DATA SECURITY & DLP

DATA SECURITY & DLP

Secure Confidential Data, Manage Risk and Meet Compliance with TRITON

Traditional Security architecture combined the best point solutions to solve problems in any given zone to mitigate identifiable risks. This has changed because good practice demands a unified approach to correlating the movement of data within the network and monitoring the egress points (exits) of sensitive data. Forcepoint’s solution limits the threats posed by the inappropriate access or removal of data from the confines of your secured environment. The complexity of this task has increased with the widespread adoption of Cloud Computing. The surface area increase requires system administrators to correlate events and track data movement across a multitude of devices and transport corridors. To make this task easier, Forcepoint’s AP family of products can be implemented or the APX Suite deployed to meet threats from all attack vectors and unknown assailants that includes the enemy within. The suite protects the endpoint, data in motion or at rest and transiting through ingress or egress points that connect to external resources.

  • Highly accurate, real-time identification and classification of threats using TRITON ACE
  • Real-time threat intelligence from the Forcepoint ThreatSeeker Intelligence Cloud, which gives visibility into current global cyber threat activity
  • Unified management, reporting and dashboards
  • Expansion and integration options with Threat Protection Cloud, Threat Protection Appliance and SureView Insider Threat
  • Granular reporting for compliance, HR or billing
  • Built on the foundation of well established technology from Websense and SurfControl




TRITON-AP-ENDPOINT

Protecting sensitive data from exfiltration is achieved by flexible administrative tools that control web, email, DLP and endpoint from a single console.Protecting sensitive data from exfiltration is achieved by flexible administrative tools that control web, email, DLP and endpoint from a single console.

  • Discover and secure critical data from exfiltration, irrespective of whether users are on or off the corporate networkDiscover and secure critical data from exfiltration, irrespective of whether users are on or off the corporate network
  • Secure Multiple OS endpoints and protect against data loss via USB and other removable media
  • Gain visibility and control over data in cloud services like Microsoft® Office 365™
  • Meet compliance and regulatory requirements with a library of out-of-the-box policies
  • Meet the needs of auditors with standard or custom reporting
  • Precise file fingerprinting enable fragment identification that prevents “drip-feed” data exfiltration
  • Image exfiltration feature upgrade is available to prevent data theft using image exfiltration

TRITON-AP-EMAIL

AP-Email secures the communication channel most often used in the early stages of an APT or other advanced attack to identify targeted threats as well as high-risk users and Insider Threats while empowering mobile workers and safe adoption of new technologies like Microsoft Office 365™.
AP-Email applies real-time behavioural sandboxing, enterprise-grade DLP and other advanced defence technologies to identify targeted attacks, high-risk users and insider threats while it monitors outbound email to prevent leaks of sensitive information.
AP-Email is powered by TRITON ACE and ThreatSeeker® Intelligence Cloud, which work together in real time to accurately identify and classify network traffic, apply policies and detect threats in real-time. Unified management and reporting functions streamline work for your IT administrators, giving them the context and insights they need to minimise the dwell time of attacks and prevent data theft.
The common TRITON APX architecture also makes it simple to deploy TRITON AP-EMAIL separately or in any combination with TRITON AP-WEB, TRITON AP-DATA and TRITON AP-ENDPOINT.

  • Cloud, on-premise or hybrid deployment
  • Enterprise-grade DLP protection
  • Highly accurate, real-time identification and classification of threats using TRITON ACE
  • Real-time threat intelligence from the Forcepoint ThreatSeeker Intelligence Cloud, which gives visibility into current global cyber threat activity
  • Unified management, reporting and dashboards across all TRITON APX products
  • Advanced options for email encryption, archiving, image analysis and more

