matching functionality allows users to identify particular pieces of information in a document. This is implemented by using Regular Expressions (RegEx) that will try match content.
Data Controls
Data Controls enable organizations to apply security and compliance conditions on the data assets in their systems and apply actions on those rules when they are identified.
Analytics
Detailed description on dashboard widgets.
Detectors
Detector are features that allow users to set up alerts for certain parameters during a classification search. A user can set up a Detector to search for keywords within the entire contents of a document or file and search for keyword hits within the file's pathname.
Security Posture Policies
Security Posture Policies is a critical element of data governance within an organization. It involves creating a detailed representation of the data assets managed by different departments or business units.
Import custom TLS certificate
GQL Quick Guide
Basic information on the Getvisibility Query Language.
Critical & Sensitive Classification Attribute Modification
Where to find the risk calculation rules.
How to Check AI Mesh Version
Webhooks
How to configure a Webhook.
AI Mesh Overview
Forcepoint offers cybersecurity AI products, specifically aimed at Forcepoint DSPM. In a broader sense, we also provide solutions for Data Governance. Our flagship product, Forcepoint DSPM, is a sophisticated file classification pipeline.
Keycloak configuration
Describes how to complete the Keycloak installation setup.
Single Sign-on (SSO)
The platform supports a wide range of Single Sign-On (SSO) protocols and providers, enabling seamless authentication across various services and applications. Here are the primary SSO protocols and some of the identity providers that Keycloak can integrate with:
Keycloak User Federation Configuration (LDAP/AD)
How to configure a User Federation in Keycloak.
Enable 2FA
Two-factor authentication (2FA) enhances security by requiring users to provide two forms of identification before they are granted access. This method adds a layer of protection to the standard username and password method, making it significantly more challenging for potential intruders to gain unauthorized access.
Role-Based Access Control (RBAC)
Keycloak User Federation using LDAP over SSL
To configure it, we need to use gv-essentials from gv-essentials: 4.5.51 as the minimum version, with Keycloak settings enabled as shown below.
Configuring Taxonomies & Labels
How to define a custom taxonomy.
GQL
GQL (Getvisibility Query Language) is a query language designed to enhance the flexibility and efficiency of querying data through the Forcepoint DSPM platform. It enables users to craft custom queries without the need for hard coding, significantly simplifying the process of filtering through and analyzing data.
Template Language
Template Language (GTL) allows using variables, functions and conditions in any report text input fields and compiles those expressions into resulting values.
Multi-Language Machine Learning
SIEM Integration
Google Drive Auto-labelling
Configure detectors
Configure data sources
Scanning
Scanning process and statuses
Streaming
Enterprise Search columns meaning
This guide will explain the features available from the files Explore page on the Forcepoint DSPM platform.
Supported file types
Forcepoint DSPM can scan the following file types:
Glossary
FAQ