TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT



Similar documents
Comprehensive real-time protection against Advanced Threats and data theft

TRITON APX. Websense TRITON APX

Stop advanced targeted attacks, identify high risk users and control Insider Threats

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

ENABLING FAST RESPONSES THREAT MONITORING

WEBSENSE TRITON SOLUTIONS

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

WEBSENSE SECURITY SOLUTIONS OVERVIEW

GOING BEYOND BLOCKING AN ATTACK

Securing the Borderless Enterprise

When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński

Websense Solutions. TRITON v7.7 Architecture

The first and only unified

+ web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.

TRENDS IN THE THREAT LANDSCAPE

Lab Testing Detailed Report DR January Competitive Testing of Web Security Devices

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

ADVANCED PERSISTENT THREATS AND OTHER ADVANCED ATTACKS:

Web Security Gateway Solutions

Content Security: Protect Your Network with Five Must-Haves

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

Threat Containment for Facebook

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Web Security Gateway Anywhere

Protecting ip Data From Loss and theft: The ShorTeST PaTh To PrevenTion and risk reduction

Can Your Organization Brave The New World of Advanced Cyber Attacks?

DUBEX CUSTOMER MEETING

Unified Security, ATP and more

A New Era of Cybersecurity Neil Mohammed, Sales Engineer

Cisco Advanced Malware Protection for Endpoints

Buyers Guide to Web Protection

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

Cisco Cloud Web Security

OVERVIEW. Enterprise Security Solutions

Analyzing HTTP/HTTPS Traffic Logs

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

OVERVIEW. Enterprise Security Solutions

Cisco Advanced Malware Protection for Endpoints

Stallioni Sügisseminar

overview Enterprise Security Solutions

Comprehensive Advanced Threat Defense

IBM Security Strategy

Websense Messaging Security Solutions. Websense Security Websense Hosted Security Websense Hybrid Security

INTRODUCING isheriff CLOUD SECURITY

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

V1.4. Spambrella Continuity SaaS. August 2

Key Findings. Websense Triton Security Gateway Anywhere

SafeNet Content Security. esafe SmartSuite - Security that Thinks. Real-time, Smart and Simple Web and Mail Security Solutions.

Cisco Advanced Malware Protection

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Websense Data Security Solutions

Lab Testing Detailed Report DR Competitive Testing of the Websense TRITON Web Security Gateway Anywhere v7.7.3

Websense Web Security Solutions

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Microsoft s cybersecurity commitment

Executive Brief on Enterprise Next-Generation Firewalls

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

Web Protection for Your Business, Customers and Data

SPEAR PHISHING AN ENTRY POINT FOR APTS

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Superior protection from Internet threats and control over unsafe web usage

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense

Moving Beyond Proxies

Symantec Mobile Management for Configuration Manager 7.2

Advanced Threat Protection with Dell SecureWorks Security Services

Protect Your Business and Customers from Online Fraud

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

Requirements When Considering a Next- Generation Firewall

APPLICATION PROGRAMMING INTERFACE

KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE INSIDE THE CORPORATE INFRASTRUCTURE

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview

Extreme Security Threat Protection G2 - Intrusion Prevention Integrated security, visibility, and control for next- generation network protection

Advanced Persistent. From FUD to Facts. A Websense Brief By Patrick Murray, Senior Director of Product Management

4 Steps to Effective Mobile Application Security

SafeNet Content Security Product Overview. Protecting the Network Edge

How To Protect Your Mobile Device From Attack

Symantec Mobile Security

Balancing Cloud-Based Benefits With Security. White Paper

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

Vulnerability Management

Symantec Messaging Gateway powered by Brightmail

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

The webinar will begin shortly

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Finding Security in the Cloud

Addressing Advanced Web Threats. Addressing Advanced Web Threats: Protect Your Data and Brand

Transcription:

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS AND DATA THEFT Your business and its data are under constant attack. Traditional security solutions no longer provide sufficient protection. In fact, they can put you at risk for data loss and litigation. Protecting your network and data against Advanced Threats, spear-phishing and exploit kits are crucial for the survival of your business in an expanding and risky digital world. Customizable with the option to expand Companies need customizable solutions to meet their needs and budgets to protect against these types of threats as they happen. TRITON AP-WEB offers real-time protection against Advanced Threats and data theft with many deployment options and modules to help you customize your Web protection package to your needs. Whether you need protection for on-premise users or remote users, built-in data theft defenses or a solution for mobile users, TRITON AP-WEB provides the right coverage and protection you need no more, no less. Web Security Challenges Most of today s security solutions can t address Advanced Threats as they happen. TRITON AP-WEB is advanced, real-time threat defense. REDUCE RISK Complex, uncoordinated, multi-vendor security deployments increase security risks. TRITON AP-WEB provides fully-integrated, advanced protection across the entire Kill Chain. STOP DATA THEFT Most standalone DLP solutions are too complex to deploy. TRITON AP-WEB offers completely integrated, easy-todeploy DLP with industry-leading protection. PROTECT A MOBILE WORKFORCE Extend your protection seamlessly from on-premise to remote and mobile workers with the same solution. www.forcepoint.com

We need a solution that keeps us protected from the latest web threats, has DLP built in, and maximizes staff productivity. [Forcepoint] does all of that on premise and in the Cloud. It is obvious why Forcepoint leads the market. Forcepoint TRITON AP-WEB Ben Schoenecker, IT Security Specialist AllSouth Federal Credit Union TRITON AP-WEB REAL-TIME ANALYSIS FOR ADVANCED THREAT PROTECTION TRITON AP-WEB goes beyond anti-virus defenses by using eight defense assessment areas in a composite scoring process that uses predictive analysis with the Forcepoint ACE (Advanced Classification Engine). Multiple real-time content engines analyze full web page content, active scripts, web links, contextual profiles, files and executables. EASY DASHBOARD ACCESS TO FORENSIC DATA The TRITON AP-WEB advanced threat dashboard provides forensic reporting on who was attacked, what data was targeted, where the data almost went and how the attack was executed. Security incidents include data theft capture when possible. Defenses analyze inbound and outbound communications. INTEGRATED DATA THEFT DEFENSES Industry-leading integrated data theft defenses (optional) detect and intercept data theft attempts and provide regulatory compliance for data loss prevention (DLP). Examples of these capabilities include detection of custom-encrypted uploads, password file data theft, slow data leaks (drip DLP), optical character recognition OCR (Optical Character Recognition) of text within images and geolocation destination awareness. INTEGRATED SANDBOXING Learn how to better protect your company s assets by analyzing the behavior of malware automatically with the integrated optional sandbox service. 3

Enhanced Protection Modules WEB CLOUD OR WEB HYBRID MODULE Extend web protection and policy enforcement to remote users Deploy TRITON AP-WEB 100% on-premise with our scalable appliance offering. Choose a 100% cloudbased deployment or deploy a hybrid network. The choice is yours, depending on your network needs. WEB DLP MODULE Add a powerful, contextually aware DLP engine for added outbound protection against data theft The Web DLP Module provides containment defenses against data theft, and enables regulatory compliance with over 1,700 pre-defined policies and templates. It also includes industry-leading protection such as Drip-DLP against slow data leaks, OCR (Optical Character Recognition) against theft of data files in image files, or Custom Encryption Detection for detection of criminally-encrypted files. WEB SANDBOX MODULE Integrate behavioral sandboxing for automatic and manual analysis of malware files Analyze suspicious files in a virtual environment and look far deeper than simple file execution to provide the highest level of protection from advanced malware. Detailed forensic reporting is automatically provided when malicious files are detected. TRITON AP-MOBILE Extend policies and protection to ios and Android users Enable mobile devices in your workplace by extending your existing security policies to mobile devices to protect them from Advanced Threats, mobile malware, phishing attacks, spoofing and more. TRITON APX The Forcepoint recommended solution for complete protection Extend your protection from TRITON AP-WEB to TRITON AP-EMAIL, TRITON AP-DATA or TRITON AP-ENDPOINT for powerful, unified protection across all channels of attack. www.forcepoint.com

