Complete visibility and control over your cloud environment. The broadest cloud application support. Forcepoint CASB (cloud access security broker) integrates with DLP solutions to provide unified data protection extending from on-premises to the cloud environment.
Industry-leading unified protection safeguards against data breaches and advanced threats at any location, on any device.
User and entity behavior analytics (UEBA) for a zero-perimeter world. The leader in actionable insights based on risk-adaptive scoring.
Follow your data across networks and devices—both at rest and in use. Create and enforce policies that provision the access and movement of data to prevent data breaches and help ensure compliance.
User visibility and incident context for sensitive data. The most comprehensive understanding of user intent, trusted on over 1 million endpoints.
Forcepoint uniquely combines enterprise software-defined wide-area network (SD-WAN) connectivity with the most secure and efficient enterprise next-generation firewall (NGFW) available- enabling high-availability, centralized management and robust protection for mission-critical applications.
Forcepoint Behavioral Analytics enables virtual data warehousing technology that accesses data at high speed without ever needing to move or copy it. FBA also employs federated search, powerful algorithms for automated information discovery, and intuitive workflow tools.
Advanced malware detection sandboxing technology maximizes the security efficacy of Forcepoint products and eliminates the distraction of false positives.
Gives users secure, simultaneous access to information on any number of networks from a single endpoint. Designed for enterprise deployments, Trusted Thin Client provides administrators with centralized management and monitoring, scalability to easily add networks and clients, and the flexibility to enable users in offices, in-theater, and in the field.
Permits highly complex, bi-directional, automated data transfers between multiple domains, specializing in realtime streaming video. High Speed Guard has demonstrated the fastest bi-directional transfer rates of more than nine gigabits per second (Gb/s) with latencies as low as 1.3 ms. When implemented as Forcepoint High Speed Guard SP, the solution is adaptable to specific mission needs where strict size, weight, power and cooling (SWaP-C) specifications are required. TSABI since 2001, SABI since 2013 and designed to meet current NSA Raise-The-Bar guidelines.
Delivers exceptional built-in manual review and automatic validations, such as virus scanning, file type verification, dirty word search, and deep content inspection, enabling safe and simultaneous data movement between networks at different sensitivity levels.
Allows users to print from existing applications at different security or sensitivity levels to a single printer located on the high-side network. Because it enables reduced printer hardware at individual security levels, it reduces capital investment, printer inventory, hardware maintenance/ supplies, and administration.
Enables the policy-enforced exchange of emails and attachments between users on different networks,
eliminating the need to switch between email systems at multiple levels. Trusted Mail System provides a “single inbox” that consolidates email and calendar entries residing on multiple networks, at the highest level, making it less likely that important and mission-sensitive email communications are overlooked.
A fixed-format data guard with the capability to label, segregate, protect, and exchange data between systems executing at different sensitivity or classification levels. SimShield meets the data format, near real-time performance, and low latency requirements for distributed simulation operations, live training exercises, and test events. SABI since 2000 and the first Forcepoint product to meet current Raise-The-Bar guidelines.
Delivers secure web search and browse-down capabilities from high side networks to lower level networks. Users surfing lower level networks can be restricted to specific server and file types as defined by security policies. All requests, responses, and transfers go through security controls, such as, dirty word search, virus scan, and malicious content checks.