TRITON AP-WEB Cloud COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

Similar documents
TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

Comprehensive real-time protection against Advanced Threats and data theft

TRITON APX. Websense TRITON APX

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

Stop advanced targeted attacks, identify high risk users and control Insider Threats

WEBSENSE TRITON SOLUTIONS

ENABLING FAST RESPONSES THREAT MONITORING

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

WEBSENSE SECURITY SOLUTIONS OVERVIEW

When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński

Lab Testing Detailed Report DR January Competitive Testing of Web Security Devices

Cisco Cloud Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Can Your Organization Brave The New World of Advanced Cyber Attacks?

Unified Security, ATP and more

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Cisco Advanced Malware Protection for Endpoints

ADVANCED PERSISTENT THREATS AND OTHER ADVANCED ATTACKS:

Websense Solutions. TRITON v7.7 Architecture

Comprehensive Advanced Threat Defense

Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview

INTRODUCING isheriff CLOUD SECURITY

Analyzing HTTP/HTTPS Traffic Logs

Web Security Gateway Solutions

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

Threat Containment for Facebook

Protecting ip Data From Loss and theft: The ShorTeST PaTh To PrevenTion and risk reduction

SPEAR PHISHING AN ENTRY POINT FOR APTS

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Simple security is better security Or: How complexity became the biggest security threat

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Advanced Persistent. From FUD to Facts. A Websense Brief By Patrick Murray, Senior Director of Product Management

+ web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.

A New Era of Cybersecurity Neil Mohammed, Sales Engineer

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Web Security Gateway Anywhere

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Key Findings. Websense Triton Security Gateway Anywhere

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

IBM Security Strategy

Cisco Advanced Malware Protection for Endpoints

Lab Testing Detailed Report DR Competitive Testing of the Websense TRITON Web Security Gateway Anywhere v7.7.3

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Cisco Advanced Malware Protection

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

Web Protection for Your Business, Customers and Data

Mitigating Web Threats with Comprehensive, Cloud-Delivered Web Security

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

APERTURE. Safely enable your SaaS applications.

Content Security: Protect Your Network with Five Must-Haves

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

Protect Your Business and Customers from Online Fraud

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

DUBEX CUSTOMER MEETING

FORCEPOINT. Global Partner Program EMPOWER INNOVATE GROW

Websense Messaging Security Solutions. Websense Security Websense Hosted Security Websense Hybrid Security

Websense Data Security Solutions

Breaking the Cyber Attack Lifecycle

Concierge SIEM Reporting Overview

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Requirements When Considering a Next- Generation Firewall

Building on a Foundation for Growth: Integrating DLP with Message Security Infrastructure

OVERVIEW. Enterprise Security Solutions

High End Information Security Services

Extreme Security Threat Protection G2 - Intrusion Prevention Integrated security, visibility, and control for next- generation network protection

ONLINE AND MOBILE BANKING, YOUR RISKS COVERED

Forcepoint Stonesoft Management Center

APPLICATION PROGRAMMING INTERFACE

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Zscaler Internet Security Frequently Asked Questions

Cloud App Security. Tiberio Molino Sales Engineer

Cyberoam Perspective BFSI Security Guidelines. Overview

POLIWALL: AHEAD OF THE FIREWALL

Sophos Cloud and Partner Dashboard Jonathan Shaw

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Secure Your Mobile Workplace

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Superior protection from Internet threats and control over unsafe web usage

overview Enterprise Security Solutions

SafeNet Content Security. esafe SmartSuite - Security that Thinks. Real-time, Smart and Simple Web and Mail Security Solutions.

