View
Sorting
Products found: 32
Forcepoint Advanced Malware Detection
Forcepoint CASB (Cloud Access Security Broker)
Forcepoint Data Guard
Forcepoint Data Guard is the ideal choice for customers that require the highest degree of sensitive data protection for national and mission security.
The Forcepoint Advantage
- Eliminates costly and time-consuming manual data transfers
- Delivers byte-level deep content inspection, data validation and filtering that can be tailored to customer-specific security policies, requirements and risks
- Enables real-time video streaming (MPEG2-TS)
- Supports TCP and UDP over IP and adaptability for custom interfaces
- Provides highly customizable data validation rules for maximum flexibility
- Streamlines the SIEM alert and monitoring process with rapid data transfer from lower-level networks to a single higher-level network
- Derived from the Common Criteria-evaluated, Red Hat Enterprise Linux 7 secure operating system with Security Enhanced Linux (SELinux) modules
Forcepoint DLP
- Optical Character Recognition (OCR) identifies data imbedded in images while at rest or in motion (available with Forcepoint DLP – Network).
- Robust identification for Personally Identifiable Information (PII) offers data validation checks, real name detection, proximity analysis and context identifiers.
- Custom encryption identification exposes data hidden from discovery and applicable controls.
- Cumulative analysis for drip DLP detection (i.e., data that leaks out slowly over time).
- Integration with Microsoft Azure Information Protection analyzes encrypted files and applies appropriate DLP controls to the data.
Forcepoint Email Security
Forcepoint Email Security Cloud’s proactive URL Wrapping and Phishing Education secure email wherever users need access, even on mobile devices. Our unrivaled cloud infrastructure delivers phishing, malware and DLP protection for Microsoft Office 365™ and other popular email systems.
The Forcepoint Email Security advantage
Real-time threat protection
Real-time threat protection uses a unique blend of detection technologies, including machine learning, sandboxing, and predictive analytics to effectively stop advanced threats such as ransomware. Protection against highly evasive zero-day threats
Get advanced malware detection (sandboxing) with our full system emulation sandbox. Deep content inspection reveals highly evasive zero-day threat with no false positives. Powerful encryption for additional protection
Encrypt sensitive email conversations and enhance mobile security by controlling sensitive attachments access by device. Incident risk ranking to find the greatest risks
Incidents are correlated across multiple events to identify true cumulative risk trends and activity. A risk score is included to help security teams identify the greatest risks based on real-time activity. Integrated data loss prevention
Integrated industry-leading data loss prevention stops data infiltration and exfiltration capabilities. Unique phishing education feature
Use Forcepoint Email Security’s unique phishing education features to help users adopt best practices and identify those who need additional training to improve their security awareness. Complete out-of-the-box solution
Forcepoint Email Security includes DLP, URL wrapping, and other capabilities that are considered premium "add-ons" or upgrades by many competitors, delivering the most comprehensive inbound and outbound defenses out of the box. Deployment flexibility
How you deploy our email security solution is up to you. Choose from a range of physical and virtual appliances to leverage existing hardware, cloud deployment, or hybrid environments.
Forcepoint Email Security Cloud, Forcepoint Web Security Cloud
Forcepoint Email Security applies real-time behavioral sandboxing, enterprise-grade DLP and other advanced defense technologies to prevent leaks of sensitive information, empowering your workers — in the office or on the road — as you safely adopt technologies like Microsoft Office 365. In addition, detect phishing and secure email wherever users need access, even on mobile devices, through features like Phishing Education and URL Wrapping. Your business and data are under constant attack. Traditional filtering and antivirus products no longer provide sufficient protection, and many web security solutions can’t address advanced threats as they occur. Forcepoint Web Security provides advanced, real-time threat defense to stop advanced threats and prevent data loss. It provides robust protection through context- and content-aware defenses, coupled with integrated Cloud Access Security Broker (CASB) functionality, to provide control and visibility for cloud applications on both on-premises and roaming users. The combination of industry-leading web protection, CASB functionality and enterprise DLP delivers protection at a value no other vendor can match.
Forcepoint NGFW
Decrypt traffic while safeguarding privacy
Inspect attacks and stolen data hidden inside encrypted SSL/TLS traffic while still protecting users' privacy. Extend your network into the cloud
Deploy applications safely in Amazon Web Services, Azure, and VMware. Segment different service layers and manage virtual NGFWs and IPSs the same way as physical appliances. Control access to web content
Limit users' access to entire categories of websites containing inappropriate or unsafe content with URL intelligence that’s depended upon around the globe. Protect high-assurance systems
Safeguard your most sensitive, mission-critical networks and applications with Forcepoint’s renowned Sidewinder proxy technology. Regain control of shadow IT
Understand the risk associated with unsanctioned cloud apps so you can redirect users to more appropriate apps or block them altogether. Offer SD-WAN and NGFW security as an MSSP
Manage enterprise-grade connectivity and protection from your own multi-tenant systems, with a business model tailored to the needs of MSSPs.
