site-logo
Updated on :
Forcepoint DLP - Data Loss Prevention (DLP) Software

Forcepoint DLP

Prevent your data from getting lost or theft

(12 ratings)

Forcepoint DLP offers custom pricing plan

8.0/10

Spot Score

Overview of Forcepoint DLP

What is Forcepoint DLP ?

Forcepoint DLP is flexible design fully integrates with technology to lock out attackers and proactively protect data from multiple internal and external threats. It prevents sensitive information from being transferred outside a network, used where it shouldn't be, or copied ... Read More

API not available
fire
Free Trial available

Forcepoint DLP Platforms

  • Browser Based (Cloud)

Forcepoint DLP Customer Type

  • Large Enterprises
  • Medium Business
  • Small Business

Forcepoint DLP Features

Show All

Pricing of Forcepoint DLP

  • Free Trial,
  • Quotation Based

Forcepoint DLP Alternatives

7.2/10

Spot Score

Code42 DLP - Data Loss Prevention (DLP) Software

Code42 DLP

Data Loss Prevention (DLP) Software

Proactive insider risk management, file backup and...

Forcepoint DLP Customers

Toyota-logo

Toyota

BNP Paribas-logo

BNP Paribas

Delta-logo

Delta

3M-logo

3M

Bancolombia-logo

Bancolombia

Forcepoint DLP FAQs

Forcepoint DLP is a Data Loss Prevention (DLP) Software. Forcepoint DLP offers the following functionalities:
  • Policy Management
  • Incident Management
  • Sensitive Data Identification
  • Data Leak Detection
Read More
Here's a list of the best alternatives for Forcepoint DLP
No, Forcepoint DLP doesn't provide API.
No, Forcepoint DLP doesn’t provide mobile app.
Forcepoint DLP is located in Austin, Texas
Forcepoint DLP offers Free Trial, Quotation Based pricing models
We don't have information regarding integrations of the Forcepoint DLP as of now.

Forcepoint DLP Support

Contact

1-858-320-8000

Customer Service

Online

Location

Austin, Texas

Read More about Forcepoint DLP

Forcepoint DLP is flexible design fully integrates with technology to lock out attackers and proactively protect data from multiple internal and external threats. It prevents sensitive information from being transferred outside a network, used where it shouldn't be, or copied by untrusted users. And it provides alerts that tell user when a policy has been violated so they can take action and reduce the risk of data loss.

Disclaimer: This research has been collated from a variety of authoritative sources. We welcome your feedback at [email protected].

Researched by Rajat Gupta