Contenu connexe Similaire à Securing Beyond the Cloud Generation (20) Plus de Forcepoint LLC (19) Securing Beyond the Cloud Generation1. Copyright © 2018 Forcepoint | 1
Have you outgrown your web security?
Joakim (JK) Lialias
Sr. Director - Product Marketing
2. Copyright © 2018 Forcepoint. | 2
TRENDS IMPACTING APPROACH TO SECURITY
71% of enterprises
have hybrid cloud
deployments
1.87 billion
of mobile workers around
the world by 2020
>1,000
SaaS applications used
at a typical company
1/3 of enterprises will
experience a successful
attack targeting their
Shadow IT resources by
2020
An expanded attack surface that threatens
worker productivity and critical data
3. Copyright © 2018 Forcepoint | 3Copyright © 2018 Forcepoint. | 3
Is your security
solution having
trouble keeping up?
Explore what a modern
security solution looks
like—built to tackle the
evolving threat
landscape while
adapting to today’s
global, mobile
workforce.
4. Copyright © 2018 Forcepoint | 4
CRITICAL CAPABILITIES OF SECURE WEB GATEWAY
Real-time threat defense
against advanced threats
Flexible deployment
options with robust protection
across deployment options
Insight and control to cloud
applications integrated with
Secure Web Gateway
Optimize Secure
Connectivity for mobile
workforce productivity
Data Loss Prevention to
control outbound traffic
containing critical data
5. Copyright © 2018 Forcepoint. | 5
BETTER SECURITY, LESS COMPLEXITY
– AND THE EFFICACY TO BACK IT UP
With Forcepoint, you get comprehensive, real-time threat defense.
Advanced algorithms powering Real-Time Security classification to inspect all web content for
malicious or suspicious code.
Machine learning for Real-Time Content classification to quickly and accurately classify web pages.
Intelligent URL classification to assess and classify new pages and links on the fly.
Unique incident risk rating to quickly cut through the noise delivered by alerts.
POWERED BY FORCEPOINT’S ADVANCED CLASSIFICATION ENGINE (ACE)
+52% better efficacy to protect against real-world threats
compared with the nearest web security competitor.
*Miercom Security Effectiveness Testing https://www.forcepoint.com/2015-miercom-security-effectiveness-test-report
6. Copyright © 2018 Forcepoint. | 6
ACE is why no one stops more
threats than Forcepoint.
+10,000 analytics insights
Signature-based tools
Predictive security engines built on
machine learning and rules-based
algorithms (Signature-less)
Inline operation that blocks threats
MEET ACE – DEFEATING RANSOMWARE AND
SOPHISTICATED THREATS ALONG THE KILL CHAIN
Anti-Malware
Reputation
Analysis
Advanced
Malware
Detection
Anti-Spam/
Phishing
Real-time Data
Classification
Real-time
Content
Classification
Real-time
Security
Classification
URL
Classification
Advanced
Classification
Engine
(ACE)
7. Copyright © 2018 Forcepoint. | 7
EXTEND PROTECTION WITH ADVANCED MALWARE PROTECTION
Unmatched accuracy that eliminates
crippling false positives
Comprehensive and actionable
intelligence to optimize remediation
efforts for incident response teams
Full system emulation to effectively
counter advanced evasions
Shared global threat intelligence that
can update other solutions
+100% efficacy in advanced
malware detection1
Zero false positives when
convicting or exonerating advanced
malware3
1. NSS Labs 2016 APT Test (Lastline)
Forcepoint AMD offers seamless integration with Web Security solutions
for a comprehensive defense delivered via cloud or on-premises
8. Copyright © 2018 Forcepoint. | 8
EXTENDING CASB FUNCTIONALITY TO WEB SECURITY
Forcepoint Secure Web Gateway Cloud
Application Control Module
CASB capabilities for Cloud Application traffic as
it traverses the Forcepoint Web Security
Solution.
