forcepoint cybersecurity solutions -...

30
Copyright © 2017 Forcepoint. All rights reserved. Forcepoint Cybersecurity Solutions

Upload: others

Post on 07-Oct-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved.

Forcepoint

Cybersecurity Solutions

Page 2: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 2

Cloud Security

Forcepoint Email Security

Forcepoint Linux Security

Forcepoint Web Security

Forcepoint CASB

Network Security

Forcepoint NGFW

Data & Insider Threat Security

Forcepoint Insider Threat

Forcepoint DLP

Forcepoint DLP Endpoint

Forcepoint InnerView (Global Governments Business Only)

Forcepoint Convergence

Forcepoint Spotlight

Forcepoint CrossView

Cross Domain & Multi-Level Security

Forcepoint Trusted Thin Client

Forcepoint Trusted Thin Client: Remote

Forcepoint High Speed Guard

Forcepoint Small Format Guard

Forcepoint Trusted Gateway System

Forcepoint Trusted Print Delivery

Forcepoint Trusted Mail System

Forcepoint SimShield

Forcepoint WebShield

Additional Solutions (Global Governments Only)

Forcepoint SureView Analytics

Forcepoint Trusted Access Mobile

LIST OF CYBERSECURITY SOLUTIONS

Page 3: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 3

FORCEPOINT CLOUD WEB

SECURITY

▸ Integrated DLP

▸ Integrated sandboxing

▸ CASB integration

▸ Direct Connect

▸ Easy dashboard access to

forensic data

FORCEPOINT CASB

▸ Integration with Web

Security and DLP

▸ Enables Forcepoint to

understand behaviors in

the cloud

FORCEPOINT CLOUD

EMAIL SECURITY

▸ Integrated DLP

▸ Integrated sandboxing

▸ Rich data collection

▸ Optical Character

Recognition

▸ Encrypted file detection

▸ Image analysis

▸ ADVANCED THREAT

PROTECTION

▸ Sandboxing integrated

with FP Web Security,

Email Security, and

NGFW solutions

▸ Threat Protection for

Linux

CLOUD SECURITY

BUSINESS OUTCOMES PRODUCTS & FEATURES

ACCOLADES

Protecting people from compromise as they use the web and email from any location, on any device

Protect every user, everywhere without the need for

an appliance

Safely embrace business in the cloud

Reliable performance in the industry’s most secure

cloud

Leverage rich data collection to help identify “high

risk” users and defend against insider threats

Help make you compliant (e.g., GDRP)

2016 IDC MarketScape: SaaS Email Security: Leader

2016 IDC MarketScape: Hardware Email Security: Leader

2016 IDC MarketScape: Worldwide Email Security: Leader

2016 IDC MarketScape: WW Web Security: Leader

2015 Forrester Wave: SaaS Web Content Security Wave: Leader

2016 Corporate Web Security Market Quadrant: Top Player2016 Secure Email Gateway Market Quadrant: Top Player

2016 APT Protection Market Quadrant: Top Player2015 Best Web Content Management Solution2014 Best Advanced Persistent Threat (APT) Protection

Page 4: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 4

Stops the spam and phishing emails that introduce ransomware and other advanced threats before they can compromise users or infect systems with malware on the industry’s most secure cloud infrastructure.

Core Email Security defenses can be expanded with dynamic Advanced Malware Detection (aka sandboxing) and the ability to coordinate with Forcepoint Web Security to stop threats across the entire threat lifecycle.

Control Phishing through advanced detection techniques as well as unique Phishing Education. High Risk User Behavior reports and other Forcepoint innovations.

URL Wrapping and other capabilities protect users from threats whenever and wherever they access email, and unique attachment controls can secure sensitive information from being accessed on BYOD or other less secure devices.

Email Encryption secures confidential communications while a range of DLP controls protect IP and other sensitive information from accidental loss or malicious acts by insiders.

