0% found this document useful (0 votes)
112 views

Forcepoint Security Solutions Reference Guide

Uploaded by

hoangtruc.ptit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
112 views

Forcepoint Security Solutions Reference Guide

Uploaded by

hoangtruc.ptit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Forcepoint Security Solutions

DATA-FIRST SASE

DATA SECURITY SECURITY SERVICE EDGE NETWORK SECURITY

Forcepoint Risk-Adaptive Protection Forcepoint ONE Forcepoint FlexEdge Secure SD-WAN


Data protection that adjusts based on real-time user risk Securely connect users to business applications and the web, seamlessly Easily connect and protect branch offices everywhere

Indicators of Behavior (IOB) Security Service Edge (SSE) Integration


Features Features Cloud Web Private Apps Email

Real-time risk calculation for every user ALERTS SENT TO CLOUD


FOR INVESTIGATION Single console policy management for
140+ Indicators of Behavior (IOBs) for CASB, ZTNA, SWG and RBI.
complete incident analysis. RISK CALCULATOR Unmanaged device support with
patented reverse proxy. SAAS PUBLIC WEB DATA CENTERS
Automated policy enforcement based CLOUD PRIVATE CLOUD
on real-time user risk profile Accelerated performance with 300+
PoPs with hyperscaler backbone
Zero Trust Access
Benefits Threat Data Value

Benefits Protection Security Visualization

Complete data protection—audit, coach, Unified Management

encrypt, and block. Zero Trust security at scale


Fewer resources needed to run your Reduce risk and prevent data loss
data protection program across use of the web, cloud and FlexEdge
SD-WAN

Dramatically reduced false positives and private apps SECURE ACCESS SERVICE EDGE
shorten investigation time Part of a modern, single-vendor
USER
SASE architecture
Remote Workers Offices BYOD

FlexEdge Secure Forcepoint


SD-WAN SmartEdge Agent

Forcepoint Data Loss Prevention


Visibility and control everywhere your people work and data resides
Cloud Access Security Broker (CASB) SITES REMOTE USERS

Enforce access control and data security for cloud applications

Features Features Benefits


Features Benefits Seamlessly mixes broadband with Connect sites to the cloud efficiently & safely
Unified policy across channels: endpoint, EMAIL

network, cloud, web and email Secure any SaaS application—even Apply Zero Trust access controls to MPLS and protects with to better support hybrid workforce
Easiest policy creation in the industry + custom proprietary apps managed cloud apps anti-intrusion security Modernize distributed networks without
most complete data identification library Unmanaged and managed device Shadow IT visibility and control Combines hardware, software, having to piece together different
Support for structured and unstructured
ENDPOINT
coverage warranty into packages for small, technologies
Prevent misuse or loss of data from
intellectual property (IP) data medium, large sites Protect all users and devices at sites as they
Inline DLP and malware scanning, cloud apps
plus API Part of single-vendor SASE use the web, cloud, private apps
architecture
Benefits
CLOUD APPLICATIONS

DATA SECURITY

Implement consistent data loss detection


with a single platform
DISCOVER
Remove analyst blind spots to data usage

Zero Trust Network Access (ZTNA)


with visibility to data everywhere
Quickly and easily achieve data security
compliance across all channels
NETWORK
Forcepoint Next-Generation Firewall
Enforce access control and data security for private applications Fast, resilient security for edge and cloud that scales easily

Features Benefits Built-in advanced intrusion prevention

Forcepoint Classification powered by Getvisibility


Secure access to private web apps, Ditch the VPN for remote users
SSH, RDP, and more Apply Zero Trust access controls
Unmanaged and managed device to private apps
Leverage AI to deliver highly accurate data classification for Forcepoint coverage Prevent misuse or loss of data from
Enterprise DLP and Forcepoint ONE Integrated DLP Inline DLP and malware scanning private apps

ACCESS DEEP
CONTROL INSPECTION

DYNAMIC
Secure Web Gateway (SWG)
CLASSIFY A.I. CONTINUOUS AUTOMATION ACCELERATE
LEARNING COMPLIANCE
STREAM
INSPECTION

Securely connect users to business applications and the web, seamlessly


Features Benefits
Uses AI to identify data types for On-the-fly classification of newly created
classification with greater accuracy data everywhere your people work Features Benefits
Continuously learns and improves Improve DLP functionality with ever- Endpoint enforcement for up to 2x Secure the web without sacrificing MALWARE INSPECTION

with usage increasing accuracy faster performance performance VULNERABILITY INSPECTION


