• slide
  • slide
  • slide

Overview

Forcepoint is the leading user and data protection cybersecurity company, entrusted to safeguard organizations most critical data and IP, while driving digital transformation and growth. Rather than offering a static one-size fits all approach that stifles innovation and creates vulnerabilities, Forcepoint is attuned to how people interact with data, providing secure access while enabling employees to create value.

Forcepoint behavior-based solutions adapt to risk in real time and are delivered via a converged security platform to protect network users and cloud access, prevent confidential data from leaving the corporate network, and eliminate breaches caused by insiders. Based in Austin, Texas, Forcepoint creates safe, trusted environments for thousands of enterprise and government customers in more than 150 countries.

Products

  • Forcepoint CASB

    Complete visibility and control over your cloud environment. The broadest cloud application support. Forcepoint CASB (cloud access security broker) integrates with DLP solutions to provide unified data protection extending from on-premises to the cloud environment.

  • Forcepoint Web and Email Security

    Industry-leading unified protection safeguards against data breaches and advanced threats at any location, on any device.

  • Forcepoint Behavioral Analytics

    User and entity behavior analytics (UEBA) for a zero-perimeter world. The leader in actionable insights based on risk-adaptive scoring.

  • Forcepoint DLP

    Follow your data across networks and devices—both at rest and in use. Create and enforce policies that provision the access and movement of data to prevent data breaches and help ensure compliance.

  • Forcepoint Insider Threat

    User visibility and incident context for sensitive data. The most comprehensive understanding of user intent, trusted on over 1 million endpoints.

  • Forcepoint SD-WAN and NGFW

    Forcepoint uniquely combines enterprise software-defined wide-area network (SD-WAN) connectivity with the most secure and efficient enterprise next-generation firewall (NGFW) available- enabling high-availability, centralized management and robust protection for mission-critical applications.

  • Forcepoint Behavioral Analytics

    Forcepoint Behavioral Analytics enables virtual data warehousing technology that accesses data at high speed without ever needing to move or copy it. FBA also employs federated search, powerful algorithms for automated information discovery, and intuitive workflow tools.

  • Forcepoint AMD

    Advanced malware detection sandboxing technology maximizes the security efficacy of Forcepoint products and eliminates the distraction of false positives.

  • Forcepoint Trusted Thin Client

    Gives users secure, simultaneous access to information on any number of networks from a single endpoint. Designed for enterprise deployments, Trusted Thin Client provides administrators with centralized management and monitoring, scalability to easily add networks and clients, and the flexibility to enable users in offices, in-theater, and in the field.

  • Forcepoint High Speed Guard and High Speed Guard SP

    Permits highly complex, bi-directional, automated data transfers between multiple domains, specializing in realtime streaming video. High Speed Guard has demonstrated the fastest bi-directional transfer rates of more than nine gigabits per second (Gb/s) with latencies as low as 1.3 ms. When implemented as Forcepoint High Speed Guard SP, the solution is adaptable to specific mission needs where strict size, weight, power and cooling (SWaP-C) specifications are required. TSABI since 2001, SABI since 2013 and designed to meet current NSA Raise-The-Bar guidelines.

  • Forcepoint Trusted Gateway System

    Delivers exceptional built-in manual review and automatic validations, such as virus scanning, file type verification, dirty word search, and deep content inspection, enabling safe and simultaneous data movement between networks at different sensitivity levels.

  • Forcepoint Trusted Print Delivery

    Allows users to print from existing applications at different security or sensitivity levels to a single printer located on the high-side network. Because it enables reduced printer hardware at individual security levels, it reduces capital investment, printer inventory, hardware maintenance/ supplies, and administration.

  • Forcepoint Trusted Mail System

    Enables the policy-enforced exchange of emails and attachments between users on different networks,

    eliminating the need to switch between email systems at multiple levels. Trusted Mail System provides a “single inbox” that consolidates email and calendar entries residing on multiple networks, at the highest level, making it less likely that important and mission-sensitive email communications are overlooked.