Assessment & Authorization/Certification: ISO/IEC 27001, ISO/IEC 27018, Cloud Security Alliance (CSA) Open Security, Trust & Assurance Registry (CSTAR) Certification, HIPAA/HITECH, UK – G-Cloud, Canadian PIPEDA, ENISA, Privacy Shield, ISO 22301, ISO 27017, NIST 800-171, New Zealand Cloud Computing (NZCC) Framework, PCI-DSS, SOC 2 Certified.

Export Notes: Software Encryption classification: 5D002.c.1. Authorized for License Exception ENC under Sections 740.17 (b)(1) and (b)(3) of the EAR. Technology Classification 5E002.a. Authorized for License Exception ENC under Sections 740.17 (A) and (B)(2) (iv) (B).

CLOUD SECURITY: FORCEPOINT EMAIL SECURITY

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 5: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 5

Automates Linux memory forensics to verify the integrity of the

kernel and processes on each server.

Detects rootkits, backdoors, unauthorized processes and other

signs of intrusions that may have penetrated all other defenses.

Its memory forensics alerts can be easily integrated into any existing

Security Incident Event Management (SIEM) system so that your

team can carry out quick, in-depth investigation and response.

Leverages SSH infrastructure for network communication,

eliminating the need for an always-running agent

Export Notes: #G144692 7/31/12, Encryption classification: 5D002.c.1 per 740.17 (B)(3). No

export licenses required worldwide. Semi-annual reporting required. "Use" Technology Classification

5E002.a per 740.17 (B) (2) (IV) (B). No export licenses required worldwide, does have semi-annual

reporting required. Any other technology requires a license.

CLOUD SECURITY: FORCEPOINT LINUX SECURITY

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 6: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 6

The proven leader in preventing data loss, whether deployed in the Cloud, hybrid or on premise.

Real-Time Analysis for Advanced Threat Protection

Integrated Sandboxing

Easy Dashboard Access to Forensic Data

Integrated Data Theft Defenses

Stops more advanced, non-signature threats to your data than any other solution – including Blue Coat, Cisco, and McAfee (Intel Security)!

Assessment & Authorization/Certification: ISO/IEC 27001, ISO/IEC 27018, Cloud Security Alliance (CSA) Open Security, Trust & Assurance Registry (CSTAR) Certification, HIPAA/HITECH, UK – G-Cloud, Canadian PIPEDA, ENISA, Privacy Shield, ISO 22301, ISO 27017, NIST 800-171, New Zealand Cloud Computing (NZCC) Framework, PCI-DSS, SOC 2 Certified.

Export Notes: Software Encryption classification: 5D002.c.1. Authorized for License Exception ENC under Sections 740.17 (b)(1) and (b)(3) of the EAR. Technology Classification 5E002.a. Authorized for License Exception ENC under Sections 740.17 (A) and (B)(2) (iv) (B).

CLOUD SECURITY: FORCEPOINT WEB SECURITY

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 7: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 7

Helps organizations eliminate security and compliance

blind spots by providing visibility and control over

shadow IT and unsanctioned cloud applications.

Provides both the ability to discover the use of unsanctioned

cloud applications and assess associated risk.

Control how sanctioned cloud applications such as Office 365,

Google Suite, Salesforce, Box, Dropbox and others are used in

order to prevent the loss of critical intellectual property.

Enables organizations to embrace the cloud by ensuring that

their users are not engaging in risky behaviors without slowing

them down

Export Notes: The Forcepoint CASB (formerly Skyfence) Cloud software product has been classified with an

ECCN of 5D002.c.1 under the jurisdiction of the U.S. EAR. Forcepoint CASB is authorized for export under

‘ENC/Unrestricted, per 740.17(b)(3)(iii)’.