Key features: Modular appliances for every environment
Our broad range of appliances provide the right price-performance and form factor for each location; pluggable interface cards let you change networks with ease. High availability, mixed clustering
Active-active clustering lets you mix up to 16 different models of appliances for unrivaled scalability, longer lifecycles, and seamless updates without dropping packets. Multi-link connectivity for SD-WAN
Broadband, wireless, and dedicated lines at each location can be centrally deployed and managed, providing full control over what traffic goes over each link with automated failover. Automated, zero-downtime updates
Policy changes and software updates can be deployed to hundreds of firewalls and IPS devices around the world in minutes, not hours, without the need for service windows. Policy-driven centralized management
Smart Policies describe your business processes in familiar terms and are automatically implemented throughout the network, managed in-house or via MSSP. Actionable, interactive 360° visibility
Graphical dashboards and visualizations of network activity go beyond simple reporting, enabling admins to drill into events and respond to incidents faster. Built-in NGFW, VPN, proxies, and more
Unparalleled security comes standard, from top-ranked Next Generation Firewall and IPS to rapid-setup VPNs and granular decryption, as well as our unique Sidewinder proxy technology. Top-ranked anti-evasion defense
Multi-layer stream inspection defeats advanced attacks that traditional packet inspection can't detect—see for yourself in our Evader video series. Human-centric endpoint context
Access policies can whitelist or blacklist specific endpoint apps, patch levels or AV status. Users' behaviors are consolidated into actionable dashboards. Unified virtual and physical security
Native support for AWS, Azure, and VMware has the same capabilities, management, and high performance of our physical appliances. CASB and web security
Our reknowned URL filtering and industry-leading cloud services work together to protect your data and people as they use apps and web content. Anti-malware sandboxing
Forcepoint Advanced Malware Detection blocks previously undetected ransomware, zero-days, and other attacks before they steal sensitive data or damage your systems.
Forcepoint Secure Enterprise SD-WAN
Forcepoint SureView Analytics
Forcepoint Trusted Thin Client
Forcepoint URL Filtering
The Forcepoint Advantage
Web filtering with ThreatSeeker threat intelligence
Identify threats with over 10,000 analytics, machine learning and other advanced techniques maintained through real-time global threat intelligence with Forcepoint Web Security.
Granular user behavior analysis and productivity reporting
More than 60 reports with customization and role-based access.
Customizable allowed/denied url filters
Utilize both timed and/or permanent web filters for managing access to websites.
Industry-leading web security policy controls
More than 120 security and content categories
Forcepoint User and Entity Behavior Analytics (UEBA)
Advanced Compromised Account Detection By understanding attributes like typical access patterns, prevent bad actors from accessing your critical assets and systems with User and Entity Behavior Analytics (UEBA).
Be a Partner to Human Resources Analyze communications-based data sources to identify potential code-of-conduct infractions.
Get More Out of Your SIEM Investment UEBA adds context and analytics to SIEM data and provides risk scoring to incidents organized by entity, allowing analysts to prioritize the highest risks.
Perform Context & Content-Rich Incident Response Enable transparent comprehensive investigation with advanced analytics like machine learning and artificial intelligence that are tuned toward specific behavior risk.
Solve Challenges in Data Security and Regulatory Compliance Analyze and detect patterns of human behavior in big data, delivering insights into enterprise risk where threats have surpassed the perimeter.
Automate DLP Policy Enforcement Combine UEBA with Forcepoint DLP to utilize analytic risk scores to dynamically change DLP policies.
Transparency Understandable analytics with simple explanation and context to make informed decisions about possible insider threats.
Configurability There is no one-size-fits-all UEBA solution. Forcepoint allows customers to build their own use cases and develop their own analytics without the need of a data scientist.
Entity Timeline View all historical activity during forensics stage with dynamic visualization.
Detect Seemingly Unrelated Threats Single alerts lack context to data. UEBA uses natural language processing and sentiment analysis for a holistic view of the user.
Varied Dataset Calculations Data models informed by both structured data, such as SIEM logs, and unstructured data, such as email and chat, from your disparate security tools and third-party applications.