  • Forcepoint SimShield

    A fixed-format data guard with the capability to label, segregate, protect, and exchange data between systems executing at different sensitivity or classification levels. SimShield meets the data format, near real-time performance, and low latency requirements for distributed simulation operations, live training exercises, and test events. SABI since 2000 and the first Forcepoint product to meet current Raise-The-Bar guidelines.

  • Forcepoint WebShield

    Delivers secure web search and browse-down capabilities from high side networks to lower level networks. Users surfing lower level networks can be restricted to specific server and file types as defined by security policies. All requests, responses, and transfers go through security controls, such as, dirty word search, virus scan, and malicious content checks.

EULA

Overview

Forcepoint is the leading user and data protection cybersecurity company, entrusted to safeguard organizations most critical data and IP, while driving digital transformation and growth. Rather than offering a static one-size fits all approach that stifles innovation and creates vulnerabilities, Forcepoint is attuned to how people interact with data, providing secure access while enabling employees to create value.

Forcepoint behavior-based solutions adapt to risk in real time and are delivered via a converged security platform to protect network users and cloud access, prevent confidential data from leaving the corporate network, and eliminate breaches caused by insiders. Based in Austin, Texas, Forcepoint creates safe, trusted environments for thousands of enterprise and government customers in more than 150 countries.

Products

  • Forcepoint CASB

    Complete visibility and control over your cloud environment. The broadest cloud application support. Forcepoint CASB (cloud access security broker) integrates with DLP solutions to provide unified data protection extending from on-premises to the cloud environment.

  • Forcepoint Web and Email Security

    Industry-leading unified protection safeguards against data breaches and advanced threats at any location, on any device.

  • Forcepoint Behavioral Analytics

    User and entity behavior analytics (UEBA) for a zero-perimeter world. The leader in actionable insights based on risk-adaptive scoring.

  • Forcepoint DLP

    Follow your data across networks and devices—both at rest and in use. Create and enforce policies that provision the access and movement of data to prevent data breaches and help ensure compliance.

  • Forcepoint Insider Threat

    User visibility and incident context for sensitive data. The most comprehensive understanding of user intent, trusted on over 1 million endpoints.

  • Forcepoint SD-WAN and NGFW

    Forcepoint uniquely combines enterprise software-defined wide-area network (SD-WAN) connectivity with the most secure and efficient enterprise next-generation firewall (NGFW) available- enabling high-availability, centralized management and robust protection for mission-critical applications.

  • Forcepoint Behavioral Analytics

    Forcepoint Behavioral Analytics enables virtual data warehousing technology that accesses data at high speed without ever needing to move or copy it. FBA also employs federated search, powerful algorithms for automated information discovery, and intuitive workflow tools.

  • Forcepoint AMD

    Advanced malware detection sandboxing technology maximizes the security efficacy of Forcepoint products and eliminates the distraction of false positives.

  • Forcepoint Trusted Thin Client

    Gives users secure, simultaneous access to information on any number of networks from a single endpoint. Designed for enterprise deployments, Trusted Thin Client provides administrators with centralized management and monitoring, scalability to easily add networks and clients, and the flexibility to enable users in offices, in-theater, and in the field.

  • Forcepoint High Speed Guard and High Speed Guard SP

    Permits highly complex, bi-directional, automated data transfers between multiple domains, specializing in realtime streaming video. High Speed Guard has demonstrated the fastest bi-directional transfer rates of more than nine gigabits per second (Gb/s) with latencies as low as 1.3 ms. When implemented as Forcepoint High Speed Guard SP, the solution is adaptable to specific mission needs where strict size, weight, power and cooling (SWaP-C) specifications are required. TSABI since 2001, SABI since 2013 and designed to meet current NSA Raise-The-Bar guidelines.