CLOUD SECURITY: FORCEPOINT CASB

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 8: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 8

NETWORK SECURITY

PRODUCTS & FEATURESBUSINESS OUTCOMES

ACCOLADES

FORCEPOINT NGFW

▸ Connectivity – instant-setup VPNs

▸ Availability – zero-downtime updates

▸ Efficacy – pioneer in IPS evasion defense

▸ Scalability – 16x clustering, orchestration

▸ Manageability – centralized Smart Policies

▸ Visibility – interactive 360° visualization

Connect and Protect seamlessly –

Data Center, Edge, Branch, Cloud

50% Cut in TCO Burden

95% Reduction in Network Downtime

100% Evasion Protection

Giving visibility to people's actions in the network while keeping attackers out – across data centers, offices, branches, and cloud

NETWORKING SECURITY

CONNECT & PROTECT

2016 NSS Labs

RECOMMENDED:

Next Generation Firewall

2016 NSS Labs

RECOMMENDED:

Next Generation IPS

▸ Uniform solution for physical, virtual, cloud

▸ Fast decryption with granular privacy control

▸ Mission-critical application proxies

▸ Broadband network clustering

▸ Sandboxing and Web Security integration

▸ Managed Service Provider (MSP) support

Availability

Connectivity

EfficacyScalability

Manageability

Visibility

Page 9: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 9

Forcepoint Next Generation Firewall (NGFW) protects enterprise networks with high-

performance security supported by real-time updates. This enables Forcepoint to deliver

the industry’s best defense against advanced evasions along with complete NGFW

protection.

Deploy, monitor, and update thousands of firewalls, VPNs and IPSs from a single console.

Eliminate downtime with high-availability clustering and Multi-Link networking.

Block attacks and manage encrypted traffic without hurting performance.

A pioneer in Advanced Evasion Technique defenses and proxy technologies for mission-critical

applications.

Both physical and virtual appliances.

Forcepoint Security Management Center (SMC) enables efficient, centralized management of

NGFWs and IPSs in distributed enterprise environments – from datacenters and edge to

branches and cloud.

Assessment & Authorization/Certification: FIPS 140-2, CSPN by ANSSI certified. Planned UC-APL, CNSSP-11, CNSSI 1253 IA

Controls planned for NGFW 6.4 (Q1 2018).

Export Notes: Software Encryption classification: 5D002.c.1. Authorized for License Exception ENC under Sections 740.17 (a) and

(b)(2) of the EAR. Appliances Classification 5A002.a.1. Authorized for License Exception ENC under Sections 740.17 (a) and (b)(2)

of the EAR. Technology Classification 5E002.a. Authorized for License Exception ENC under Sections 740.17 (A) and (B)(2) (iv) (B).

NETWORK SECURITY: FORCEPOINT NGFW

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 10: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 10

DATA & INSIDER THREAT SECURITY

SOLUTIONSBUSINESS OUTCOMES

ACCOLADES

1 DLP and Insider threat available today. Advanced Data & Insider Threat available 1Q2018

Understanding people’s behavior and intent to protect critical IP

2016 Enterprise Data Loss Prevention MQ:

Leaders Quadrant

2016 Critical Capabilities for Enterprise

DLP: Highest Product Score in Regulatory

Compliance Use Case

2016 Forrester Wave: Data Loss Prevention

Suites: Leader

2015 Best DLP Solution-EMEA

2015 SureView Insider Threat Review

FORCEPOINT DLP▸ Data Discovery

▸ Fingerprinting

▸ Policy Enforcement

▸ Analytics: Incidents

▸ Risk Scoring

FORCEPOINT INSIDER THREAT▸ User Behavior Observation

▸ User Context Capture

▸ Video Capture Replay

▸ Analytics: User Behavior

▸ Risk Scoring

Preventing data breaches and loss

Centralized situational awareness of user and

system activities

More productive employees by understanding intent

Greater efficiency by combining DLP, UEBA, IMS,

SOAR

Satisfying the compliance needs of boards and

regulators

FORCEPOINT ADVANCED DATA

& INSIDER THREAT1

▸ Forcepoint DLP & Insider Threat,

including: Threat Operations,

Response & Orchestration

▸ Advanced Analytics

▸ Risk Adaptive Protection

Observe

Prevent

unauthorized

data movement

Investigate

Protect

Identify

malicious

users

Detailed

metadata &

video to

contextualize

actions

Replay events

with multiple

accounts and

systems

Broad

awareness of

user activities

Monitor accounts

and system

activitiesOrchestrate

Page 11: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 11

Proactive, endpoint, information protection solution that

enables safe and effective use of business-critical

technologies by capturing human behavior technical

observables, which include policy violations, compliance

incidents or malicious acts that are warning signs leading

up to a breach.

