SlideShare a Scribd company logo
Copyright © 2018 Forcepoint | 1
Have you outgrown your web security?
Joakim (JK) Lialias
Sr. Director - Product Marketing
Copyright © 2018 Forcepoint. | 2
TRENDS IMPACTING APPROACH TO SECURITY
71% of enterprises
have hybrid cloud
deployments
1.87 billion
of mobile workers around
the world by 2020
>1,000
SaaS applications used
at a typical company
1/3 of enterprises will
experience a successful
attack targeting their
Shadow IT resources by
2020
An expanded attack surface that threatens
worker productivity and critical data
Copyright © 2018 Forcepoint | 3Copyright © 2018 Forcepoint. | 3
Is your security
solution having
trouble keeping up?
Explore what a modern
security solution looks
like—built to tackle the
evolving threat
landscape while
adapting to today’s
global, mobile
workforce.
Copyright © 2018 Forcepoint | 4
CRITICAL CAPABILITIES OF SECURE WEB GATEWAY
Real-time threat defense
against advanced threats
Flexible deployment
options with robust protection
across deployment options
Insight and control to cloud
applications integrated with
Secure Web Gateway
Optimize Secure
Connectivity for mobile
workforce productivity
Data Loss Prevention to
control outbound traffic
containing critical data
Copyright © 2018 Forcepoint. | 5
BETTER SECURITY, LESS COMPLEXITY
– AND THE EFFICACY TO BACK IT UP
With Forcepoint, you get comprehensive, real-time threat defense.
Advanced algorithms powering Real-Time Security classification to inspect all web content for
malicious or suspicious code.
Machine learning for Real-Time Content classification to quickly and accurately classify web pages.
Intelligent URL classification to assess and classify new pages and links on the fly.
Unique incident risk rating to quickly cut through the noise delivered by alerts.
POWERED BY FORCEPOINT’S ADVANCED CLASSIFICATION ENGINE (ACE)
+52% better efficacy to protect against real-world threats
compared with the nearest web security competitor.
*Miercom Security Effectiveness Testing https://www.forcepoint.com/2015-miercom-security-effectiveness-test-report
Copyright © 2018 Forcepoint. | 6
ACE is why no one stops more
threats than Forcepoint.
+10,000 analytics insights
Signature-based tools
Predictive security engines built on
machine learning and rules-based
algorithms (Signature-less)
Inline operation that blocks threats
MEET ACE – DEFEATING RANSOMWARE AND
SOPHISTICATED THREATS ALONG THE KILL CHAIN
Anti-Malware
Reputation
Analysis
Advanced
Malware
Detection
Anti-Spam/
Phishing
Real-time Data
Classification
Real-time
Content
Classification
Real-time
Security
Classification
URL
Classification
Advanced
Classification
Engine
(ACE)
Copyright © 2018 Forcepoint. | 7
EXTEND PROTECTION WITH ADVANCED MALWARE PROTECTION
Unmatched accuracy that eliminates
crippling false positives
Comprehensive and actionable
intelligence to optimize remediation
efforts for incident response teams
Full system emulation to effectively
counter advanced evasions
Shared global threat intelligence that
can update other solutions
+100% efficacy in advanced
malware detection1
Zero false positives when
convicting or exonerating advanced
malware3
1. NSS Labs 2016 APT Test (Lastline)
Forcepoint AMD offers seamless integration with Web Security solutions
for a comprehensive defense delivered via cloud or on-premises
Copyright © 2018 Forcepoint. | 8
EXTENDING CASB FUNCTIONALITY TO WEB SECURITY
Forcepoint Secure Web Gateway Cloud
Application Control Module
CASB capabilities for Cloud Application traffic as
it traverses the Forcepoint Web Security
Solution.
• Proxy based activity visibility
• Anomaly detection + UEBA + Risk analysis
• Real-time mitigation options
• AD and SIEM integration
Seamless and smooth implementation of CASB
with one proxy
Building on visibility and control for unsanctioned cloud
applications with advanced CASB functionality tightly integrated
Copyright © 2018 Forcepoint. | 9
ADVANCED CASB FUNCTIONALITY…YES IT IS BUILT IN…
Copyright © 2018 Forcepoint | 10
FORCEPOINT
IS A TOP CHOICE
FOR ENTERPRISE
COMPANIES.
SEE WHY LEGACY
VENDORS DON’T
EVEN COME CLOSE.
Copyright © 2018 Forcepoint. | 11
Forcepoint – Comprehensive Protection Legacy Players – Fragmented Protection
LEGACY VENDORS OFFER FRAGMENTED PROTECTION
Leading zero-day malware protection that
combines ACE, AMD, CASB, and our proven
ThreatSeeker Intelligence cloud.
• INCLUDED + ADVANCED
Create robust reports using an intuitive drag-and-drop
interface—all within a centralized reporting system with
unrivalled visibility and analytics.