  • Forcepoint Trusted Gateway System

    Delivers exceptional built-in manual review and automatic validations, such as virus scanning, file type verification, dirty word search, and deep content inspection, enabling safe and simultaneous data movement between networks at different sensitivity levels.

  • Forcepoint Trusted Print Delivery

    Allows users to print from existing applications at different security or sensitivity levels to a single printer located on the high-side network. Because it enables reduced printer hardware at individual security levels, it reduces capital investment, printer inventory, hardware maintenance/ supplies, and administration.

  • Forcepoint Trusted Mail System

    Enables the policy-enforced exchange of emails and attachments between users on different networks,

    eliminating the need to switch between email systems at multiple levels. Trusted Mail System provides a “single inbox” that consolidates email and calendar entries residing on multiple networks, at the highest level, making it less likely that important and mission-sensitive email communications are overlooked.

  • Forcepoint SimShield

    A fixed-format data guard with the capability to label, segregate, protect, and exchange data between systems executing at different sensitivity or classification levels. SimShield meets the data format, near real-time performance, and low latency requirements for distributed simulation operations, live training exercises, and test events. SABI since 2000 and the first Forcepoint product to meet current Raise-The-Bar guidelines.

  • Forcepoint WebShield

    Delivers secure web search and browse-down capabilities from high side networks to lower level networks. Users surfing lower level networks can be restricted to specific server and file types as defined by security policies. All requests, responses, and transfers go through security controls, such as, dirty word search, virus scan, and malicious content checks.

EULA

Contracts

Federal

ITES-SW2

W52P1J-20-D-0042
Aug 31, 2020- Aug 30, 2025
*Additional Option Years Available

CDM

47QSWA18D008F
Aug 22, 2018- Aug 21, 2023

State and Local

Educational Software Solutions and Services - OMNIA Partners, Public Sector

R191902
Feb 27, 2020- Apr 30, 2023
*Additional Option Years Available

Education

Illinois Learning Technology Purchase Program (ILTPP)

ILTPP-19CT011
May 20, 2019- Mar 01, 2022

Massachusetts Higher Education Consortium (MHEC)

MC15-04
Aug 10, 2019- Jun 30, 2022

NJSBA

E-8801-ACESCPS
Oct 20, 2015- Sep 03, 2025

Events

Past Events, Webinars & Trainings

News

Latest News

Forcepoint, a global leader in data-first cybersecurity, today announced strategic investments to the company’s Global Partner Program.
READ MORE >

Resources

E-Book

Security Tips for Enabling Teams to Work Outside the Office

Guide

Forcepoint's security solutions include data loss prevention, insider threat, and cross domain products that are Raise The Bar Compliant. Download the resource to learn more!

Forcepoint-microsite.png
Forcepoint Guide
Infrastructure-centric security deployed today divides enterprise users into two domains, trusted users on the inside and untrusted individuals on the outside. Security leaders are focused on deploying controls to keep the untrusted individuals out. However, digital transformation and multi-cloud...

Resources

Each office requires extensive infrastructure, office space, power consumption, and administration. In addition, field operatives are unable to access mission-critical resources unless using a complex array of encryptors. To accomplish this large scale effort, the military enterprise selected Force...

The Biden administration’s Cybersecurity Executive Order (Cyber EO) issued in May 2021 marks the Federal government’s most determined effort yet to not only propose – but also to enforce through sustained government-wide action – the kinds of fundamental changes needed to advance civilian agency cyb...

Forcepoint provides secure, real-time data-sharing across multiple domains, allowing organizations to reduce their hardware, software, and infrastructure needs; streamline network administrator security tasks; and enhance network visibility.

Whitepaper

Zero_Trust_thumbnail.jpg
Forcepoint Whitepaper
A Forcepoint guide for agencies

Forcepoint Next Generation Firewall (NGFW) connects and protects people and the data they use throughout the enterprise network – all with the greatest efficiency, availability and security. Trusted by thousands of customers around the world, Forcepoint network security solutions enable busines...