Complements APT solutions by providing irrefutable and

unambiguous attribution of end-user activity.

Provides full context for rapidly discerning malicious from

benign actions that are easily reviewed and understood by

non-technical personnel—all while respecting employee

privacy guidelines

Can be deployed for audits and investigations across

multiple network architectures using a wide variety of

security concepts of operations

Export Notes: #G168690 dated 11/14/16: Software Encryption classification: 5D002.c.1.

Authorized for License Exception ENC under Sections 740.17(A) and (B)(3)(iii) of the

EAR. Technology Classification 5E002.a. Authorized for License Exception ENC under

Sections 740.17(A) and (B)(2).

DATA & INSIDER THREAT SECURITY: FORCEPOINT INSIDER THREAT

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 12: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 12

Forcepoint DLP is recognized as one of the most innovative Data Loss Prevention (DLP) solutions designed to secure personal data, intellectual property and other sensitive information on your network from attack and exfiltration.

Incident Risk Ranking Dashboard – First in the industry’s to cluster incidents with risk scoring the severity of the incidents. Generates a stack ranked report identifying the incidents posing the greatest risk to an organization.

Advanced Technology - OCR for visibility to text hidden in an image. Drip DLP to stop the “low and slow” theft of stealing data in small volumes over time. Integrates with an insider threat solution linking data movement to the user behaviors

Export Notes: Software Encryption classification: 5D002.c.1. Authorized for License Exception ENC under Sections 740.17(A) and (B)(3)(iii) of the EAR. Technology Classification 5E002.a. Authorized for License Exception ENC under Sections 740.17(A) and (B)(2).

DATA & INSIDER THREAT SECURITY: FORCEPOINT DLP

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 13: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 13

Forcepoint DLP Endpoint extends Forcepoint

DLP capabilities to protect endpoint devices

against data theft whether they are on or off

the corporate network.

Powerful DLP capabilities enable customers to

secure personal data, intellectual property and other

sensitive information on MacOS, Linux or Windows

endpoints, and USB/Removable media.

Preconfigured policies allow customers to meet

compliance requirements.

Export Notes: Software Encryption classification: 5D002.c.1. Authorized for License

Exception ENC under Sections 740.17(A) and (B)(3)(iii) of the EAR. Technology

Classification 5E002.a. Authorized for License Exception ENC under Sections 740.17(A)

and (B)(2).

DATA & INSIDER THREAT SECURITY: FORCEPOINT DLP ENDPOINT

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 14: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 14

Proactive User Activity Monitoring (UAM) and insider threat management solution that provides a low-risk, high-capability path to implementing the UAM component of an insider threat detection and prevention program.

Protects agencies and their critical data by monitoring technical observables such as data’s location and movement, as well as the actions (including precursor actions) of users who access, alter and transport that data.

Full audit capabilities prevent misuse of the system or tampering with evidence.

Export Notes: ITAR-controlled – USML Category XIII(b)(1) requiring Export License or Technical Assistance Agreement (TAA).

DATA & INSIDER THREAT SECURITY: FORCEPOINT INNERVIEW

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 15: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 15

Convergence aggregates data from multiple

external sources such as HR records, personnel

security data, phone logs and physical access

control directly into Forcepoint InnerView.

The aggregation of this data with existing

InnerView data provides a broader set of easily

searchable data that can produce more insight

into an individual’s activities and behaviors.

This enterprise visibility from multiple security

data sources, enables rapid identification,

prioritization and response to policy breaches,

cybersecurity attacks and insider threats.

The unified view of these disparate data sources fulfills

Intelligence Community Standard 700-2 requirements.

Export Notes: Software classification EAR99. Export license is typically not

required.