Forcepoint TRITON AP-WEB Other Capabilites REMOTE USER PROTECTION Manage corporate, branch and remote users with one console and policy with the Web Cloud or Hybrid Modules. MOBILE USER PROTECTION Extend policies and security settings to Android or ios devices by integrating with the TRITON AP-MOBILE solution. FLEXIBLE SSL INSPECTION Granular SSL inspection capabilities let you monitor HTTPS traffic while maintaining privacy and regulatory requirements. GRANULAR SOCIAL MEDIA CONTROL Social media controls provide great flexibility. Video controls limit or prevent viewing of viral, entertainment and surveillance videos while allowing access to YouTube Educational videos. APPLICATION AND PROTOCOL CONTROL Network Agent provides granular control over hundreds of protocols and applications for an enhanced security posture. FLEXIBLE REPORTING Four customizable dashboards, as well as more than 60 pre-defined and customizable reports, provide easy-to-read business and technical information as well as valuable insights into threat levels and more. MULTIPLE DEPLOYMENT OPTIONS Choose an on-premises deployment with an appliance, a hybrid deployment to protect remote users, or a complete cloudbased deployment. 5

The power behind TRITON solutions ACE (Advanced Classification Engine) Forcepoint ACE provides real-time, inline contextual defenses for Web, Email, Data and Mobile security by using composite risk scoring and predictive analytics to deliver the most effective security available. It also provides containment by analyzing inbound and outbound traffic with data-aware defenses for industry-leading data theft protection. Classifiers for real-time security, data and content analysis the result of years of research and development enable ACE to detect more threats than traditional anti-virus engines every day (the proof is updated daily at http://securitylabs.forcepoint.com). ACE is the primary defense behind all Forcepoint TRITON solutions and is supported by the Forcepoint ThreatSeeker Intelligence Cloud. INTEGRATED SET OF DEFENSE ASSESSMENT CAPABILITIES IN 8 KEY AREAS. WEB + EMAIL ATTACKS 10,000 analytics available to support deep inspections. Predictive security engine sees several moves ahead. Anti- Malware Reputation Analysis Behavioral Sandboxing Inline operation not only monitors, but blocks threats. WEB ATTACKS URL Classification Real-time Security Classification ACE Anti-Spam/ Phishing EMAIL ATTACKS Real-time Content Classification Real-time Data Classification DATA THEFT www.forcepoint.com

Forcepoint TRITON AP-WEB ThreatSeeker Intelligence Cloud The ThreatSeeker Intelligence Cloud, managed by Forcepoint Security Labs, provides the core collective security intelligence for all Forcepoint security products. It unites more than 900 million endpoints, including inputs from Facebook, and, with Forcepoint ACE security defenses, analyzes up to 5 billion requests per day. This expansive awareness of security threats enables the ThreatSeeker Intelligence Cloud to offer real-time security updates that block Advanced Threats, malware, phishing attacks, lures and scams, plus provides the latest web ratings. The ThreatSeeker Intelligence Cloud is unmatched in size and in its use of ACE real-time defenses to analyze collective inputs. (When you upgrade to Web Security, the ThreatSeeker Intelligence Cloud helps reduce your exposure to web threats and data theft.) TRITON Architecture With best-in-class security and a unified architecture, Forcepoint TRITON offers point-of-click protection with real-time, inline defenses from Forcepoint ACE. The unmatched real-time defenses of ACE are backed by Forcepoint ThreatSeeker Intelligence Cloud and the expertise of Forcepoint Security Labs researchers. The powerful result is a single, unified architecture with one unified user interface and unified security intelligence. TRITON APX TRITON APX provides many key benefits to organizations interested in deploying the best possible protection against Advanced Threats across the 7-Stage Kill Chain. They can be summarized in these three statements: Deploy Adaptive Security - Deploy adaptive security solutions for rapidly changing technology and threat landscapes. Protect Everywhere - The perimeter is the data. Protect critical information from theft whether on-premise, in the cloud or on mobile devices. Raise the Security IQ - Combat the cybersecurity skills shortage by providing predictive actionable intelligence across the entire threat lifecycle. 7

CONTACT www.forcepoint.com/contact Forcepoint is a trademark of Forcepoint, LLC. SureView, ThreatSeeker and TRITON are registered trademarks of Forcepoint, LLC. Raytheon is a registered trademark of Raytheon Company. All other trademarks and registered trademarks are property of their respective owners. [BROCHURE_TRITON_AP_WEB_EN] 400002.011416