Transcription:

TRITON AP-WEB Cloud COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

TRITON AP-WEB Cloud COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS AND DATA THEFT Your business and its data are under constant attack. Traditional security solutions no longer provide sufficient protection. In fact, they can put you at risk for data loss and litigation. Protecting your network and data against advanced threats, spear phishing and exploit kits are crucial for the survival of your business in an expanding and risky digital world. Customizable Solutions with the option to expand Companies need customizable solutions to meet their needs and budgets to protect against these types of threats as they happen. TRITON AP-WEB offers real-time protection against advanced threats and data theft with modules and deployment options to help you customize your web protection package to your needs. Whether you need protection for remote offices, built-in data theft defenses or a solution for mobile users, TRITON AP-WEB Cloud provides the right coverage and protection you need. Web Security Challenges Most of today s security solutions can t address advanced threats as they happen. TRITON AP-WEB Cloud is advanced, real-time threat defense. REDUCE RISK Complex and uncoordinated multi-vendor security deployments increase security risks. TRITON AP-WEB Cloud provides fully-integrated advanced protection across the entire threat life cycle. IDENTIFY DATA THEFT ATTEMPTS Most standalone DLP solutions are too complex to deploy. TRITON AP-WEB Cloud offers DLP support with industryleading protection. PROTECT A MOBILE WORKFORCE Protect your data and employee web use wherever they work without the need for an appliance. www.forcepoint.com

Forcepoint TRITON AP-WEB Cloud Your reputation is your business. A confidentiality breach means lost business. Bruce Chitester, Security Analyst Adventist Health TRITON AP-WEB Cloud REAL-TIME ANALYSIS FOR ADVANCED THREAT PROTECTION TRITON AP-WEB Cloud goes beyond anti-virus defenses by using eight defense assessment areas in a composite scoring process that uses predictive analysis with the Forcepoint ACE. Multiple real-time content engines analyze full web page content, active scripts, web links, contextual profiles, files and executables. EASY DASHBOARD ACCESS TO FORENSIC DATA The TRITON AP-WEB Cloud advanced threat dashboard provides forensic reporting on who was attacked, what data was targeted, where the data almost went and how the attack was executed. Security incidents include data theft capture when possible. Defenses analyze inbound and outbound communications. INTEGRATED DATA THEFT DEFENSES Industry-leading integrated defenses detect and intercept data theft attempts and provide regulatory compliance for data loss prevention (DLP). Examples of these capabilities include detection of custom-encrypted uploads, password theft, slow data leaks (drip DLP), optical character recognition (OCR) of text within images and geolocation destination awareness. INTEGRATED SANDBOXING Learn how to better protect your company s assets by analyzing the behavior of malware automatically with the integrated Threat Protection Cloud. 3

Enhanced Protection THREAT PROTECTION CLOUD Integrate behavioral sandboxing for automatic and manual analysis of malware files Analyze suspicious files in a virtual environment and look far deeper than simple file execution to provide the highest level of protection from advanced malware. Detailed forensic reporting is automatically provided when malicious files are detected. TRITON AP-MOBILE Extend policies and protection to ios and Android users Extend workplace security policies to mobile devices to protect them from advanced threats, mobile malware, phishing attacks, spoofing and more. TRITON APX The Forcepoint solution for complete protection Extend your protection from TRITON AP-WEB to TRITON AP-EMAIL, TRITON AP-DATA or TRITON AP- ENDPOINT for powerful, unified protection across all channels of attack. www.forcepoint.com

Forcepoint TRITON AP-WEB Cloud Other Capabilites REMOTE USER PROTECTION Manage corporate, branch and remote users with one console and policy with the Web Cloud. MOBILE USER PROTECTION Extend policies and security settings to Android or ios devices by integrating with the TRITON AP-MOBILE solution. FLEXIBLE REPORTING Customizable dashboards with drill down to transaction level. Create a nearly infinite number of reports with over 70 reporting attributes and more than 80 pre-defined and customizable reports. Provide easy-to-read business and technical information as well as valuable insights into threat levels and more. FLEXIBLE SSL INSPECTION Granular SSL inspection capabilities let you monitor HTTPS traffic while maintaining privacy and regulatory requirements. 5

