TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS



Similar documents
TRITON APX. Websense TRITON APX

Stop advanced targeted attacks, identify high risk users and control Insider Threats

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

Comprehensive real-time protection against Advanced Threats and data theft

WEBSENSE TRITON SOLUTIONS

ENABLING FAST RESPONSES THREAT MONITORING

WEBSENSE SECURITY SOLUTIONS OVERVIEW

Can Your Organization Brave The New World of Advanced Cyber Attacks?

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Protecting ip Data From Loss and theft: The ShorTeST PaTh To PrevenTion and risk reduction

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Websense Solutions. TRITON v7.7 Architecture

ADVANCED PERSISTENT THREATS AND OTHER ADVANCED ATTACKS:

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Websense Data Security Solutions

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Web Security Gateway Solutions

Cisco Cloud Web Security

Content Security: Protect Your Network with Five Must-Haves

When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

V1.4. Spambrella Continuity SaaS. August 2

Symantec Consulting Services

overview Enterprise Security Solutions

REVOLUTIONIZING ADVANCED THREAT PROTECTION

+ web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Readiness Assessments: Vital to Secure Mobility

Cisco Advanced Malware Protection for Endpoints

Cisco Advanced Malware Protection for Endpoints

Symantec Messaging Gateway powered by Brightmail

The Symantec Approach to Defeating Advanced Threats

A New Era of Cybersecurity Neil Mohammed, Sales Engineer

Websense Messaging Security Solutions. Websense Security Websense Hosted Security Websense Hybrid Security

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Symantec Protection Suite Add-On for Hosted and Web Security

INTRODUCING isheriff CLOUD SECURITY

overview Enterprise Security Solutions

OVERVIEW. Enterprise Security Solutions

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense

A Buyer's Guide to Data Loss Protection Solutions

Secure Your Mobile Workplace

SPEAR PHISHING AN ENTRY POINT FOR APTS

Threat Containment for Facebook

FORCEPOINT. Global Partner Program EMPOWER INNOVATE GROW

Unified Security, ATP and more

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Payment Card Industry Data Security Standard

IBM Endpoint Manager for Core Protection

APERTURE. Safely enable your SaaS applications.

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

Advanced Threat Protection with Dell SecureWorks Security Services

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

Web Security Gateway Anywhere

McAfee Network Security Platform

McAfee Security Architectures for the Public Sector

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

Cisco Advanced Malware Protection

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Clean VPN Approach to Secure Remote Access for the SMB

Advanced Persistent. From FUD to Facts. A Websense Brief By Patrick Murray, Senior Director of Product Management

Enterprise Security Solutions

Lab Testing Detailed Report DR January Competitive Testing of Web Security Devices

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview

Comprehensive Advanced Threat Defense

THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION. Technology Overview, Business Justification, and Resource Requirements

Securing the endpoint and your data

On and off premises technologies Which is best for you?

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS

The Attacker s Target: The Small Business

Forcepoint Stonesoft Management Center

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

SafeNet Content Security Product Overview. Protecting the Network Edge

Cloud App Security. Tiberio Molino Sales Engineer

Security Analytics for Smart Grid

Transcription:

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS From a damaged reputation to regulatory fines and penalties, a data breach can have devastating consequences. Securing roaming users against threats and data theft remains a significant challenge for IT security professionals. TRITON AP-ENDPOINT protects roaming users against Advanced Threats and data theft on and off your network in an easy-to-use solution. Advanced technologies help you quickly identify and protect sensitive data and provide actionable forensic insight into attacks on endpoint devices on or off network. Forcepoint TRITON AP-ENDPOINT protects your data, allowing your mobile workforce to do business wherever and whenever they need to. Forcepoint Empowers Your Endpoint Security Secure sensitive data on Mac OS X and Windows endpoint devices off your network. Protect off-network endpoints from Advanced Threats. Secure inbound threats or outbound data hidden in SSL traffic from all endpoints. Control the use of USB storage devices by blocking or encrypting sensitive data transferred to removable media. Adopt cloud services like Office 365 and Box Enterprise with safety and confidence. Easily demonstrate security controls to auditors and executives for compliance and regulatory requirements. Key Features Fingerprinting (including partial fingerprinting) support for endpoint devices on or off the network. Mac OS X and Windows supported endpoints. Protect sensitive data sent to USB devices, removable media, printers, or cloud services like Office365 and Box Enterprise. Portable decryption for USB/media. Recognize sensitive data hidden in images through OCR (Optical Character Recognition) to see and secure scanned documents and screen shots Drip DLP considers cumulative data transmission activity over time to discover small amounts of data leakage. Efficiently inspect HTTPS traffic with the flexibility to decide which type of SSL traffic to inspect. Identify Advanced Threat web activity across the entire Kill Chain on endpoints operating beyond the reach of network defenses. Identify high-risk employees through anomalous cumulative activity analysis compared to peer group and past behaviors. www.forcepoint.com