SureView Security Analytics

SureView works with TRITON modules to analyse suspicious behaviour and detect insider threats.
By employing virtual data warehousing, federated search, powerful algorithms for automated information discovery and intuitive workflow tools, Sureview gives security analysts the ability to respond immediately to cyber threats, fraud, other criminal activity. Forcepoint’s Sureview baselines behaviour to establish what is normal for each individual and for the organisation as a whole. It then identifies deviations from that behaviour, automatically placing risky users in a high-watch group for closer scrutiny. The system collates relevant information from across your enterprise and displays it in an intuitive, visual dashboard so that it can easily be reviewed and understood by even non-technical security personnel.
SureView Insider Threat provides visibility into the many areas that network devices can’t and helps to identify;

  • Deliberate, malicious acts such as intellectual property (IP) theft, fraud or sabotage that easily circumvent most data leak solutions
  • Mobile and internal users who take themselves offline or use encryption to avoid detection
  • Suspicious user activity within complex applications, including email programs and custom deployments of Enterprise Risk Management (ERM) and other solutions
  • “Leading indicator” actions, such as a screen capture that has been encrypted and saved to a USB drive
  • TRITON-AP-DATA

    Forcepoint AP-Data protects corporate data irrespective of whether it’s located in the Cloud or stored on the local Server. A simple wizard based interface makes deployment easy and localisation options simplify setup. Templates are included that provides out-of-the-box geo-compliance guidance for rapidly meeting local regulations and compliance mandates.
    Cloud Service Deployment
    Securely deploy Salesforce.com and Office 365 with safeguards already in place to protect the integrity of your data.
    From regulatory compliance data to intellectual property, Forcepoint keeps your data secure regardless of where it resides. PreciseID™ fingerprinting gives you the ability to discover even just a partial fingerprint of structured or unstructured data on Mac OS® and Microsoft endpoint devices, on and off the corporate network.
    What is AP-Data?
    AP-Data is made up of two key components that locate and catalogue the data, then secure it using a gateway.
    Discover;
    AP-Data Discover enables you to detect and secure data-at-rest across your network as well as in Cloud services such as Microsoft Office 365. With the addition of AP-Endpoint DLP, the discovery process can be extended to MacOS and Microsoft Windows endpoints within or external to the network. Cloud services can be quickly secured when data files are logged and an inventory of digital assets is made.
    To protect your data you must know where it resides. AP-Data’s Discover locates and protects data in the cloud and with an optional upgrade module can extend your protection to screenshots or other images that Forcepoint’s leading OCR can decode and block.
    Gateway;
    The AP-Data-Gateway stops data theft when data-in-motion passes through email and Web channels when the software identifies and prevents malicious and accidental data exfiltration. When combined with AP-Data-Endpoint a coordinated defence strategy that protects the organisation from orchestrated attacks whether originating from outside vectors or the trusted insider. Filters can be created that quarantine or block tax file or credit card information to protect employees from risk or legal censure if privacy legislation is breached.

    • Drip DLP protects orchestrated exfiltration
    • Optical character recognition (OCR) is used to identify data conveyed in images
    • Unified management consoles provide reporting and across all TRITON APX products for easier administration
    • AP-DATA-365 protects IP stored in Microsoft’s Azure™ Cloud and allows you to discover and protect digital assets located there

    Image-Analysis Module
    The Forcepoint™ Image Analysis Module provides powerful illicit image detection capabilities to help employers monitor images distributed through email, educate staff members and enforce the organisation’s policies. This could also protect the organisation against possible HR risks posed by inappropriate content traversing your organisation’s network.

    TRITON-AP-WEB

    AP-Web stops more advanced, non-signature based threats to your data than any other solution available. a unified platform that enables all of our products to work together and provides industry-leading reporting, sandboxing and DLP capabilities. AP-Web gives you the Web security you need because it provides comprehensive real-time, inline protection against advanced threats that use sophisticated techniques to evade detection. These steps will stop the theft of your sensitive data through the web as well as insider threats such as employee theft and malware that slips into your network.

    • Enterprise-grade DLP protection
    • Highly accurate, real-time identification and classification of threats using TRITON ACE
    • Real-time threat intelligence from the ThreatSeeker Intelligence Cloud, which gives visibility into current global cyber threat activity
    • Unified management, reporting and dashboards across all TRITON APX products

    ThreatSeeker provides real-time protection