Вы находитесь на странице: 1из 2

WHO IS FORCEPOINT ?

DEFEND

E
DEF ND

Based in Austin, Texas, with worldwide sales, service, security laboratories


and product development, Forcepoint is a joint venture of Raytheon Company
and Vista Equity Partners.

Protect users, data,


and networks

DETECT

DEFEAT

Forcepoints portfolio of products safeguards users, data and networks against


the most determined adversaries, from accidental or malicious insider threats
to outside attacks, across the entire threat lifecycle. Forcepoint protects data
everywhere in the cloud, on the road, in the office simplifying compliance
and enabling better decision-making and more efficient security. Forcepoint
empowers organizations to concentrate on whats most important to them while
automating routine security tasks. More than 20,000 organizations around the
world rely on Forcepoint.

D E CID E

FORWARD WITHOUT FEAR

DETECT

Swift identification
of breaches

DECIDE

Faster, more
accurate insights

DEFEAT

Rapid resumption
of normal

WHY FORCEPOINT?
Content Security
TRITON AP-WEB

TRITON AP-EMAIL

Insider Threat Data Protection


Threat
Protection Cloud

SureView
Insider Threat

TRITON AP-DATA

Security for Cloud


TRITON
AP-WEB &
AP-EMAIL
Cloud

TRITON
RiskVision

Threat
Protection
for Linux

Network Security
Stonesoft NGFW

Gartner Magic Quadrant

Forrester

Gartner Magic Quadrant

CDM

NSS Labs

2015 Secure Email Gateway MQ:


Visionary Quadrant

2015 Forrester Wave SaaS Web


Content Security, Q2 2015: Leader

2016 Enterprise DLP MQ:


Leaders Quadrant (8th time)

Radicati Group

Miercom

2016 Advanced Persistent Threat


(APT) Protection MQ: Top Player

The 2015 Secure Web Gateway


Industry Study found that
Forcepoint TRITON AP-WEB
demonstrated the highest overall threat
protection with a blocking
rate of more than 97%.

2015 Threat Protection for Linux


[Raytheon Sureview Memory Integrity]
Best Malware Analysis Solution
of the Year

Forcepoint Earns NSS Labs


Recommended rating for
the 4th consecutive year in
the 2016 NSS Labs Next
Generation Firewall
(NGFW) Test

2016 Corporate Web


Security MQ: Top Player
IDC
2016 IDC MarketScape Worldwide
Web Security: Leader

SC Magazine
2015 SureView Insider Threat review
2014 Best (APT) Protection

2016 Forcepoint received highest


product score for regulatory
compliance use case in Gartners
DLP critical capabilities report
SC Magazine
2015 Best DLP Solution EMEA
2015 Best Web CMS

FORCEPOINT PRODUCTS

TRITON AP-DATA &


AP-ENDPOINT DLP
Enterprise-class security for Office 365 and beyond
AP-DATA protects sensitive data wherever it resides - either in
the cloud, on the network, or on endpoint devices. Customers
can safely embrace technologies like O365 and easily
demonstrate compliance to avoid costly fines and headlines.

Qualifying questions
Have you suffered a data loss incident either from an external
attack, malicious insider or an accidental data loss?
Are you using Office 365 or do you have data security concerns?
Are you planning to adopt cloud-based collaboration tools?

Key features
Mature DLP policy library and user friendly wizard
Full and partial data fingerprinting
Extend DLP policies to enterprise cloud services
Microsoft Office 365 and Box

TRITON AP-EMAIL

TRITON AP-WEB

Transform without fear

The most secure cloud gateway

AP-EMAIL controls data theft with OCR and drip-DLP detection


capabilities and identifies high-risk users, whose habits or
behaviors may indicate an impending data breach. Safely adopt
O365 to advance innovation while mitigating new security risks
persistent today.

AP-WEB is a cloud or on premise Secure Web Gateway that


stops advanced threats from getting in and sensitive data from
getting out whether youre in the office or on the road.

Qualifying questions
How are you addressing APTs in their early stages, even
before malware comes into play?
What is your level of concern around malicious phishing emails?
Do you have industry or regulatory compliance needs to meet?

Key features

Qualifying questions
Do you feel like your antivirus is providing you real time
protection against advanced, non-signature threats?
Are you seeing an increase in malware infections on
your network?
Are you looking for protection for your users on or
roaming, around the globe?

Key features

Deep threat inspection using ACE analytics


Integrated enterprise-class DLP
File sandboxing options (cloud and on-prem) & URL
sandboxing/wrapping

Real-time threat detection and blocking using both


signature and non-signature based defenses.
Integrated sandboxing and data theft defenses
Integrated enterprise-class DLP

SUREVIEW INSIDER THREAT

STONESOFT NGFW

THREAT PROTECTION FOR LINUX

Unrivaled visibility into user behavior to protect IP


and detect threats from within

High-availability NGFWs that give you back time

Reduce dwell time of attacks against your


cloud apps

Unrivaled visibility into early activity on users computers


prevents data theft and loss by hijacked systems, rogue
insiders or negligent end users.

Qualifying questions
Are you concerned about unintentional mistakes that may
lead to breaches?
Do you have compliance laws you must meet?
Have you had a data breach, whether by accident or from
a malicious insider?

Key features
Integrated with TRITON AP-DATA
Alert aggregation
Behavioral analytics

CONTACT
partner@forcepoint.com

Our NGFWs give you the scalability, protection and visibility


you need to more efficiently manage your network and defend
against Advanced Evasion Techniques.

Qualifying questions
Do you have many different locations that you need to secure
consistently and quickly?
Does your network stay up without constant effort?
Do you feel like you constantly have to buy more capacity
and new features?

Key features
Streamlined centralized management
High availability links, clusters, management
Ability to update policies and software without downtime

TPL helps secure cloud app farms and other Linux servers
against unauthorized programs and advanced threats. It uniquely
monitors the memory of running systems, enabling stealthy
malware and other compromising indicators to be detected
without impacting server performance.

Qualifying questions
Do you know what should be on your Linux server and what
is really on your server?
What kind of endpoint threat detection do you have deployed
on your Linux systems?
Are our server farms at risk of down time (and loss of revenue)
from growing Linux attacks?

Key features
Supports the broadest versions of Linux including memory
acquisition and analysis for all 32-bit and 64-bit x86 Linux
systems running 2.6- and 3-series kernels
Identifies kernel-level rootkits and backdoors
Provides quick access to detailed results through
easy-to-use interface

@Forcepointsec

www.forcepoint.com

Вам также может понравиться