In an era where the digital wave is sweeping the globe, data has become the new oil and the core fuel driving the AI revolution. However, as enterprises accelerate their digital transformation, a silent data security war is quietly unfolding. The fragmented and complex flow of data makes traditional security tools inadequate for dealing with ever-changing threats, necessitating smarter and more comprehensive protection strategies for enterprises.
To this end, Forcepoint, a global leader in data security, recently hosted the “Mission Accomplished: Data Security Everywhere” summit, showcasing how to reshape enterprise data security defenses through a single platform and AI-driven innovative technologies. Johnny Hui, Sales Director for North Asia at Forcepoint, opened by highlighting the core focus on AI and innovative technologies to comprehensively enhance enterprise data security resilience, addressing three major challenges: “GenAI Data Security,” “Shadow IT Visibility,” and “SaaS Access Control,” ensuring ubiquitous data security.
This summit brought together experts from the Asia-Pacific region, including Bjorn Engelhardt, Senior Vice President and General Manager of Forcepoint; Nick Savvides, Chief Technology Officer; Brandon Tan, Senior Director of Sales Engineering; Ray Pai, Enterprise Solutions Consultant for Taiwan; and Erin Tseng, Business Manager for Taiwan. They shared insights from a frontline perspective, conveying Forcepoint’s core mission: extending security defenses to every critical point. Whether data resides in the cloud, on-premises, or a hybrid environment, risks can be assessed in real time, enabling proactive protection strategies.
From invisible threats to internal crises, the battle for data survival in the AI era intensifies. A startling truth lies hidden behind the data. Bjorn Engelhardt revealed that Taiwan suffers over 2.4 million cyberattacks daily, and 75% of organizations experienced data breaches in the past year. Even more alarming, 80% to 90% of incidents originate internally, whether due to unintentional employee errors or malicious intent, posing significant risks.
The arrival of the AI era makes the battle more complex. The quantity, type, and flow of data are growing exponentially, rendering traditional cybersecurity tools ineffective. Bjorn Engelhardt warns that a lack of secure and managed data will be the biggest threat in the next decade. As AI evolves from an auxiliary tool into a “digital employee” with autonomous decision-making capabilities, the challenges become even more severe.
Nick Savvides reminds businesses that, facing stringent data security regulations, they need to answer three core questions: Have they fulfilled their responsibilities for data security? Do they clearly understand the types and locations of their data? Have they taken sufficient protective measures? He cites the example of an Australian health insurance company that, due to its failure to address data breaches, not only faced heavy fines but also suffered customer loss and reputational damage.
Erin Tseng, Business Manager for Taiwan, points out that local businesses face three major challenges. First, hybrid work environments amplify internal threats, requiring strengthened behavioral monitoring and access control. Second, in response to standards such as the Personal Data Protection Act, GDPR, PCI DSS, Financial Supervisory Commission regulations, and ISO 27001, businesses need to utilize automated compliance tools. Third, regarding generative AI, businesses are concerned about employees inputting sensitive data into public tools and therefore tend to adopt private or hybrid AI platforms, coupled with DLP (Data Loss Prevention) management. Johnny Hui emphasized that much “invisible data” is the root of enterprise risk. Therefore, Forcepoint, with its mission of “data security everywhere,” is committed to becoming the architect of data security, providing the most comprehensive solutions.
Revolutionizing Protection: Forcepoint AI Mesh Blocks Invisible Threats
While traditional DLP can detect and control data flow, it often falls short in the face of massive and rapidly changing data environments due to the need for pre-defined protection objects. To overcome this bottleneck, Forcepoint acquired Getvisibility in March of this year, integrating its leading AI technology into its product portfolio to launch the revolutionary Forcepoint AI Mesh. This high-performance, high-accuracy AI classifier achieves a leap forward in data security.
Brandon Tan explained that Getvisibility’s Small Language Model (SLM) can automatically identify, classify, and categorize sensitive data, and perform contextual analysis to determine applicable regulations, eliminating the need for cumbersome presets and significantly improving data visibility and classification efficiency. This technology has been integrated into the “Forcepoint Data Security Cloud,” providing complete lifecycle protection covering observability, analysis, control, and response.
Ray Pai demonstrated “Data Security Posture Management” (DSPM) on-site, showcasing how it can quickly discover and categorize cloud and on-premises data, generating real-time risk reports, including sensitive data types, sharing permissions, and usage patterns, quantified into a DSPM score. He further introduced “Data Detection and Response” (DDR) and “Risk Adaptive Protection” (RAP), effectively preventing data breaches through predictive protection. Nick Savvides added that Forcepoint continuously monitors events and predicts potential risks, allowing for early intervention to ensure data security.
Planning a forward-looking strategy, realizing a protection vision of risk quantification and expert collaboration
To help enterprises effectively implement data security strategies, Brandon Tan proposed a five-pillar blueprint: Discovery and Classification → Establishing Policy Baselines → Identification and Access Governance → Risk Response and Automation → Continuous Monitoring and Measurement of Posture. “Accurate data classification is the cornerstone of security,” he emphasized, stressing that only by understanding the sensitivity and value of data can detailed access control rules be formulated. Traditional data inventory often takes over nine months, which is no longer suitable for the rapidly changing AI era. Forcepoint’s AI technology can significantly shorten inventory and classification time.
Forcepoint’s free Data Risk Assessment (DRA) program is also a major highlight, helping companies securely implement AI, improve data risk visibility and productivity, optimize human resource allocation, and ultimately gain budget support from senior management. Through continuous monitoring and a zero-trust principle, Forcepoint can provide data exposure reports at the “minute” level, allowing the board of directors to intuitively understand investment value and helping companies negotiate favorable terms with insurance companies.
Johnny Hui, the final speaker, concluded with an action guide, offering four key suggestions: First, use DRA to improve visibility and uncover hidden risks; second, plan a data security roadmap based on DRA results; third, incorporate regulatory requirements such as PDPA into the roadmap, viewing compliance as a necessity rather than an option; and finally, collaborate with Forcepoint and local experts, combining methodology and practice to achieve a long-term balance between cost, risk, and compliance.
In summary, the summit demonstrated, through a pragmatic framework, quantifiable metrics, and actionable tools, that data security can be not only more robust but also simpler. Forcepoint leverages AI-driven innovation to help businesses confidently embrace digital transformation, achieving its ultimate mission of “data security everywhere,” ensuring that every piece of data receives the strongest protection in the invisible battlefield.