We run a remote Forcepoint agent that is pre-configured to push Forcepoint out to the laptops. Whenever a laptop goes outside our network it communicates back to the network, which then applies our Internet access policies to the laptop. That way all laptops always operate on the same policies as our internal network. Forcepoint TRITON AP-ENDPOINT Jeff Howells, Network Architect, Wollongong City Council TRITON AP-ENDPOINT Capabilities ENABLE OFF-NETWORK ROAMING USERS Users often require access to sensitive information even while operating remotely. TRITON AP-ENDPOINT delivers the necessary data theft controls on Mac OS X and Windows laptops so you can safely empower those users. Find and secure critical data residing on endpoints, whether the user is on or off your organization s network, including powerful data fingerprinting capabilities often lacking in endpoint DLP solutions. WEB SECURITY FOLLOWS YOUR ROAMING USERS The risks from web-based attacks, including Advanced Threats, are even greater for users operating beyond your organization s network. TRITON AP-ENDPOINT extends web security to roaming users, safely allowing them access to web-based resources. More than simple URL filtering, attack activity across the Kill Chain can be identified and blocked, even while working in a proxy-free environment. TRITON AP-ENDPOINT sees into SSL traffic to secure the Web channel for your roaming users even while using Cloud, Email, Social Media or other services that employ secure connections. EMBRACE INNOVATION WITH SAFETY AND CONFIDENCE Meeting your customer needs and remaining competitive requires innovation and empowering your workforce with new solutions and technologies. TRITON AP-ENDPOINT helps you safely adopt new cloud services such as Office 365 or Box Enterprise with both web threat defenses and the ability to retain control of sensitive data. Users on Mac OS X and Windows, on or off the network, working anytime, anywhere, receive the full benefit of advanced threat defenses and DLP. Control the use of removable media, like USB drives, with options to block or encrypt policy-identified data. Control the flow of data to cloud services, all while innovating as needed to grow your organization. MANAGE EASILY WITH YOUR EXISTING IT STAFF Staffing challenges within IT include limited headcount and finding skilled security personnel. The TRITON architecture unifies the management of Web, Email, Data, and Endpoint security, including policies that can be easily defined and deployed where needed. Quickly respond to new threats across multiple channels, including securing roaming users. Secure your sensitive IP and PII data while easily meeting your compliance and regulation requirements with and extensive library of out-of-the-box policies. 3

The power behind TRITON solutions ACE (Advanced Engine) Forcepoint ACE provides real-time, inline contextual defenses for Web, Email, Data and Mobile security by using composite risk scoring and predictive analytics to deliver the most effective security available. It also provides containment by analyzing inbound and outbound traffic with data-aware defenses for industry-leading data theft protection. Classifiers for real-time security, data and content analysis the result of years of research and development enable ACE to detect more threats than traditional anti-virus engines every day (the proof is updated daily at http://securitylabs.forcepoint.com). ACE is the primary defense behind all Forcepoint TRITON solutions and is supported by the Forcepoint ThreatSeeker Intelligence Cloud. INTEGRATED SET OF DEFENSE ASSESSMENT CAPABILITIES IN 8 KEY AREAS. WEB + EMAIL ATTACKS 10,000 analytics available to support deep inspections. Predictive security engine sees several moves ahead. Anti- Malware Reputation Analysis Behavioral Sandboxing Inline operation not only monitors, but blocks threats. WEB ATTACKS URL Real-time Security ACE Anti-Spam/ Phishing EMAIL ATTACKS Real-time Content Real-time Data DATA THEFT www.forcepoint.com

Forcepoint TRITON AP-ENDPOINT ThreatSeeker Intelligence Cloud The ThreatSeeker Intelligence Cloud, managed by Forcepoint Security Labs, provides the core collective security intelligence for all Forcepoint security products. It unites more than 900 million endpoints, including inputs from Facebook, and, with Forcepoint ACE security defenses, analyzes up to 5 billion requests per day. This expansive awareness of security threats enables the ThreatSeeker Intelligence Cloud to offer real-time security updates that block Advanced Threats, malware, phishing attacks, lures and scams, plus provides the latest web ratings. The ThreatSeeker Intelligence Cloud is unmatched in size and in its use of ACE real-time defenses to analyze collective inputs. (When you upgrade to Web Security, the ThreatSeeker Intelligence Cloud helps reduce your exposure to web threats and data theft.) TRITON Architecture With best-in-class security and a unified architecture, Forcepoint TRITON offers point-of-click protection with real-time, inline defenses from Forcepoint ACE. The unmatched real-time defenses of ACE are backed by Forcepoint ThreatSeeker Intelligence Cloud and the expertise of Forcepoint Security Labs researchers. The powerful result is a single, unified architecture with one unified user interface and unified security intelligence. TRITON APX TRITON APX provides many key benefits to organizations interested in deploying the best possible protection against Advanced Threats across the 7-Stage Kill Chain. They can be summarized in these three statements: Deploy Adaptive Security - Deploy adaptive security solutions for rapidly changing technology and threat landscapes. Protect Everywhere - The perimeter is the data. Protect critical information from theft whether on-premise, in the cloud or on mobile devices. Raise the Security IQ - Combat the cyber security skills shortage by providing predictive actionable intelligence across the entire threat lifecycle. 5

CONTACT www.forcepoint.com/contact Forcepoint is a trademark of Forcepoint, LLC. SureView, ThreatSeeker and TRITON are registered trademarks of Forcepoint, LLC. Raytheon is a registered trademark of Raytheon Company. All other trademarks and registered trademarks are property of their respective owners. [BR-AP-ENDPOINT-ENUS]-400005.011416