Forcepoint Cloud Security Gateway · 2020. 7. 21. · 2 Forcepoint Cloud Security Gateway...

3
forcepoint.com Convergence What used to be a product is now often a feature; to us, convergence means merging web security, network security, and cloud application security, delivered in a single, easy-to-consume service. Security-as-a-Service Secure Access Service Edge (SASE) requires organizations to secure the cloud from the cloud. This requires a shift in thinking from infrastructure-centric components to user- and data- centric capabilities that deliver granular policy control for web access from anywhere. The end goal is unifying the required security management, rich security policies, and reporting from the cloud, wherever the enforcement device sits, or wherever an endpoint is located. Flexible, hybrid deployment Much of application delivery is still occurring on-premises, whether that be in a corporate site or at a co-location. An efficient and effective security posture will address applications, data, and users wherever they are. This is critical because the transition will be different for every industry, vertical, and company. Forcepoint CSG is a converged cloud security service that provides visibility, control, and threat protection for users and data, wherever they are. Integrated functionality reduces time to value and ensures maximum capabilities are available. Eliminating multiple point products enables enterprises to cut costs, reduce complexity, and decrease operational overhead while eliminating overlap between product and security teams. Enterprise security has transformed—people are the new perimeter. In the early 2000s, security efforts still focused on building walls. In the last 10 years, virtualization gave rise to the public cloud industry and sparked big data. Beyond introducing cloud capabilities to companies, this shift highlighted the importance of protecting critical electronic data. Because users and data are located everywhere today, it’s created a challenging reality for CISOs: We need to secure our users and data anywhere, at any time, on any device. Securing the new way of working from anywhere Forcepoint Cloud Security Gateway Solution Brief Cloud Security Gateway SaaS Apps Public Internet SWG CASB RBI DLP User WEB TRAFFIC TRUSTED TRAFFIC

Transcript of Forcepoint Cloud Security Gateway · 2020. 7. 21. · 2 Forcepoint Cloud Security Gateway...

Page 1: Forcepoint Cloud Security Gateway · 2020. 7. 21. · 2 Forcepoint Cloud Security Gateway forcepoint.com Explore the benefits of Forcepoint Cloud Security Gateway → Uniform web

forcepoint.com

Convergence › What used to be a product is now

often a feature; to us, convergence means merging web security, network security, and cloud application security, delivered in a single, easy-to-consume service.

Security-as-a-Service › Secure Access Service Edge

(SASE) requires organizations to secure the cloud from the cloud. This requires a shift in thinking from infrastructure-centric components to user- and data-centric capabilities that deliver granular policy control for web access from anywhere.

› The end goal is unifying the required security management, rich security policies, and reporting from the cloud, wherever the enforcement device sits, or wherever an endpoint is located.

Flexible, hybrid deployment › Much of application delivery is still

occurring on-premises, whether that be in a corporate site or at a co-location. An efficient and effective security posture will address applications, data, and users wherever they are. This is critical because the transition will be different for every industry, vertical, and company.

Forcepoint CSG is a converged cloud security service that provides visibility, control, and threat protection for users and data, wherever they are. Integrated functionality reduces time to value and ensures maximum capabilities are available. Eliminating multiple point products enables enterprises to cut costs, reduce complexity, and decrease operational overhead while eliminating overlap between product and security teams.

Enterprise security has transformed—people are the new perimeter. In the early 2000s, security efforts still focused on building walls. In the last 10 years, virtualization gave rise to the public cloud industry and sparked big data. Beyond introducing cloud capabilities to companies, this shift highlighted the importance of protecting critical electronic data. Because users and data are located everywhere today, it’s created a challenging reality for CISOs: We need to secure our users and data anywhere, at any time, on any device.

