0% found this document useful (0 votes)
25 views6 pages

Brochure Forcepoint Web Security en

Uploaded by

Haitam Souissi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views6 pages

Brochure Forcepoint Web Security en

Uploaded by

Haitam Souissi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Forcepoint Web Security

SECURITY FOR A MOBILE AND CLOUD CONNECTED WORLD


Forcepoint Web Security
SECURITY FOR A MOBILE AND CLOUD CONNECTED WORLD

Your business and its data are under constant attack, but traditional
security solutions no longer provide sufficient protection. In fact,
they can put you at risk for data loss and litigation. Protecting your Web Security Objectives
network and data against Advanced Threats, crypto-ransomware
and exploit kits is crucial for the survival of your business in an Most of today’s security solutions can’t address
increasingly risky mobile and cloud-connected world. Advanced Threats as they happen. Forcepoint Web
Security is advanced, real-time threat defense.

Customizable with SECURING EVERY USER, EVERYWHERE


the option to expand Extend your protection seamlessly to both on-premise
and remote workers, wherever they access the network.
Organizations need customizable solutions that communicate
together to protect against these types of threats as they happen. IDENTIFY AND CONTROL SHADOW IT APPLICATIONS
Forcepoint Web Security offers real-time protection against AND CLOUD SERVICES
Advanced Threats and data theft, with multiple deployment options Discover cloud applications being used within your
and modules to help tailor your web protection package to your organization. Monitor usage of applications to determine
organization’s needs. and block those that represent the greatest risk. Identify
non-compliant applications that could result in fines.
Forcepoint Web Security provides robust protection through
content-aware defenses and cloud app discovery/monitoring, REDUCE SECURITY SPEND WHILE IMPROVING
reducing risks to sensitive data for both on-premise and OPERATIONAL EFFICIENCY
roaming users. Consolidate disconnected security products to a single
platform with consistent controls for web, data and
Best of all, Forcepoint Web Security easily integrates with Forcepoint cloud application security. Extend your security by easily
Security Manager for consistent security controls that protect adding Advanced Malware Detection (AMD), DLP, Threat
against inbound and outbound threats with even the smallest of Intelligence and Forcepoint Mobile Security.
security teams.

www.forcepoint.com 2
WATCH THE WEBCAST ▸

“Forcepoint has enabled us to think Forcepoint Web Security

differently, architecturally and

5 REASONS TO TRUST
leverage more cloud applications for
improved business outcomes.”

FORCEPOINT ™ CLOUD SECURIT Y


—Chris Anderson, Head of Infrastructure Services,
Bendigo and Adelaide Bank

REASON 1
Control log data and options Secure cages, Biometric All Forcepoint’s operations are Unrivaled cloud service

We deliver access to certified cloud data centers with


for secure, compliant access controls, CCTV independently audited and certified to performance with rapid
regional storage. monitored 24/7/365. stringent industry standard certifications. updates and historical reviews.

no hidden surcharges.

FORCEPOINT IS THE ONLY CYBERSECURITY COMPANY WITH CLOUD SOLUTIONS ON FULL


FAULT TOLERANT, MULTIHOMED AUTONOMOUS SYSTEMS DEPLOYED GLOBALLY.

www.forcepoint.com 3

REASON 2
Enhance Your Protection

FORCEPOINT CLOUD Extend web protection and policy enforcement to remote users
WEB PLATFORM* Deploy Forcepoint Web Security as a physical or virtual appliance for your private cloud. Either choice
can be further extended with Forcepoint’s global cloud infrastructure for remote user protection.

FORCEPOINT DLP Add a powerful, contextually-aware DLP engine for maximum outbound protection against data theft
FOR WEB AND EMAIL* The Forcepoint DLP for Web and Email Module provides containment defenses against data theft
and enables regulatory compliance with over 1,700 pre-defined policies and templates. It also
includes industry-leading protection (such as Drip-DLP) against slow data leaks, OCR (Optical
Character Recognition) against theft of data in image files, or Custom Encryption Detection for
criminally-encrypted files.

ADVANCED MALWARE Integrate comprehensive malware and threat activity defense


DETECTION Detect advanced malware hidden in web traffic (without false positives) using leading, industry-
validated technology. Understand threats through detailed malware forensics and user activity
reports for affected systems. Deployed in the cloud or on-premise.

MOBILE SECURITY Extend policies and protection to iOS and Android users
Extend your existing security policies to mobile devices to protect them from Advanced Threats,
mobile malware, phishing attacks, spoofing and more. Forcepoint Mobile Security works with your
Mobile Device Manager (MDM) to provide full protection to mobile devices.

SECURITY MANAGER Reduce security spend and improve operational efficiency


Extend your protection to Email Security, DLP Endpoint or Forcepoint DLP for powerful, unified
protection across all channels of attack.

*For on-premise deployment. Web Security Cloud utilizes integrated Cloud Data Protection at no additional cost.

www.forcepoint.com 4
Forcepoint Web Security

Other Capabilities
INTEGRATED DLP INCIDENT RISK RANKING API FOR THREAT INTELLIGENCE
Incident Risk Reporting (IRR) is the industry’s first security Ingest API makes web security smarter by incorporating
analytics capability that applies statistical data modeling industry or region-specific threat intelligence and enables
and behavioral baselines to automatically identify and security management automation.
cluster attempted data exfiltration. IRR works to lower the
cost and increase the efficiency of DLP investigations. APPLICATION AND PROTOCOL CONTROL
Network Agent provides granular control over hundreds of
PROXY-LESS ENDPOINT PROTECTION protocols and applications for an enhanced security posture.
Our solution protects users working in any network,
anywhere. Applications continue to work in FLEXIBLE REPORTING
environments that typically cause problems with Four customizable dashboards, as well as more than 60
proxy-based cloud solutions. pre-defined and customizable reports, provide easy-to-read
business and technical information as well as valuable insights
FLEXIBLE SSL INSPECTION into threat levels and more.
Granular SSL inspection capabilities let you
monitor HTTPS traffic while maintaining privacy CLOUD DATA STORAGE OPTIONS
and regulatory requirements. To assist you in data residency requirements, you define the
CSTORE locations where your data is to be stored. Choose a
100% IPSEC COVERAGE reporting period of up to 18 months.
Internet Protocol Security is the standard where IP
tunneling and data privacy are required. By providing SSL DECRYPTION MIRROR PORT
global coverage, Web Security Cloud protects against Get access to all decrypted HTTPS traffic for trusted device
eavesdropping or modification of packets. inspection and analysis. Web Security appliances save you
money by removing the need for extra decryption products
or redundant SSL decryption policies.

www.forcepoint.com 5
CONTACT
www.forcepoint.com/contact

© 2017 Forcepoint. Forcepoint and the FORCEPOINT logo are


trademarks of Forcepoint. Raytheon is a registered trademark
of Raytheon Company. All other trademarks used in this
document are the property of their respective owners.

[BROCHURE_FORCEPOINT_WEB_SECURITY_EN]
400002.052217

You might also like