• Proxy based activity visibility
• Anomaly detection + UEBA + Risk analysis
• Real-time mitigation options
• AD and SIEM integration
Seamless and smooth implementation of CASB
with one proxy
Building on visibility and control for unsanctioned cloud
applications with advanced CASB functionality tightly integrated
9. Copyright © 2018 Forcepoint. | 9
ADVANCED CASB FUNCTIONALITY…YES IT IS BUILT IN…
10. Copyright © 2018 Forcepoint | 10
FORCEPOINT
IS A TOP CHOICE
FOR ENTERPRISE
COMPANIES.
SEE WHY LEGACY
VENDORS DON’T
EVEN COME CLOSE.
11. Copyright © 2018 Forcepoint. | 11
Forcepoint – Comprehensive Protection Legacy Players – Fragmented Protection
LEGACY VENDORS OFFER FRAGMENTED PROTECTION
Leading zero-day malware protection that
combines ACE, AMD, CASB, and our proven
ThreatSeeker Intelligence cloud.
• INCLUDED + ADVANCED
Create robust reports using an intuitive drag-and-drop
interface—all within a centralized reporting system with
unrivalled visibility and analytics.
• BUILT-IN
Avoid creating a fragmented security solution that requires
multiple solutions for sandboxing and analytics. With
Forcepoint, you get ACE and optional AMD already built in.
• EXPANSIVE CASB INLCUDED
Shadow IT, discovery, and control is a native inclusion in
Forcepoint Web Security. Integrate Inline CASB capabilities
easily with add-on module.
Convoluted solutions requiring multiple
products and vendors to deploy a standard
security solution, incurring additional costs.
• ADDITIONAL COST + LIMITATION
Additional SKUs and costs required beyond basic reporting
capabilities. Reports are not in real-time and not
investigative.
• ADDITIONAL VENDORS
Sandboxing and analytics require third-party vendors like
FireEye or Menlo Security, making your security more
complex to manage.
• ADDITIONAL COST
Looking for a CASB solution? Get ready to spend more
money. With an added SKU comes an additional layer of
complexity, leaving you with a limited, “light” CASB solution
with basic visibility.
12. Copyright © 2018 Forcepoint. | 12
Forcepoint – Effective Protection Legacy Players – Limited Protection
LEGACY VENDORS OFFERS LIMITATIONS IN PROTECTION
Forcepoint ACE engine delivers real-time
protection capabilities for robust protection
against advanced threats.
• REAL-TIME PROTECTION
Advanced predictive analytics that delivers real-time security,
content, and data classification.
• CONTEXTUAL PROTECTION
Broad based contextual assessments done to help ensure
accuracy while helping to eliminate false positives.
• DEEP INSPECTION
Over 10,000 analytics insights that enable deep inspections.
Lack of robust and consistent real-time
protection creating a less effective defense
against advanced threats.
• LACK OF REAL-TIME PROTECTION
No real-time analysis of malicious code. DRTP/WebPulse
is used to categorize web site content and can generate
several false-positives
• LIMITATIONS IN PROTECTION
The engine DRTP/WebPulse cannot scan session-based
content or protect by login prompt. Focused on traditional
web categories and fail with dynamic content (which
increases constantly). Too many “secure all or nothing”
configuration options
• LACK OF ADVANCED SECURITY MECHANISMS
WebPulse analytics is used for detection which lacks
advanced security mechanisms. Weakness in early stages
of an attack (exploit code, obfuscation, etc.).
13. Copyright © 2018 Forcepoint. | 13
Forcepoint – Reliable Mobility
Legacy Players – Unpredictable Mobility
LEGACY VENDORS LEAVE YOU WITH COVERAGE GAPS
• Forcepoint supports the evolving global
workforce with innovative solutions to ensure
connectivity for the anywhere, anytime user.
• We offer adaptable endpoint options to
secure your users, including our patent-
pending Direct Connect Endpoint™.
• Lack of options for endpoint agents and
• No sandbox option for the cloud hinders
your organization’s growth and adaptability
of security solutions that protect the
evolving global, mobile workforce.
14. Copyright © 2018 Forcepoint. | 14
Forcepoint – Adaptive Architecture Legacy Players – Coverage Uncertainty
LEGACY VENDORS MAKE IT DIFFICULT TO SCALE YOUR BUSINESS
• Looking to change deployment
architectures? Prepare for additional
costs and more layers of complexity in
migrating your solution.
