Forcepoint is a Raytheon company offering the industry’s leading suite of cybersecurity, data protection and compliance tools for business and the government sector.
Forcepoint Triton AP-Web for web filtering and security blocks web threats to reduce malware infections, decrease help desk incidents and frees up valuable IT resources. With more than 120 security and filtering categories, hundreds of web application categories, hundreds of web application and protocol controls, and 60-plus reports with customization and role-based access, Triton AP-Web is an easy, transparent filter and security solution that avoids the complexity of a proxy gateway. With Triton AP-Web you will receive:
Triton AP-Data allows you to gain the visibility and data controls to keep critical data secure. Triton AP-Data gives you the defenses you need to protect your sensitive data wherever it lives — on endpoints, in the cloud or on-premise. Its powerful DLP functionality and other features help you secure financial records, intellectual property, personally identifying information (PII) and other sensitive data, while a user-friendly wizard makes it easy to deploy. Simply choose your geographic location and industry, and see in a single template all the common compliance regulations relevant for you.
From regulatory compliance data to intellectual property, Forcepoint keeps your data secure regardless of where it resides. PreciseID fingerprinting gives you the ability to discover even just a partial fingerprint of structured or unstructured data on Mac OS and Microsoft endpoint devices, on and off the corporate network. Forcepoint DLP functionality in Triton AP-Data empowers your business to:
Advanced Threats blend Web and email elements throughout multi-stage cyberattacks to probe for the weakest channel of attack, but this strategy also presents multiple opportunities to stop those attacks before possible breaches occur. Triton AP-Email Cloud secures the communication channel most often used in the early stages of an APT or other advanced attack while empowering mobile workers and safe adoption of new technologies like Microsoft Office 365.
Triton AP-Email Cloud is available in the cloud to give you the security you need by protecting you against multi-stage advanced threats that often exploit email to penetrate your IT defenses. It applies thousands of real time threat analytics, behavioral sand-boxing and other advanced defense technologies to identify targeted attacks.
SureView Insider Threat is data & insider threat protection that gives you the visibility and context you need to eliminate insider threats. SureView Insider Threat provides visibility into the many areas that network devices can’t:
SureView Insider Threat protects your systems from the unintentional insider threat:
SureView Insider Threat was designed as an insider threat solution starting in 2001. It is not, like some technologies, a solution retrofitted to the problem. The SureView Insider Threat team are domain experts who have spent their careers in information protection. Whether the incident is accidental or deliberate, or somewhere in-between, SureView Insider Threat gives you complete visibility and quickly identifies the riskiest users in your organization, all while preserving employee privacy guidelines.
Forcepoint Stonesoft Next Generation Firewall is a highly available, scalable and flexible protection against advanced threats. Forcepoint Stonesoft Next Generation Firewalls protect enterprise networks with high-performance “intelligence aware” security supported by real-time updates. This enables Stonesoft to deliver the industry’s best defense against advanced evasions, along with complete next-generation firewall protection when and where you need it at remote sites, branch offices, data centers, and the network edge.
Forcepoint Stonesoft Next Generation Firewalls (NGFW) start with a solid foundation of protection, including granular application control, an intrusion prevention system (IPS), built-in virtual private network (VPN), and deep packet inspection, all in an efficient, extensible, and highly scalable unified design. Then we add powerful anti-evasion technologies that decode and normalize network traffic — before inspection and across all protocol layers — to expose and block the most advanced attack methods.
4681 Research Park Blvd
Huntsville, AL 35806