Академический Документы
Профессиональный Документы
Культура Документы
DEFEND
E
DEF ND
DETECT
DEFEAT
D E CID E
DETECT
Swift identification
of breaches
DECIDE
Faster, more
accurate insights
DEFEAT
Rapid resumption
of normal
WHY FORCEPOINT?
Content Security
TRITON AP-WEB
TRITON AP-EMAIL
SureView
Insider Threat
TRITON AP-DATA
TRITON
RiskVision
Threat
Protection
for Linux
Network Security
Stonesoft NGFW
Forrester
CDM
NSS Labs
Radicati Group
Miercom
SC Magazine
2015 SureView Insider Threat review
2014 Best (APT) Protection
FORCEPOINT PRODUCTS
Qualifying questions
Have you suffered a data loss incident either from an external
attack, malicious insider or an accidental data loss?
Are you using Office 365 or do you have data security concerns?
Are you planning to adopt cloud-based collaboration tools?
Key features
Mature DLP policy library and user friendly wizard
Full and partial data fingerprinting
Extend DLP policies to enterprise cloud services
Microsoft Office 365 and Box
TRITON AP-EMAIL
TRITON AP-WEB
Qualifying questions
How are you addressing APTs in their early stages, even
before malware comes into play?
What is your level of concern around malicious phishing emails?
Do you have industry or regulatory compliance needs to meet?
Key features
Qualifying questions
Do you feel like your antivirus is providing you real time
protection against advanced, non-signature threats?
Are you seeing an increase in malware infections on
your network?
Are you looking for protection for your users on or
roaming, around the globe?
Key features
STONESOFT NGFW
Qualifying questions
Are you concerned about unintentional mistakes that may
lead to breaches?
Do you have compliance laws you must meet?
Have you had a data breach, whether by accident or from
a malicious insider?
Key features
Integrated with TRITON AP-DATA
Alert aggregation
Behavioral analytics
CONTACT
partner@forcepoint.com
Qualifying questions
Do you have many different locations that you need to secure
consistently and quickly?
Does your network stay up without constant effort?
Do you feel like you constantly have to buy more capacity
and new features?
Key features
Streamlined centralized management
High availability links, clusters, management
Ability to update policies and software without downtime
TPL helps secure cloud app farms and other Linux servers
against unauthorized programs and advanced threats. It uniquely
monitors the memory of running systems, enabling stealthy
malware and other compromising indicators to be detected
without impacting server performance.
Qualifying questions
Do you know what should be on your Linux server and what
is really on your server?
What kind of endpoint threat detection do you have deployed
on your Linux systems?
Are our server farms at risk of down time (and loss of revenue)
from growing Linux attacks?
Key features
Supports the broadest versions of Linux including memory
acquisition and analysis for all 32-bit and 64-bit x86 Linux
systems running 2.6- and 3-series kernels
Identifies kernel-level rootkits and backdoors
Provides quick access to detailed results through
easy-to-use interface
@Forcepointsec
www.forcepoint.com