SECURITY FOR A MOBILE AND CLOUD CONNECTED WORLD · 2017-05-30 · easily integrates with our...

6
Forcepoint Web Security SECURITY FOR A MOBILE AND CLOUD CONNECTED WORLD

Transcript of SECURITY FOR A MOBILE AND CLOUD CONNECTED WORLD · 2017-05-30 · easily integrates with our...

Page 1: SECURITY FOR A MOBILE AND CLOUD CONNECTED WORLD · 2017-05-30 · easily integrates with our insider threat solution. top five malware vectors within crimeware in 2015*1 radicati

Forcepoint Web SecuritySECURITY FOR A MOBILE AND CLOUD CONNECTED WORLD

Page 2: SECURITY FOR A MOBILE AND CLOUD CONNECTED WORLD · 2017-05-30 · easily integrates with our insider threat solution. top five malware vectors within crimeware in 2015*1 radicati

www.forcepoint.com 2

Your business and its data are under constant attack, but traditional security solutions no longer provide sufficient protection. In fact, they can put you at risk for data loss and litigation. Protecting your network and data against Advanced Threats, crypto-ransomware and exploit kits is crucial for the survival of your business in an increasingly risky mobile and cloud-connected world.

Customizable with the option to expandOrganizations need customizable solutions that communicate together to protect against these types of threats as they happen. Forcepoint Web Security offers real-time protection against Advanced Threats and data theft, with multiple deployment options and modules to help tailor your web protection package to your organization’s needs.

Forcepoint Web Security provides robust protection through content-aware defenses and cloud app discovery/monitoring, reducing risks to sensitive data for both on-premise and roaming users.

Best of all, Forcepoint Web Security easily integrates with Forcepoint Security Manager for consistent security controls that protect against inbound and outbound threats with even the smallest of security teams.

Web Security ObjectivesMost of today’s security solutions can’t address Advanced Threats as they happen. Forcepoint Web Security is advanced, real-time threat defense.

SECURING EVERY USER, EVERYWHEREExtend your protection seamlessly to both on-premise and remote workers, wherever they access the network.

IDENTIFY AND CONTROL SHADOW IT APPLICATIONS AND CLOUD SERVICESDiscover cloud applications being used within your organization. Monitor usage of applications to determine and block those that represent the greatest risk. Identify non-compliant applications that could result in fines.

REDUCE SECURITY SPEND WHILE IMPROVING OPERATIONAL EFFICIENCYConsolidate disconnected security products to a single platform with consistent controls for web, data and cloud application security. Extend your security by easily adding Advanced Malware Detection (AMD), DLP, Threat Intelligence and Forcepoint Mobile Security.

Forcepoint Web SecuritySECURITY FOR A MOBILE AND CLOUD CONNECTED WORLD

Page 3: SECURITY FOR A MOBILE AND CLOUD CONNECTED WORLD · 2017-05-30 · easily integrates with our insider threat solution. top five malware vectors within crimeware in 2015*1 radicati

www.forcepoint.com 3

“Forcepoint has enabled us to think differently, architecturally and leverage more cloud applications for improved business outcomes.”

—Chris Anderson, Head of Infrastructure Services, Bendigo and Adelaide Bank

Forcepoint Web Security

INTENTIONAL

ACCIDENTAL

COMPROMISED

SOURCES

1 Verizon 2016 Data Breach Investigations Report

2 The Radicati Group, Advanced Persistent Threat (APT) Protection - Market Quadrant 2016

3, 4 Ponemon Institute LLC, 2016 Cost of Insider Threats - Benchmark Study of Organizations in the United States

www.forcepoint.com

Forcepoint™ is a trademark of Forcepoint LLC. SureView®, ThreatSeeker® and TRITON® are registered trademarks of Forcepoint LLC. Raytheon is a registered trademark of Raytheon Company. All other trademarks and registered trademarks are property of their respective owners. [INFOGRAPHIC-ZSCALER-COMPETITIVE-06FEB17]

USER BEHAVIOR PERSONAS THAT POSE RISK TO AN ORGANIZATION.3

AVERAGE COST OF AN INSIDER BREACH (IN THOUSANDS)4

RECON LURE REDIRECT EXPLOIT KIT DROPPER FILE CALL HOME DATA THEFT

STRATEGIC VISION

HIGH

LOW

HIGH LOW

FUNC

TION

ALIT

Y

TOP PLAYERS MATURE PLAYERS

TRAIL BLAZERS SPECIALISTS Vendor A

Vendor B

Vendor C

Vendor D

Vendor E

Vendor F

Vendor G

Vendor H

Vendor I

Vendor J

Vendor K Vendor L

Easily integrates with our insider threat solution.

TOP FIVE MALWARE VECTORS WITHIN CRIMEWARE IN 2015*1

RADICATI APT PROTECTION MARKET QUADRANT, 20162

REASON 5

CLOUD DATA CENTER CERTIFICATION

NOHIDDEN

SURCHARGES

INTEGRATED EMAIL AND WEB

SECURITY

LEADING APT

SOLUTION

STRATEGIC FOCUS ON

INSIDER THREATS

*MANY CRIMEWARE USE A MIX OF WEB AND EMAIL CHANNELS

INCIDENT PERCENTAGE

EMAIL ATTACHMENT 47%

WEB DRIVE-BY 45%

EMAIL LINK 29%

DOWNLOAD BY MALWARE 7%

NETWORK PROPAGATION 7%

68%ACCIDENTAL

22%INTENTIONAL

10%COMPROMISED

We deliver access to certified cloud data centers with no hidden surcharges.