• Other legacy vendors are box-heavy,
with drastically more expensive
appliance and maintenance costs—often
bundled into a multi-year agreement.
• Flexible deployment architectures, whether
you’re cloud-first, hybrid, or exploring what
cloud can do for you.
• Only Forcepoint offers true license mobility.
Start where you need to be and move when
you’re ready—without additional
subscription costs.
• Looking for an on-prem solution?
Forcepoint offers enterprise-grade
appliances at a fraction of the cost,
including our no-cost virtual appliance
15. Copyright © 2018 Forcepoint. | 15
YOU DON’T’ WEAR YESTERDAY’S SOCKS
– WHY USE YESTERDAY’S SECURITY SOLUTION?
At Forcepoint, we’re all about reducing
complexity to drive increased productivity with
better security outcomes—with unification of:
Web Security with Cloud Access Security Broker (CASB)
Data Loss Prevention (DLP)
Advanced Malware Detection (AMD)
Next Generation Firewall (URL Filtering)
Products that communicate with each other, share policies,
and create a dynamic environment for receiving, interpreting,
and acting on data.
16. 1
6
ANALYTICS MANAGEMENT ORCHESTRATION
THE FLOW
OF DATA
THE RHYTHM
OF PEOPLE
Forcepoint
UEBA
Forcepoint
SD-WAN &
NGFW
Forcepoint
Insider Threat
Forcepoint
Web & Email
Security
Forcepoint
Data Guard
Forcepoint
DLP
Forcepoint
CASB
SECURE WEB GATEWAY KEY PART OF THE HUMAN POINT SYSTEM
17. THE FLOW
OF DATA
THE
RHYTHM OF
PEOPLE
EACH PRODUCT ELEMENT:
ANALYTICS MANAGEMENT ORCHESTRATION
Forcepoint
UEBA
Forcepoint
SD-WAN &
NGFW
Forcepoint
Insider
Threat
Forcepoint
Web & Email
Security
Forcepoint
Data Guard
Forcepoint
DLP
Forcepoint
CASB
Has best in class capabilities
Can be your starting point
Integrates together as a system with
unified management and policy
Works with an existing environment
DESIGN TENETS OF THE HUMAN POINT SYSTEM
18. Copyright © 2018 Forcepoint | 18
A SECURE WEB GATEWAY THAT
DELIVERS REAL CUSTOMER VALUE
122% return on
investment when switching
to Forcepoint Web Security2
100x reduction in the
number of malware incidents2
52% better efficacy against
real-world threats compared
with nearest competitor1
1. Miercom Testing (2015-2016 Non-Signature Threats)
2. Forrester TEI Study 2017
19. Copyright © 2018 Forcepoint. | 19
LOOKING TO PARTNER WITH YOU
PARTNER WITH
FORCEPOINT.
GET YOU THE
SOLUTION YOU
NEED TODAY.
PLAN FOR WHAT
YOU WANT TO
BUILD TOMORROW.
Notes de l'éditeur HUMAN POINT SYSTEM COMPONENTS
The Human Point system brings together that broad portfolio of products I mentioned earlier to address and understand the rhythm of people and the flow of your data.
It brings together:
UEBA
DLP
Insider Threat
CASB
Next Generation Firewall
Data Guard
Web and Email Security
-- all under the umbrella of analytics common management, and orchestration.
We designed this system very purposefully, with very specific tenets.
HUMAN POINT DESIGN TENETS
We made sure that each product element has best-in-class capabilities and would allow you to start anywhere.
Start with any of our elements
Don’t have to buy them in any particular order or buy all of them
Start with any of them
The more you buy, the better it gets
They integrate together the system with unified management and policy
Key design tenets was to make sure that they work with your existing environment
We know from talking to many CISOs that they’ve made many investments in their security infrastructures. And nobody wants to do a rip and replace. So we made sure that we could integrate with the existing security environments and infrastructure that our customers are ready to put in place.
Let’s look at some examples.