DATA & INSIDER THREAT SECURITY: CONVERGENCE

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 16: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 16

An open interface that allows access to

Insider InnerView by sophisticated third

party analytics platforms. The interface

gives a seamless, unified view of

analytic results along with the

supporting user behavior information.

Supports two way data integration with

universal support for SIEM/HBSS

platforms.

Export Notes: Software classification EAR99. Export license is typically

not required.

DATA & INSIDER THREAT SECURITY: SPOTLIGHT

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 17: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 17

With the addition of Forcepoint High Speed Guard to

Forcepoint InnerView, agencies gain the ability to analyze

events across disparate security domains on one

Investigator Workbench to capture a single

comprehensive view of user activities.

Information sent between the client and collector first

pass through the cross domain solution to ensure:

Audit policies downloaded from higher security

levels do not contain classified data inappropriate

for the lower networks

Data intended for certain networks remain

separate

Only verified Forcepoint InnerView agent traffic is

passed along to the InnerView system.

Export Notes: Software classification EAR99. Export license is typically not

required. See also Forcepoint High Speed Guard

DATA & INSIDER THREAT SECURITY: CROSSVIEW

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 18: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 18

CROSS DOMAIN & MULTI-LEVEL SECURITY

PRODUCTS & FEATURESBUSINESS OUTCOMES

Built-in security to support the cyber warrior and

the global mission

Reliably share information with mission partners

Reduce costs while increasing efficiencies and

security

The Global Governments business develops and sells

products while also serving as a go-to-market support

arm into government markets for other Forcepoint

businesses

EXPORTABILITY

Trusted Thin Client | High Speed Guard | Small

Format Guard | “Matisse” | “Dali” | Trusted Gateway

System | Trusted Print Delivery| Trusted Mail

System | WebShield | SimShield | InnerView

ITAR / Export

Controlled

Products

Exportable

Products

SureView Analytics | “Van Gogh” (NEW 2H17) |

“Rafael” | Trusted Access Mobile

sold by Global Governments worldwide…

CROSS DOMAIN – SECURE DATA ACCESS ▸ Reduce hardware footprint while allowing secure, simultaneous access to multiple

separated networks of varied classification levels from a single endpoint

▸ Centralized management and monitoring

▸ Scalability to easily add networks

▸ Enable users everywhere

Enabling people to easily and seamlessly access critical information across multiple secure networks

▸ Printer consolidation in multi-level

enterprises

▸ Fixed-format transfer for distributed

simulation operations, live training

exercises and test events

▸ Secure browse-down and data

retrieval

▸ Automate and audit secure data

movement between secure networks

▸ Highly complex, bi-directional, automated

machine-to-machine transfer

▸ Real-time streaming video support

▸ Solutions to meet SWaP-C requirements

▸ Workflow mechanism for efficient person-

to-person file transfer. Facilitates Reliable

Human Review (RHR) and ensures that

all security checks are performed

CROSS DOMAIN – SECURE DATA & File TRANSFER

Page 19: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 19

Secure simultaneous access to information on any number of networks from a single endpoint. Designed for enterprise deployments with centralized management and monitoring, scalability to easily add networks and clients.

Hardware and virtual desktop infrastructure (VDI) agnostic

Integrates with common virtualization and consolidation technologies such as Citrix®, Microsoft®, and VMware®

Reduces desktop hardware and allows for space reclamation

Reduces infrastructure for cabling and cooling

Streamlined administration with robust enterprise management capabilities

Commercial-Off-The-Shelf (COTS) solution

Assessment & Authorization/Certification: An approved access cross domain solution on the Unified Cross Domain Services Management Office (UCDSMO) Cross Domain Baseline for Secret and Below Interoperability (SABI), Top Secret/SCI and Below Interoperability (TSABI). Assessed and Authorized by authorities according to NIST guidelines in the US and Five-Eyes nations.

Export Notes: ITAR-controlled – USML Category XIII(b)(4). Export License or Technical Assistance Agreement (TAA) required. Canadian Exemption may apply. Five-Eyes Only.