Learns based on your unique Add visual labels and metadata to facilitate Shadow IT visibility and inline control Remove blind spots and close
organizational classification policy enforcement and regulatory Inline DLP and malware scanning security gaps COMMAND CONTROLS

requirements compliance Prevent misuse or loss of data on USAGE CONTROLS

the web
CONNECTION CONTROLS

Features Benefits
Forcepoint DLP for Cloud Email
Preventing data loss through the most common data loss vector, email Remote Browser Isolation (RBI) Fast anti-intrusion security for
network edge and cloud
Safeguard site-to-site and site-to-cloud
communications
Isolate the web session from the user’s device for Zero Trust web browsing Zero-touch deployment and Simplify operations with centralized visibility
updates of 1000s of sites from & control
single console Easy integration with SASE/SSE platforms
Features Benefits
Built-in high-availability SD-WAN
Extend your DLP coverage with Precisely monitor and prevent
Features Benefits and ZTNA App Connector
granular email controls sensitive data loss via email Zero Trust web browsing isolates all Safe interaction with unsafe sites
Data identification with over 1500 Identify high-risk behavior over the web code from the device and seamless user experience
predefined templates and classifiers email channel Smart Isolation automates policy Elevated C-suite protection without
Comprehensive integration with email Easy deployment and operation management elements, and is easy blocking sites
vendors; M365, Google workplace, and to adjust Clean file downloads, even from
other popular vendors Content Disarm & Reconstruction known malicious sites
(CDR) for file downloads and uploads

HIGH ASSURANCE SECURITY FOR GOVERNMENTS AND CRITICAL INFRASTRUCTURE

Behavioral Analytics: Identifying


Forcepoint Zero Trust File Transfer Cross Domain Solutions
and containing insider threats Increase efficiency and security for segmented network environments
Gain visibility into suspicious or malicious user behavior

Forcepoint Zero Trust Content Forcepoint Behavioral Analytics Forcepoint Data Guard
Disarm and Reconstruction (CDR) Leveraging behavioral analytics to identify user/entity risk Secure data & file transfer between physically separated networks

Stop malware, known and unknown threats, and zero-day attacks.


Features Use cases Features Use cases
PROBLEM SOLUTION RESULT
Infected Data, Forcepoint Malware-free, Safe Anomalous behavior detection Leavers Unparalleled security with less disruption Lowers operational expenses
Documents, & Images Zero Trust CDR Uploads & Downloads Ingest of any type of data: structured or Data Exfiltration Highly customizable data validation rules Improves and enhances KPI’s
unstructured Negative Behavior for maximum flexibility Enables high-availability network
Context and content-rich incident response Malicious User Software implementation for all access
Critical component for Zero Trust framework environments
Ability to send intelligence to SOAR,
ICAM/IDAM and other solutions
Extract Verify Build

MALWARE-FREE DATA IN ~ 1-2 SECONDS

Forcepoint Data Diode


Features Use cases One-way data transfer for uncompromising network security & protection
Un-Matched Protection Stops zero-day attacks
Forcepoint Insider Threat
Optical Separation
Delivers the highest guaranteed threat free Defends a wide range of attack Unrivaled visibility into user behavior to detect threats from within Network A Network B
data - pixel perfect and fully revisable vectors including web, email 1U Server 1U Server
SFTP/SCP

No risk from even the most sophisticated and cloud


Secure File Transfer

Secure File Transfer

attacks or zero days Easily integrated into existing


security estate
Features Benefits Servers Servers

Highly Versatile
HTTP POST

Fully customizable Protects your workforce NIC Pitcher OWT OWT Catcher NIC

Defends a wide range of attack vectors


including web, email, and file transfers
Benefits Collect behavioral data from multiple channels Safeguards your data and Data Storage Data Storage

In-depth analytics to ensure rapid response to critical assets Forcepoint Diode


Works with existing boundary defenses Malware free data
risky behaviors Increases visibility and use
and technologies Pixel perfect, fully revisable files in monitoring
near-real time
Choice of Deployment
Reduce costs & free up your SOC Features Use cases
On-premises, virtual, and in-cloud
team – from day one
deployment options Secure one-way transfer with optical isolation Lowers total cost of ownership
Can be deployed and running in a Raise The Bar compliant Simplifies configuration,
matter of minutes operation, and monitoring
Supports local log consolidation
Safeguard communications between system Protects sensitive data sharing
integrators and regulated industries

You might also like