Brochure Forcepoint Web Security en
Brochure Forcepoint Web Security en
Your business and its data are under constant attack, but traditional
security solutions no longer provide sufficient protection. In fact,
they can put you at risk for data loss and litigation. Protecting your Web Security Objectives
network and data against Advanced Threats, crypto-ransomware
and exploit kits is crucial for the survival of your business in an Most of today’s security solutions can’t address
increasingly risky mobile and cloud-connected world. Advanced Threats as they happen. Forcepoint Web
Security is advanced, real-time threat defense.
www.forcepoint.com 2
WATCH THE WEBCAST ▸
5 REASONS TO TRUST
leverage more cloud applications for
improved business outcomes.”
REASON 1
Control log data and options Secure cages, Biometric All Forcepoint’s operations are Unrivaled cloud service
no hidden surcharges.
www.forcepoint.com 3
REASON 2
Enhance Your Protection
FORCEPOINT CLOUD Extend web protection and policy enforcement to remote users
WEB PLATFORM* Deploy Forcepoint Web Security as a physical or virtual appliance for your private cloud. Either choice
can be further extended with Forcepoint’s global cloud infrastructure for remote user protection.
FORCEPOINT DLP Add a powerful, contextually-aware DLP engine for maximum outbound protection against data theft
FOR WEB AND EMAIL* The Forcepoint DLP for Web and Email Module provides containment defenses against data theft
and enables regulatory compliance with over 1,700 pre-defined policies and templates. It also
includes industry-leading protection (such as Drip-DLP) against slow data leaks, OCR (Optical
Character Recognition) against theft of data in image files, or Custom Encryption Detection for
criminally-encrypted files.
MOBILE SECURITY Extend policies and protection to iOS and Android users
Extend your existing security policies to mobile devices to protect them from Advanced Threats,
mobile malware, phishing attacks, spoofing and more. Forcepoint Mobile Security works with your
Mobile Device Manager (MDM) to provide full protection to mobile devices.
*For on-premise deployment. Web Security Cloud utilizes integrated Cloud Data Protection at no additional cost.
www.forcepoint.com 4
Forcepoint Web Security
Other Capabilities
INTEGRATED DLP INCIDENT RISK RANKING API FOR THREAT INTELLIGENCE
Incident Risk Reporting (IRR) is the industry’s first security Ingest API makes web security smarter by incorporating
analytics capability that applies statistical data modeling industry or region-specific threat intelligence and enables
and behavioral baselines to automatically identify and security management automation.
cluster attempted data exfiltration. IRR works to lower the
cost and increase the efficiency of DLP investigations. APPLICATION AND PROTOCOL CONTROL
Network Agent provides granular control over hundreds of
PROXY-LESS ENDPOINT PROTECTION protocols and applications for an enhanced security posture.
Our solution protects users working in any network,
anywhere. Applications continue to work in FLEXIBLE REPORTING
environments that typically cause problems with Four customizable dashboards, as well as more than 60
proxy-based cloud solutions. pre-defined and customizable reports, provide easy-to-read
business and technical information as well as valuable insights
FLEXIBLE SSL INSPECTION into threat levels and more.
Granular SSL inspection capabilities let you
monitor HTTPS traffic while maintaining privacy CLOUD DATA STORAGE OPTIONS
and regulatory requirements. To assist you in data residency requirements, you define the
CSTORE locations where your data is to be stored. Choose a
100% IPSEC COVERAGE reporting period of up to 18 months.
Internet Protocol Security is the standard where IP
tunneling and data privacy are required. By providing SSL DECRYPTION MIRROR PORT
global coverage, Web Security Cloud protects against Get access to all decrypted HTTPS traffic for trusted device
eavesdropping or modification of packets. inspection and analysis. Web Security appliances save you
money by removing the need for extra decryption products
or redundant SSL decryption policies.
www.forcepoint.com 5
CONTACT
www.forcepoint.com/contact
[BROCHURE_FORCEPOINT_WEB_SECURITY_EN]
400002.052217