Forcepoint Web Security
Easily extend visibility and control to cloud applications, from shadow IT reporting to full control via inline (proxy) mode. Not just URL filtering Don’t need your traffic forwarded to the cloud? Enable URL filtering in our leading Next Generation Firewall (NGFW), allowing for granular controls based on users and applications. Streamline compliance Meet the highest certification standards across data privacy laws and residency requirements in different jurisdictions—while allowing users to keep doing good things. Expand internet access for roaming users Apply different policies when an employee connects from corporate and non-corporate locations with Forcepoint Web Security. Security and protection beyond the endpoint Extend your existing policies to mobile devices and protect them from Advanced Threats, mobile malware, phishing attacks, spoofing, and more with Web Security. ThreatSeeker Intelligence Unite over 900 million endpoints (including inputs from Facebook), and with Forcepoint ACE security defenses, analyze up to five billion requests per day. This is the core collective intelligence for all Forcepoint products—managed by Forcepoint Security Labs. Enterprise-grade DLP protection Forcepoint’s 9x Magic Quadrant leading DLP and integrated Incident Risk Ranking (IRR) can protect your data from people-based security incidents, including risk caused by accidental, compromised, and malicious insiders. Eliminate crippling false malware with AMD Cloud sandboxing allows you to optimize remediation efforts for incident response teams with comprehensive and actionable intelligence—providing 100% efficacy in malware detection.
Forcepoint Web Security Cloud (formerly TRITON AP-WEB Cloud)
McAfee Active Response
McAfee Active Response is proof of the effectiveness of the integrated McAfee security architecture, which is designed to resolve more threats faster and with fewer resources in a more complex world. McAfee Active Response gives you continuous visibility and powerful insights into your endpoints so you can identify breaches faster. And it provides you with the tools you need to correct issues faster and in the way that makes the most sense for your business. All of this power is managed via McAfee® ePolicy Orchestrator® (McAfee ePO™) software leveraging McAfee Data Exchange Layer—this provides unified scalability and extensibility without the need for incremental staff to administer the product.
Key Advantages
- Automated: Capture and monitor context and system state for changes that may be IoAs, as well as find dormant attack components, and send intelligence to analytics, operations, and forensic teams.
- Adaptable: When alerted, you can adjust to changes in attack methodologies; automate data collection, alerts, and responses to objects of interest; and customize your configuration to customer workflows.
- Continuous: Persistent collectors activate triggers on detection of attack events, alerting you and your systems to attack activity that you
McAfee Advanced Threat Defense
- Configurable operating system and application support: Tailor analysis images with select environment variables to validate threats and support investigation.
- User interactive mode: Enables analysts to interact directly with malware samples.
- Extensive unpacking capabilities: Reduces investigation time from days to minutes.
- Full logic path: Enables deeper sample analysis by forcing execution of additional logic paths that remain dormant in typical sandbox environments.
- Sample submission to multiple virtual environments: Speeds investigation by determining which environment variables are needed for file execution.
- Detailed reports: Provide critical information for investigation including MITRE ATT&CK mapping, disassembly output, memory dumps, graphical function call diagrams, embedded or dropped file information, user API logs, and PCAP information. Threat time lines help visualize attack execution steps.
- Bro Network Security Monitor integration: Deploy Bro sensor to a suspected network segment to monitor and capture traffic and forward files to McAfee Advance Threat Defense for inspection.
McAfee Cloud Workload Security
Cloud-native network control With increased awareness and control of your cloud workloads you can prevent both lateral attacks in the data center and external threats.
Cloud provider direct integration Additional capabilities are enabled through direct integration with cloud providers such as AWS. For example, AWS GuardDuty alerts integrate directly into McAfee ePO, displaying network connections, port probes, and DNS requests for EC2 instances. McAfee Cloud Workload Security:
- McAfee Cloud Workload Security Basic
- McAfee Cloud Workload Security Essentials
- McAfee Cloud Workload Security Advanced
McAfee Complete Data Protection
Key Features
■ Drive encryption
■ File and removable media protection
■ Management of native encryption
Key Advantages
■ Stop data loss initiated by sophisticated malware that hijacks sensitive and personal information.
■ Secure data when it’s stored on desktops, laptops, tablets, and cloud storage.
■ Manage Apple FileVault and Microsoft BitLocker native encryption on endpoints directly from McAfee ePO software.
■ Communicate with and take control of your endpoints at the hardware level, whether they are powered off, disabled, or encrypted to halt desk-side visits and endless helpdesk calls due to security incidents, outbreaks, or forgotten encryption passwords.
■ Prove compliance with advanced reporting and auditing capabilities and monitor events and generate detailed reports that show auditors and other stakeholders your compliance with internal and regulatory privacy requirements.
McAfee Complete EndPoint Protection - Business (CEB)
McAfee Complete Endpoint Threat Protection
McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and sophisticated attacks.
Core endpoint protection, including anti-malware, firewall, device control, email and web security works together with machine learning and dynamic application containment to detect zero-day threats in near real time, and classify and halt them before they can execute on your systems. Actionable forensic data and easy-to-read reports keep you informed and help you make the move from responding to outbreaks, to investigating and hardening your defenses. And, because McAfee Complete Endpoint Threat Protection is built using an extensible framework, you can add other advanced threat defenses with ease as your security needs and the threat landscape evolve.
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.