fortidlp
fortidlp
FortiDLP
Next Generation DLP Enhanced by AI
Our Approach
A data-driven solution
Available in FortiDLP applies a modern and unified approach to data protection, combining Data Loss
Prevention, Insider Risk Management, SaaS Data Security, Behavioral Analytics, and Risk-
Informed User Education.
FortiDLP provides immediate visibility into data movement and activity across devices and
Cloud collaboration platforms, empowering organizations to assess risk and enforce DLP and Insider
Risk policies with proactive data security actions in real time.
FortiDLP’s scalable, lightweight agent collects and records data regardless of network
connection and location, meaning you get full protection of your employees’ data flows
whether they’re in the office, working remotely, or on the road. This delivers data protection
that doesn’t rely on sending your critical business data to a cloud-based file scanning engine,
reduces bandwidth costs and addresses data residency requirements.
In addition, FortiDLP has an AI Assistant that summarizes and contextualizes data associated
with high-risk activity to accelerate incident analysis. And activities are mapped to MITRE
ENGENUITY™ Insider Threat Tactics, Techniques, and Procedures (TTP) Knowledge Base.
2
FortiDLP Data Sheet
Highlights
Addresses Key Compliance Controls Involving Data Security and Awareness
FortiDLP enables teams to adopt a proactive stance in meeting key compliance requirements,
including PCI DSS, HIPAA, ISO 27001, NIST, and others, to prevent the egress of sensitive data
by providing deep visibility into user activities, data access, and systems. In addition, FortiDLP
raises awareness of security hygiene through user education at the point of data access.
Prioritizing privacy, especially under regulations like GDPR and CCPA, FortiDLP leverages built-
in data minimization techniques—such as pseudonymization and localized forensics storage—
to help security teams detect and mitigate threats while safeguarding employee confidentiality.
FortiDLP
• Integrates Data Loss Prevention, Insider Risk Management, SaaS Data Security, Behavioral
Analytics, and Risk-Informed User Education in a single solution
• Is cloud-native, allowing organizations to turn on services and gain data risk visibility in
minutes to protect sensitive data on day one
• Utilizes lightweight agent technology for Windows, macOS and Linux operating systems for
seamless deployment and automated updating at enterprise scale
• Detects and responds to data manipulation and anomalous activity using AI and ML
• Monitors SaaS application usage, including Shadow AI tools like Gen-AI, while incorporating
risk-informed user education at the point of access to sensitive data
• Provides administrators with a fully featured, always up-to-date management console and
behavior analytics system to monitor, report and enable automated actions
• Delivers immediate policy-free visibility into data movement and business processes
• Accurately detects Intellectual Property and sensitive data using advanced data
classification, data origin and identity-based data tracking (Secure Data Flow)
• Addresses regulatory compliance controls involving data loss prevention with minimal effort
using templated PII/PHI/PCI policies
• Applies a Privacy-first approach to data protection by: 1) Storing forensics logs at customer-
controlled in-region data centers, 2) Minimizing pseudonymized investigation data sets and,
3) Including out-of-the-box investigation authorization workflows for analysts
3
FortiDLP Data Sheet
CentOS 7+
Debian 8+
Integrations
FortiDLP provides MDM profiles, event steaming, webhooks, and an open API for integration
with your existing MDM, SIEM, SOAR, automation, and service desk tools.
4
FortiDLP Data Sheet
Use Cases
Data Loss Prevention
FortiDLP provides rich out-of-the-box data visibility, risk assessment, and data protection
policies to protect critical information assets on and off the network. FortiDLP analyzes what
and how data is being used, and allows you to determine how to best respond.
FortiDLP doesn’t require pre-built policies. FortiDLP classifies and tracks data in real time for
immediate visibility and data protection. Whether your business or other organization relies on
structured or unstructured data, FortiDLP can track, and take active steps to protect it all.
FortiDLP agents, browser extensions, and cloud connectors automatically collect, enrich,
and index activity across event types (e.g. authentication, web, email, applications, USB, file
creation, sharing and download activity).
5
FortiDLP Data Sheet
Features
Insider Risk Management
FortiDLP tracks and traces sensitive information flows and user interactions within the
organization. It identifies and mitigates insider threats through advanced user behavior
analytics, automatically blocking suspicious activities.
FortiDLP’s activity feed provides analysts with a comprehensive, streamlined, and time-
sequenced view of user, data, and device activity before, after, and during an incident. High-
risk activity detections are mapped to MITRE ENGENUITY™ Insider Threat TTP Knowledge
Base and automatically sequenced into risk-scored incidents make analysts more effective and
efficient by prioritizing investigations.
