Explore Our Forcepoint DLP Pricing Options
Endpoint
DLP
Cloud-native DLP
Fast deployment, no
hardware required
1,700+ predefined
data classifiers, templates,
and policies
Scalable enforcement
Update policies across thousands of endpoints in minutes
Automatic updates
with the latest security features
Cloud Apps & Web
DLP
Cloud SaaS app security
Cover Microsoft 365, Google Workspace, and more
Shadow IT protection
Prevent data loss in
unsanctioned cloud apps
Web Data Control
Blocks unauthorized data transfers and exposure through web traffic
Unified Policy Enforcement
Use one set of policies
across all channels
DLP
Stop data leaks
Prevents accidental or malicious leaks through email
Advanced email protection
Encrypt or quarantine sensitive emails, and approve
high-risk messages
Seamless email security
Enhances native functionality for Microsoft Exchange, Google Workspace, and any
email provider
Risk-Adaptive Protection
Add-On
Adaptive policy enforcement
Dynamically adjusts controls based on user behavior to
reduce false positives
Automated actions
Coach, encrypt, block, or
require authentication
Smarter Enforcement
Block risky behavior and allow daily work to continue
Integrate with Forcepoint DLP
Enhance data security from
the same UI
Endpoint
DLP
Single-click remediation
1,700+ predefined
data classifiers, templates,
and policies
Secure sensitive data
from exfiltration at the endpoint
No browser extension required
Network
DLP
Single-click remediation
1,700+ predefined
data classifiers, templates,
and policies
Identify sensitive data
based on predefined policies
Secure data in motion
Monitor data movement
within the network
Discover
DLP
Single-click remediation
Data Security
across various data sources
Apply Policies
data classifiers, templates,
and policies
Fingerprint up to 100M files
Structured and Unstructured
data support
Suite
DLP Bundle
Single-click remediation
1,700+ predefined
data classifiers, templates,
and policies
Secure data
at rest, in motion, and in use
Structured fingerprinting
up to 100M files
Consistent policy enforcement
across email, web, network, endpoint and discovery
Unified policies and hybrid deplayment