Default banner

0

 

 

Organizations all over the world are relying on Forcepoint technology to safeguard their mission-critical data and overall operations, and even obtain security intelligence for a more robust data center infrastructure.

Recently, Forcepoint has introduced new solution for Cloud Security.

FORCEPOINT® CLOUD ACCESS SECURITY (CASB) automatically discovers cloud application use, analyzes the risks and enforces appropriate controls for SaaS and production applications. With Forcepoint CASB, users get the apps they want and IT staff gets the control they need. With Forcepoint CASB, organizations can now secure users as they stay productive while using cloud applications. Forcepoint CASB not only provides the ability to discover and assess risk from the use of unsanctioned cloud applications, it can also control how sanctioned cloud applications (e.g., Office 365, Google Suite, Salesforce, Box, Dropbox) are used in order to prevent the loss of critical data and IP. 

FORCEPOINT® USER & ENTITY BEHAVIOR ANALYTICS (UEBA) enables security teams to proactively monitor for high risk behavior inside the enterprise. Forcepoint UEBA security analytics platform provides unparalleled context by fusing structured and unstructured data to identify and disrupt malicious, compromised and negligent users. We uncover critical problems such as compromised accounts, corporate espionage, intellectual property theft, and fraud.

Other Forcepoint Solutions:

FORCEPOINT® WEB SECURITY gives you the Web security you need. It provides comprehensive real-time, inline protection against advanced threats that use sophisticated techniques to evade detection while they’re stealing your sensitive data, as well as insider threats such as employee theft and malware that slips into your network. FORCEPOINT WEB SECURITY stops more advanced, non-signature threats to your data than any other solution, and it’s a proven leader in SaaS Web content security.

FORCEPOINT® EMAIL SECURITY is powered by Triton ACE and Threatseeker Intelligence Cloud, which work together in real time to accurately identify and classify network traffic, apply policies and detect threats. Unified management and reporting functions streamline work for your security team, giving them the context and insights they need to minimize the dwell time of attacks and prevent exfiltration of your data.

FORCEPOINT® DLP ENDPOINT protects your users against data theft whether they are on or off the corporate network. Its powerful DLP capabilities enable you to secure personal data, intellectual property and other sensitive information on MacOS, Linux or Windows endpoints, and its pre-configured policies allow you to meet compliance requirements quickly and easily.

FORCEPOINT® DLP is an industry-leading DLP solution with the visibility and control to protect your data, whether it’s stored and accessed on mobile devices such Windows and Apple laptops or shared via email and IM. Forcepoint’s TRITON architecture lets you unify your security solutions, coordinate defense policies, shares intelligence along multiple points and enjoy centralized management of your data security.

FORCEPOINT® NGFW meets both demands by integrating application control, sophisticated evasion prevention and an intrusion prevention system (IPS) into a single solution that is cost-effective and easy to deploy. It has a proven capability to identify advanced evasion techniques (AETs) that evade other devices, and delivers exfiltration protection using both application and endpoint intelligence.

 

Reference Site:

 

https://www.forcepoint.com/

 

 

 

 

Core Security

Core Security

03.11.2016