CROSS DOMAIN & MULTI-LEVEL SECURITY: FORCEPOINT TRUSTED THIN

CLIENT

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 20: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 20

Extending secure multi-network access outside of the traditional physical

security perimeter, Forcepoint Trusted Thin Client Remote utilizes the

standard accredited Forcepoint Trusted Thin Client solution, with

additional endpoint and communication security technologies, to permit

roaming access from standard-issue laptops and hybrid devices.

Trusted Thin Client endpoint software running natively as the secure host

operating system

Part of a registered Commercial Solutions for Classified (CSfC) solution

Uses dual VPN communication stack encryption

Supports flexible Linux or Windows outer and inner tunnel VPN client

deployment options

Uses off-the-shelf (approved/qualified) laptop and hybrid devices

Assessment & Authorization/Certification: See Forcepoint Trusted Thin Client for

base information.

Export Notes: ITAR-controlled – USML Category XIII(b)(4). Export License or

Technical Assistance Agreement (TAA) required. Canadian Exemption may apply.

Five-Eyes Only.

CROSS DOMAIN & MULTI-LEVEL SECURITY: FORCEPOINT TRUSTED THIN

CLIENT: REMOTE

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 21: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 21

Enables rapid, bi-directional, automated transfer of highly complex

data between multiple domains. Supports large enterprise systems

with comparatively low administration costs, making it the ideal

choice for large scale deployments that require large volume,

automated data transfers.

High Speed Guard has demonstrated the industry’s fastest bi-

directional transfer rates of more than 9 gigabits per second (Gb/s).

Commercial-Off-The-Shelf (COTS) solution

Eliminates costly and time consuming manual data transfers

Customer configurable for simplified operations and maintenance

Assessment & Authorization/Certification: An approved transfer cross

domain solution on the Unified Cross Domain Services Management Office

(UCDSMO) Cross Domain Baseline for Secret and Below Interoperability

(SABI), Top Secret/SCI and Below Interoperability (TSABI). Accredited and

evaluated by authorities in the US and Five-Eyes nations.

Export Notes: ITAR-controlled – USML Category XIII(b)(4). Export License or

Technical Assistance Agreement (TAA) required. Canadian Exemption may

apply. Five-Eyes Only.

CROSS DOMAIN & MULTI-LEVEL SECURITY: FORCEPOINT HIGH SPEED

GUARD

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 22: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 22

Highly secure, bi-directional, small form factor transfer guard that enables automated data transfers between multiple domains. Small Format Guard satisfies requirements for size, weight, power and cooling (SWaP-C), while providing high throughput and low latency.

Designed to for use in non-traditional data centers such as aircraft. The solution supports robust security protocols and is adaptable to specific mission needs.

Commercial-Off-The-Shelf (COTS) solution

Eliminates costly and time consuming manual data transfer

Improves mission effectiveness by making data available where and when it is needed

Built into the Forcepoint™ High Speed Guard™ baseline; differentiated by license

Supports low power, high throughput, and low latency transfers in non-traditional data centers.

Assessment & Authorization/Certification: See Forcepoint High Speed Guard.

Export Notes: ITAR-controlled – USML Category XIII(b)(4). Export License or Technical Assistance Agreement (TAA) required. Canadian Exemption may apply. Five-Eyes Only.

CROSS DOMAIN & MULTI-LEVEL SECURITY: FORCEPOINT SMALL FORMAT

GUARD

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 23: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 23

Provides exceptional built-in manual review and automatic validations,

such as virus scanning, dirty word search and deep content inspection,

enabling safe and simultaneous file movement between networks at

different sensitivity levels.

Includes a web-based GUI for quickly preparing and verifying files

(documents, images, etc.) for transfer between networks of different

classification levels. Trusted Gateway System provides end-to-end

auditing of the two person human review process for releasing

documents (when required by policy).

Commercial-Off-The-Shelf (COTS) solution

Web application that run the user’s browser; no desktop administration required

Multi-directional file transfer guard

Assessment & Authorization/Certification: An approved transfer cross domain

solution on the Unified Cross Domain Services Management Office (UCDSMO)

Cross Domain Baseline.