REASON 1

Our cloud security platform defends both web and email from advanced threats.

REASON 2

We safeguard you from the latest advanced persistent threats (APTs), such as ransomware and phishing attacks.

REASON 3

Forcepoint protects against all stages of the Kill Chain.

REASON 4

IN SUMMARY

5 REASONS TO TRUSTFORCEPOINT ™ CLOUD SECURIT Y

WATCH THE WEBCAST ▸

$776

$2,292

$1,228

FORCEPOINT IS THE ONLY CYBERSECURITY COMPANY WITH CLOUD SOLUTIONS ON FULL FAULT TOLERANT, MULTIHOMED AUTONOMOUS SYSTEMS DEPLOYED GLOBALLY.

Control log data and options for secure, compliant

regional storage.

Secure cages, Biometric access controls, CCTV monitored 24/7/365.

All Forcepoint’s operations are independently audited and certified to

stringent industry standard certifications.

Unrivaled cloud service performance with rapid

updates and historical reviews.

Page 4: SECURITY FOR A MOBILE AND CLOUD CONNECTED WORLD · 2017-05-30 · easily integrates with our insider threat solution. top five malware vectors within crimeware in 2015*1 radicati

www.forcepoint.com 4

FORCEPOINT CLOUD WEB PLATFORM*

Extend web protection and policy enforcement to remote usersDeploy Forcepoint Web Security as a physical or virtual appliance for your private cloud. Either choice can be further extended with Forcepoint’s global cloud infrastructure for remote user protection.

FORCEPOINT DLP FOR WEB AND EMAIL*

Add a powerful, contextually-aware DLP engine for maximum outbound protection against data theftThe Forcepoint DLP for Web and Email Module provides containment defenses against data theft and enables regulatory compliance with over 1,700 pre-defined policies and templates. It also includes industry-leading protection (such as Drip-DLP) against slow data leaks, OCR (Optical Character Recognition) against theft of data in image files, or Custom Encryption Detection for criminally-encrypted files.

ADVANCED MALWARE DETECTION

Integrate comprehensive malware and threat activity defenseDetect advanced malware hidden in web traffic (without false positives) using leading, industry-validated technology. Understand threats through detailed malware forensics and user activity reports for affected systems. Deployed in the cloud or on-premise.

MOBILE SECURITY Extend policies and protection to iOS and Android usersExtend your existing security policies to mobile devices to protect them from Advanced Threats, mobile malware, phishing attacks, spoofing and more. Forcepoint Mobile Security works with your Mobile Device Manager (MDM) to provide full protection to mobile devices.

SECURITY MANAGER Reduce security spend and improve operational efficiencyExtend your protection to Email Security, DLP Endpoint or Forcepoint DLP for powerful, unified protection across all channels of attack.

Enhance Your Protection

*For on-premise deployment. Web Security Cloud utilizes integrated Cloud Data Protection at no additional cost.

Page 5: SECURITY FOR A MOBILE AND CLOUD CONNECTED WORLD · 2017-05-30 · easily integrates with our insider threat solution. top five malware vectors within crimeware in 2015*1 radicati

www.forcepoint.com 5

INTEGRATED DLP INCIDENT RISK RANKINGIncident Risk Reporting (IRR) is the industry’s first security analytics capability that applies statistical data modeling and behavioral baselines to automatically identify and cluster attempted data exfiltration. IRR works to lower the cost and increase the efficiency of DLP investigations.

PROXY-LESS ENDPOINT PROTECTIONOur solution protects users working in any network, anywhere. Applications continue to work in environments that typically cause problems with proxy-based cloud solutions.

FLEXIBLE SSL INSPECTIONGranular SSL inspection capabilities let you monitor HTTPS traffic while maintaining privacy and regulatory requirements.

100% IPSEC COVERAGEInternet Protocol Security is the standard where IP tunneling and data privacy are required. By providing global coverage, Web Security Cloud protects against eavesdropping or modification of packets.

Other CapabilitiesAPI FOR THREAT INTELLIGENCEIngest API makes web security smarter by incorporating industry or region-specific threat intelligence and enables security management automation.

APPLICATION AND PROTOCOL CONTROLNetwork Agent provides granular control over hundreds of protocols and applications for an enhanced security posture.

FLEXIBLE REPORTINGFour customizable dashboards, as well as more than 60 pre-defined and customizable reports, provide easy-to-read business and technical information as well as valuable insights into threat levels and more.

CLOUD DATA STORAGE OPTIONSTo assist you in data residency requirements, you define the CSTORE locations where your data is to be stored. Choose a reporting period of up to 18 months.

SSL DECRYPTION MIRROR PORTGet access to all decrypted HTTPS traffic for trusted device inspection and analysis. Web Security appliances save you money by removing the need for extra decryption products or redundant SSL decryption policies.

Forcepoint Web Security

Page 6: SECURITY FOR A MOBILE AND CLOUD CONNECTED WORLD · 2017-05-30 · easily integrates with our insider threat solution. top five malware vectors within crimeware in 2015*1 radicati

© 2017 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. Raytheon is a registered trademark of Raytheon Company. All other trademarks used in this document are the property of their respective owners.

[BROCHURE_FORCEPOINT_WEB_SECURITY_EN] 400002.052217

CONTACTwww.forcepoint.com/contact