Forcepoint Security Solutions Reference Guide
Forcepoint Security Solutions Reference Guide
DATA-FIRST SASE
Dramatically reduced false positives and private apps SECURE ACCESS SERVICE EDGE
shorten investigation time Part of a modern, single-vendor
USER
SASE architecture
Remote Workers Offices BYOD
network, cloud, web and email Secure any SaaS application—even Apply Zero Trust access controls to MPLS and protects with to better support hybrid workforce
Easiest policy creation in the industry + custom proprietary apps managed cloud apps anti-intrusion security Modernize distributed networks without
most complete data identification library Unmanaged and managed device Shadow IT visibility and control Combines hardware, software, having to piece together different
Support for structured and unstructured
ENDPOINT
coverage warranty into packages for small, technologies
Prevent misuse or loss of data from
intellectual property (IP) data medium, large sites Protect all users and devices at sites as they
Inline DLP and malware scanning, cloud apps
plus API Part of single-vendor SASE use the web, cloud, private apps
architecture
Benefits
CLOUD APPLICATIONS
DATA SECURITY
ACCESS DEEP
CONTROL INSPECTION
DYNAMIC
Secure Web Gateway (SWG)
CLASSIFY A.I. CONTINUOUS AUTOMATION ACCELERATE
LEARNING COMPLIANCE
STREAM
INSPECTION
the web
CONNECTION CONTROLS
Features Benefits
Forcepoint DLP for Cloud Email
Preventing data loss through the most common data loss vector, email Remote Browser Isolation (RBI) Fast anti-intrusion security for
network edge and cloud
Safeguard site-to-site and site-to-cloud
communications
Isolate the web session from the user’s device for Zero Trust web browsing Zero-touch deployment and Simplify operations with centralized visibility
updates of 1000s of sites from & control
single console Easy integration with SASE/SSE platforms
Features Benefits
Built-in high-availability SD-WAN
Extend your DLP coverage with Precisely monitor and prevent
Features Benefits and ZTNA App Connector
granular email controls sensitive data loss via email Zero Trust web browsing isolates all Safe interaction with unsafe sites
Data identification with over 1500 Identify high-risk behavior over the web code from the device and seamless user experience
predefined templates and classifiers email channel Smart Isolation automates policy Elevated C-suite protection without
Comprehensive integration with email Easy deployment and operation management elements, and is easy blocking sites
vendors; M365, Google workplace, and to adjust Clean file downloads, even from
other popular vendors Content Disarm & Reconstruction known malicious sites
(CDR) for file downloads and uploads
Forcepoint Zero Trust Content Forcepoint Behavioral Analytics Forcepoint Data Guard
Disarm and Reconstruction (CDR) Leveraging behavioral analytics to identify user/entity risk Secure data & file transfer between physically separated networks
Highly Versatile
HTTP POST
Fully customizable Protects your workforce NIC Pitcher OWT OWT Catcher NIC