through an edge device that acts as a reverse proxy to the mobile agent. Mobile agent installations include:●A policy engine●Secondary fingerprint repository (the primary is on the management server)What is the integration agent?The integration agent allows third-party products to send data to Forcepoint DLP for analysis. Third parties can package the integration agent inside their own installer using simple, industry standard methods that are completely transparent to end users.When the third-party product is installed on a users system, it needs to register the integration agent with the management server. This can be done transparently through the installation process or using a command-line utility.The integration agent works on Windows Server, 64-bit machines.
Overview8 Forcepoint DLPThe system treats third-party products that use the integration agent as it does any other agent.It supports all relevant views and capabilities, including:●Incident Management and Reporting●Quarantine and Release of emails●Traffic log view●Load balancing capabilitiesFor information on configuring the integration agent, see “Configuring the integration agent” in the Forcepoint DLP Administrator Help.
2Forcepoint DLP Deployment Guide 9Planning Forcepoint DLP DeploymentBefore installing Forcepoint DLP, analyze the existing resources to make a comprehensive security plan, using the following steps: 1.Deciding what data to protect, page 92.Determining where confidential data resides, page 113.Determining information flow, page 124.Defining the business owners for the data, page 125.Deciding who will manage incidents, page 126.Planning access control, page 127.Analyzing network structure, page 13 8.Planning network resources, page 149.Planning a phased approach, page 25Deciding what data to protectWhat data does the organization need to protect? What data privacy laws, regulations, and compliance concerns and obligations does the organization have?Consider the factors described below to define the scope of what needs to be protected.Geographical factors●Each region may have its own regulations or laws that require protecting various types of sensitive information, such as personal, financial, and medical data.●Global enterprises may be bound to multiple laws if they have branch offices in different regions. (For example, they may have to abide by different state laws if they have offices in several different states)Industry●Each type of industry may have its own laws and regulations. For example:■GLBA for Finance and Banking
Planning Forcepoint DLP Deployment10 Forcepoint DLP■HIPAA for Healthcare and Pharma●Organizations that develop new technologies may need to protect intellectual property and trade secrets (such as designs, software code, drawings, or patent applications).