Export Notes: ITAR-controlled – USML Category XIII(b)(4). Export License or

Technical Assistance Agreement (TAA) required. Canadian Exemption may apply.

Five-Eyes Only.

CROSS DOMAIN & MULTI-LEVEL SECURITY: FORCEPOINT TRUSTED

GATEWAY SYSTEM

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 24: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 24

Secure means for users to print from existing applications at different security or sensitivity levels to a single printer located on the high side network.

Enables productivity gains for users printing in multi-level environments. Significant cost savings occurs from reduced printer hardware at individual security levels and decreased capital investment, maintenance, consumables and administration.

Commercial-Off-The-Shelf (COTS) solution

Leverages Forcepoint Trusted Gateway System for secure data transfer

Extends investment in cloud printing strategies

Standard print submission and print attributes

Organizations can save up to 65% of total printing costs (hardware, consumables, support) through printer consolidation efforts

Assessment & Authorization/Certification: Works with the approved Forcepoint Trusted Gateway System cross domain solution, which is on the Unified Cross Domain Services Management Office (UCDSMO) Cross Domain Baseline.

Export Notes: ITAR-controlled – USML Category XIII(b)(4). Export License or Technical Assistance Agreement (TAA) required. Canadian Exemption may apply. Five-Eyes Only.

CROSS DOMAIN & MULTI-LEVEL SECURITY: FORCEPOINT TRUSTED PRINT

DELIVERY

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 25: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 25

Enables the secure, policy-enforced exchange of emails and

attachments between users on different networks from one email

system, eliminating the need to switch between systems at multiple

levels. Provides a ‘single inbox’ that consolidates email residing on

various networks at the highest level.

Commercial-Off-The-Shelf (COTS) solution

Authorized for TSABI environments

Leverages Forcepoint Trusted Gateway System for secure email transfer

Eliminates costs by reducing redundant email client licenses

Increases user productivity: eliminating the need to switch between multiple

email accounts or physically relocate to access secure email

Minimizes the possibility of missing critical messages and ensures more timely

responses

Assessment & Authorization/Certification: Works with the approved Forcepoint

Trusted Gateway System cross domain solution, which is on the Unified Cross

Domain Services Management Office (UCDSMO) Cross Domain Baseline

Export Notes: ITAR-controlled – USML Category XIII(b)(4). Export License or

Technical Assistance Agreement (TAA) required. Canadian Exemption may apply.

Five-Eyes Only.

CROSS DOMAIN & MULTI-LEVEL SECURITY: FORCEPOINT TRUSTED MAIL

SYSTEM

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 26: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 26

Connecting multi-level training (live, virtual, and constructive) and testing environments in a real-world manner – across security boundaries – allows for more effective and efficient training and testing.

These efficiencies result in cost savings, a better trained warfighter and more thoroughly tested equipment. Training cost savings are realized through the ability to train multiple groups at the same time, whether they are multiple national agencies or coalition forces. Testing cost savings are realized through earlier detection and correction of issues and errors and the elimination of repeated tests.

Commercial-Off-The-Shelf (COTS) solution

Accredited and evaluated by authorities in the United States

Cross Domain, multi-level guard – SimShield Trusted Bridge™

Standalone GUI rule builder – SimShield Policy Editor™

Capability to label, segregate, protect, and exchange data between systems executing at

different sensitivity or classification levels.

Native support for DIS, HLA, TENA, RTP and MPEG2-TS protocols

Assessment & Authorization/Certification: An approved transfer cross domain

solution on the Unified Cross Domain Services Management Office (UCDSMO) Cross

Domain Baseline. The only accredited TENA guard available. Evaluated by the High

Performance Computing Modernization Program Office (HPCMPO) for connection to

Defense Research & Engineering Network (DREN) and Secure Defense Research &

Engineering Network (SDREN).

Export Notes: ITAR Category IX- outside counsel determination, no past

performance to judge distribution restrictions. State Department Licenses and

technical assistance agreements required for all customers.