Securing the new way of working from anywhere

Forcepoint Cloud Security Gateway

Solution Brief

Cloud Security Gateway

SaaSApps

PublicInternet

SWG CASB

RBI DLP

User

WE

B T

RA

FFIC

TR

US

TE

D T

RA

FFIC

Page 2: Forcepoint Cloud Security Gateway · 2020. 7. 21. · 2 Forcepoint Cloud Security Gateway forcepoint.com Explore the benefits of Forcepoint Cloud Security Gateway → Uniform web

2

forcepoint.comForcepoint Cloud Security Gateway

Explore the benefits of Forcepoint Cloud Security Gateway

→ Uniform web protection and policies for every user, everywhere

• Extend protection to users both on and off the corporate network—in the office, at home, and on the go.

• Apply consistent policies across your organization— for safe access to web content and cloud applications while protecting your critical data.

→ Protect users from advanced threats on the web and in the cloud

• Secure all internet traffic wherever your users go.

• Prevent and stop threats across the entire kill chain— even the ones you can’t see like zero-day threat.

→ Uncover Shadow IT and secure cloud access across your organization

• Discover risky cloud application usage.

• Enable policies to protect data without impacting productivity.

→ Optimize cloud security operational management and expenses

• Decrease costs and hardware footprint.

• Eliminate gaps in security operations and streamline IT and workflow management.

→ Reduce vendors and point product overload

• Manage a single relationship and source of support.

• Take advantage of software that works together by design.

→ Simplify regulatory compliance

• Utilize pre-defined regulatory policy templates to remove guesswork and reduce effort.

• Use a single solution that unifies.

→ Ensure employee productivity

• Align SaaS and web use to corporate acceptable use policy.

• Prevent shadow data by blocking unsanctioned applications.

→ Secure your global and remote workforce

• Work anywhere, on any device knowing your people and data are protected.

• Provide localized content globally to fully enable multinational workforces.

As the concept of people as the new perimeter becomes the new reality, it’s about protecting users and data in a distributed and diverse environment, one that bridges traditional on-premises infrastructure, including the home office, to multi-cloud and multi-SaaS environments. Our current situation has forced a rapid shift toward supporting large groups of remote workers. It’s a change that’s ushered in a new way of working. And that’s placed even more importance on protecting users and data in hybrid IT environments.

Page 3: Forcepoint Cloud Security Gateway · 2020. 7. 21. · 2 Forcepoint Cloud Security Gateway forcepoint.com Explore the benefits of Forcepoint Cloud Security Gateway → Uniform web

3

forcepoint.comForcepoint Cloud Security Gateway

forcepoint.com/contact

© 2020 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. All other trademarks used in this document are the property of their respective owners [Forcepoint-Cloud-Security-Gateway-Solution-Brief-EN] 21July2020

Ready to learn more about how Cloud Security Gateway can take you to a cloud-powered future? Connect with an expert.

PRODUCT HIGHLIGHTS DESCRIPTION

Superior user experience

› One SKU to purchase› One login to access all functionality› One status page› One phone number for support

Advanced Threat Protection

› Anti-virus, anti-malware, cryptocurrency & ransomware› URL and content filtering, and categorization› SSL inspection › Threat Ingest API› Advanced Classification Engine (ACE)› Shared global threat intelligence & ThreatSeeker› Cloud sandboxing with machine learning› Inbound and outbound protection › File blocking

Ease of administration & access

› Acceptable use policies and controls› Reporting – (drag & drop UI)› Quota enforcement› Rules-based policy application (adaptive) › SIEM & AD integration › Universal policy application › Customized dashboard view: end user vs. auditor

Global cloud infrastructure

› ISO 27001, IS27018, CSA STAR, SOC 1 & 2. Certifications at every physical data center covering the entire operations lifecycle› Real-time updates› Fault-tolerant, high availability & high performance › 160+ Points of Presence (PoPs) with coverage across 145 countries › Content localization› SLA

Simplified cloud app security

› Shadow IT discovery› Cloud application control › Inline and reverse proxy, and API mode › Behavioral analytics› Anomaly detection

Proven compliance & Data Loss Prevention

› Incident risk ranking› PCI, HIPPA › Fingerprinting› Drip DLP › Phishing