Flexible Deployment Options Roaming Users Choice of endpoint agents to deploy on corporate notebooks and mobile devices* Direct Connect Endpoint for protection behind national firewalls and in complex network environments Proxy Connect Endpoint when advanced threat protection and DLP are a must Remote Offices and Guest Networks Choice of cloud-managed appliances and endpoint agents No on-premises IT required Security you need without backhauling traffic to your data center Headquarters ACE and ThreatSeeker Intelligence Cloud protection across all channels Identify data compliance violations Choice of PAC, IPSec, Firewall redirect & other connectivity options Let us customize a deployment solution for you. *See AP-MOBILE for mobile device protection. www.forcepoint.com

The power behind TRITON solutions ACE Forcepoint ACE provides real-time, inline contextual defenses for Web, email, data and mobile security by using composite risk scoring and predictive analytics to deliver the most effective security available. It also provides containment by analyzing inbound and outbound traffic with data-aware defenses for industry-leading data theft protection. Classifiers for real-time security, data and content analysis the result of years of research and development enable ACE to detect more threats than traditional anti-virus engines every day (the proof is updated daily at http://securitylabs.forcepoint.com). ACE is the primary defense behind all Forcepoint TRITON solutions and is supported by the Forcepoint ThreatSeeker Intelligence Cloud. INTEGRATED SET OF DEFENSE ASSESSMENT CAPABILITIES IN 8 KEY AREAS. WEB + EMAIL ATTACKS 10,000 analytics available to support deep inspections Predictive security engine sees several moves ahead Anti- Malware Reputation Analysis Behavioral Sandboxing Inline operation not only monitors, but blocks threats WEB ATTACKS URL Classification Real-time Security Classification ACE Anti-Spam/ Phishing EMAIL ATTACKS Real-time Content Classification Real-time Data Classification DATA THEFT www.forcepoint.com

Forcepoint TRITON AP-WEB Cloud ThreatSeeker Intelligence Cloud The ThreatSeeker Intelligence Cloud, managed by Forcepoint Security Labs, provides the core collective security intelligence for all Forcepoint security products. It unites more than 900 million endpoints, including inputs from Facebook, and with Forcepoint ACE security defenses, analyzes up to 5 billion requests per day. This expansive awareness of security threats enables the ThreatSeeker Intelligence Cloud to offer real-time security updates that block advanced threats, malware, phishing attacks, lures and scams, and provides the latest web ratings. The ThreatSeeker Intelligence Cloud is unmatched in size and in its use of ACE real-time defenses to analyze collective inputs. (When you upgrade to Web Security, the ThreatSeeker Intelligence Cloud helps reduce your exposure to web threats and data theft.) TRITON Architecture With best-in-class security and a unified architecture, Forcepoint TRITON offers point-of-click protection with real-time, inline defenses from Forcepoint ACE. The unmatched real-time defenses of ACE are backed by Forcepoint ThreatSeeker Intelligence Cloud and the expertise of Forcepoint Security Labs researchers. The powerful result is a single, unified architecture with one unified user interface and unified security intelligence. TRITON APX TRITON APX provides many key benefits to organizations interested in deploying the best possible protection against advanced threats across the threat life cycle or 7-Stage Kill Chain. These key benefits include: Deploy Adaptive Security - Deploy adaptive security solutions for rapidly changing technology and threat landscapes. Protect Everywhere - The perimeter is the data. Protect critical data from theft, whether it s in the office, on the road or in the Cloud. Raise the Security IQ - Combat the cybersecurity skills shortage by providing predictive and actionable intelligence across the entire threat lifecycle. 8

CONTACT www.forcepoint.com/contact Forcepoint is a trademark of Forcepoint LLC. SureView, ThreatSeeker and TRITON are registered trademarks of Forcepoint LLC. Raytheon is a registered trademark of Raytheon Company. All other trademarks and registered trademarks are property of their respective owners. [BROCHURE_TRITON_AP_WEB_CLOUD_EN] 400013.072216