Depending on the severity of the risk, Security Analysts can prompt an employee with an on-
screen message, take a screenshot of a user’s computer screen, kill a process, kill and block
connections to a device, or lock a device keyboard and mouse.
Integrated case management and risk reports highlight instances of careless, malicious,
and accidental behavior over time, allowing you to assess the effectiveness of your security
controls and identify areas for improvement. Reports can also be easily exported to share with
leadership.
The solution builds a comprehensive risk-scored inventory of SaaS applications and GenAI
tools utilized across an organization, with insights into data ingress, egress, and credentials. It
also fortifies defenses against potential data breaches stemming from business data exposure
via unauthorized app usage, nudging employees to use authorized tools.
6
FortiDLP Data Sheet
Features
Risk-Informed User Education
FortiDLP champions being proactive in risk mitigation, making employees part of the
organization’s security posture and enabling a more resilient security culture. Customized
prompts and nudge notifications reinforce security policy awareness and can direct users to
acceptable alternatives when unauthorized apps are detected. Notifications can be sent via
endpoint dialogue, email, Microsoft Teams, and Slack messaging systems.
With risk-informed training, you can train your employees to make the right decisions based on
detection of unacceptable behavior, reinforce corporate security policies, and promote good
cyber hygiene.
Pre-built rules detect poor cyber hygiene practices, such as employees uploading confidential
files to unexpected locations, connecting to unsecured Wi-Fi networks, inserting malicious
hardware devices, or using unsanctioned applications for cloud or USB storage.
Shadow AI
FortiDLP enables the safe use by employees of publicly available generative-AI tools such as
OpenAI’s ChatGPT, Google’s Gemini and other AI tools. Administrators can set policy actions to
alert on proper data handling practices while allowing employees to continue using these tools.
The result is a balance between enabling greater productivity while securing the organization
against the sharing of sensitive data with these tools.
7
FortiDLP Data Sheet
Features
Scalable, Lightweight Agent—Minimize the Impact of Processes
FortiDLP’s unique technology inspects content and data in movement, lowering the CPU and
memory impact on your employees’ computers. As a cloud-native solution, FortiDLP scales to
your organization’s needs regardless of size.
Detections are also automatically mapped using MITRE ENGENUITY™ Insider Threat TTP
Knowledge Base.
Secure Data Flow automatically identifies and tracks data based on its origin, such as Workday
or a source code repository. DLP and insider risk policies can be enforced based on where the
data originated and whether a corporate or non-corporate account was used to egress data.
8
FortiDLP Data Sheet
Features (DLP)
FEATURES STANDARD ENTERPRISE MANAGED
DLP
Integrated Device Control
Inline DLP Web, Email, Cloud Drive, and Connected Media
Real-time Advanced Data Classification
Generative AI and SaaS Applications Risk Analysis
Secure Data Flow
Employee Coaching and Block Actions
Regulatory Compliance Policy Library
Microsoft MIP/AIP Label Support
File Forensics
Incident Management and DLP Activity Timeline
Dynamic Risk Adaptive Policies
Insider Risk
User and Endpoint Activity Monitoring
Machine Learning-Powered Behavior Analytics
Data Manipulation Detection
Endpoint Isolate and Real-time Lock
Data Lineage Tracking
Risk Scored Sequence Detection Incidents
Forensics Screen Capture
Case Management
MITRE ATT&CK Insider Threat Detection Library
SaaS Data Security
Google Workspace Connector
Microsoft Office 365 Connector
File Sharing Controls
Managed Service
Product Deployment and Provisioning
Optimize DLP Rules
Update Product Configuration
Deploy New Use Cases
Quarterly Reports
9
FortiDLP Data Sheet
Ordering Information
10
Fortinet Corporate Social Responsibility Policy
Fortinet is committed to driving progress and sustainability for all through cybersecurity, with respect for human rights and
ethical business practices, making possible a digital world you can always trust. You represent and warrant to Fortinet that you
will not use Fortinet’s products and services to engage in, or support in any way, violations or abuses of human rights, including
those involving illegal censorship, surveillance, detention, or excessive use of force. Users of Fortinet products are required
to comply with the Fortinet EULA and report any suspected violations of the EULA via the procedures outlined in the Fortinet
Whistleblower Policy.
www.fortinet.com
Copyright © 2024 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product
or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other
conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s SVP Legal and above, with a
purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute
clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer,
or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.
FDLP-DAT-R02-20241028