CROSS DOMAIN & MULTI-LEVEL SECURITY: FORCEPOINT SIMSHIELD

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 27: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 27

Provides secure web search and browse-down capabilities from high side

networks to lower level networks. Perfect for big data environments,

WebShield enables secure, ‘on-demand’ web browsing from one security

domain to another, eliminating data duplication and streamlining of network

traffic.

Commercial-Off-The-Shelf (COTS) solution

Accredited and evaluated by authorities in the United States

All requests, responses, and transfers go through security controls including dirty

word search, virus scan, and malicious content checks.

No desktop administration is required

Remote administration through the Remote Access Console (RAC)

Assessment & Authorization/Certification: An approved transfer cross domain

solution on the Unified Cross Domain Services Management Office (UCDSMO) Cross

Domain Baseline.

Export Notes: ITAR-controlled – USML Category XIII(b)(4). Export License or

Technical Assistance Agreement (TAA) required. Canadian Exemption may apply. Five-

Eyes Only.

CROSS DOMAIN & MULTI-LEVEL SECURITY: FORCEPOINT WEBSHIELD

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 28: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 28

Forcepoint SureView Analytics Forcepoint Trusted Access Mobile

ADDITIONAL SOLUTIONS – GLOBAL GOVERNMENTS ONLY

Analytics Secure Mobile Access

Page 29: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 29

Employs virtual data warehousing, federated search, powerful algorithms for automated information discovery and intuitive workflow tools.

Granular user access through multi-tiered security

Advanced defense-grade security protocols

Federated searching of big data across multiple source types

Virtual data warehouse architecture

Automated data discovery to find hidden associations

Integrated geospatial, temporal, statistical and link analysis visualizations

Built-in reporting tools for drawing and labeling, importing images and customizing reports

Eliminates wasteful data duplication

Minimizes time spent on data collection, collation and correlation

Maximizes time spent on analysis and informed response to reduce the dwell time of threats

Reduces TCO and logistical demands on IT and compliance teams

Export Notes: Export Notes: #G168690 dated 11/14/16: Software Encryption classification:

5D002.c.1. Authorized for License Exception ENC under Sections 740.17 (a) and (b)(3)(iii) of

the EAR. Technology Classification 5E002.a. Authorized for License Exception ENC under

Sections 740.17 (A) and (B)(2) (iv) (B)

FORCEPOINT SUREVIEW ANALYTICS

Link to Datasheet

Contact: G2 Business Development

+1 (703) 318.7134

Page 30: Forcepoint Cybersecurity Solutions - Altair-775altair775.com.ua/wp-content/uploads/2018/05/BatesForce... · 2018. 5. 15. · ADVANCED THREAT PROTECTION Sandboxing integrated with

Copyright © 2017 Forcepoint. All rights reserved. | 30

Securely and confidently accessing sensitive information from

virtually any mobile device.

Native mobile applications are virtualized in a secure virtual mobile

infrastructure (VMI) and leverage secure redisplay technologies for

user interactions. VMI enables strict yet flexible access policy

enforcement to control user devices based on contextual information

such as role, OS version, GPS location, cellular and Wi-Fi Access

Point restrictions.

For endpoint security, access on the remote mobile device is

facilitated by a secure redisplay app that is provisioned onto the

device with user-identity credentials.

Bring Your Own Device (BYOD) compatible

Co-exists with existing MDM and MAM solutions

Cost-effective

Ensures secure access to sensitive, confidential, or proprietary data

Reduces and prevents data loss and device compromise

Access to native, desktop and Web apps

NIAP validation: October 2016

FORCEPOINT TRUSTED ACCESS MOBILE

Link to Datasheet – available by request

Contact: G2 Business Development

+1 (703) 318.7134

Export Notes: #G155262 dated 8/5/14: Software Encryption classification:

5D002.c.1. Authorized for License Exception ENC under Sections 740.17

(a) and (b)(2) of the EAR. Technology Classification 5E002.a. Authorized

for License Exception ENC under Sections 740.17 (B) (2) (iv) (B) of the

EAR.