• BUILT-IN
Avoid creating a fragmented security solution that requires
multiple solutions for sandboxing and analytics. With
Forcepoint, you get ACE and optional AMD already built in.
• EXPANSIVE CASB INLCUDED
Shadow IT, discovery, and control is a native inclusion in
Forcepoint Web Security. Integrate Inline CASB capabilities
easily with add-on module.
Convoluted solutions requiring multiple
products and vendors to deploy a standard
security solution, incurring additional costs.
• ADDITIONAL COST + LIMITATION
Additional SKUs and costs required beyond basic reporting
capabilities. Reports are not in real-time and not
investigative.
• ADDITIONAL VENDORS
Sandboxing and analytics require third-party vendors like
FireEye or Menlo Security, making your security more
complex to manage.
• ADDITIONAL COST
Looking for a CASB solution? Get ready to spend more
money. With an added SKU comes an additional layer of
complexity, leaving you with a limited, “light” CASB solution
with basic visibility.
Copyright © 2018 Forcepoint. | 12
Forcepoint – Effective Protection Legacy Players – Limited Protection
LEGACY VENDORS OFFERS LIMITATIONS IN PROTECTION
Forcepoint ACE engine delivers real-time
protection capabilities for robust protection
against advanced threats.
• REAL-TIME PROTECTION
Advanced predictive analytics that delivers real-time security,
content, and data classification.
• CONTEXTUAL PROTECTION
Broad based contextual assessments done to help ensure
accuracy while helping to eliminate false positives.
• DEEP INSPECTION
Over 10,000 analytics insights that enable deep inspections.
Lack of robust and consistent real-time
protection creating a less effective defense
against advanced threats.
• LACK OF REAL-TIME PROTECTION
No real-time analysis of malicious code. DRTP/WebPulse
is used to categorize web site content and can generate
several false-positives
• LIMITATIONS IN PROTECTION
The engine DRTP/WebPulse cannot scan session-based
content or protect by login prompt. Focused on traditional
web categories and fail with dynamic content (which
increases constantly). Too many “secure all or nothing”
configuration options
• LACK OF ADVANCED SECURITY MECHANISMS
WebPulse analytics is used for detection which lacks
advanced security mechanisms. Weakness in early stages
of an attack (exploit code, obfuscation, etc.).
Copyright © 2018 Forcepoint. | 13
Forcepoint – Reliable Mobility
Legacy Players – Unpredictable Mobility
LEGACY VENDORS LEAVE YOU WITH COVERAGE GAPS
• Forcepoint supports the evolving global
workforce with innovative solutions to ensure
connectivity for the anywhere, anytime user.
• We offer adaptable endpoint options to
secure your users, including our patent-
pending Direct Connect Endpoint™.
• Lack of options for endpoint agents and
• No sandbox option for the cloud hinders
your organization’s growth and adaptability
of security solutions that protect the
evolving global, mobile workforce.
Copyright © 2018 Forcepoint. | 14
Forcepoint – Adaptive Architecture Legacy Players – Coverage Uncertainty
LEGACY VENDORS MAKE IT DIFFICULT TO SCALE YOUR BUSINESS
• Looking to change deployment
architectures? Prepare for additional
costs and more layers of complexity in
migrating your solution.
• Other legacy vendors are box-heavy,
with drastically more expensive
appliance and maintenance costs—often
bundled into a multi-year agreement.
• Flexible deployment architectures, whether
you’re cloud-first, hybrid, or exploring what
cloud can do for you.
• Only Forcepoint offers true license mobility.
Start where you need to be and move when
you’re ready—without additional
subscription costs.
• Looking for an on-prem solution?
Forcepoint offers enterprise-grade
appliances at a fraction of the cost,
including our no-cost virtual appliance
Copyright © 2018 Forcepoint. | 15
YOU DON’T’ WEAR YESTERDAY’S SOCKS
– WHY USE YESTERDAY’S SECURITY SOLUTION?
At Forcepoint, we’re all about reducing
complexity to drive increased productivity with
better security outcomes—with unification of:
 Web Security with Cloud Access Security Broker (CASB)
 Data Loss Prevention (DLP)
 Advanced Malware Detection (AMD)
 Next Generation Firewall (URL Filtering)
Products that communicate with each other, share policies,
and create a dynamic environment for receiving, interpreting,
and acting on data.
1
6
ANALYTICS MANAGEMENT ORCHESTRATION
THE FLOW
OF DATA
THE RHYTHM
OF PEOPLE
Forcepoint
UEBA
Forcepoint
SD-WAN &
NGFW
Forcepoint
Insider Threat
Forcepoint
Web & Email
Security
Forcepoint
Data Guard
Forcepoint
DLP
Forcepoint
CASB
SECURE WEB GATEWAY KEY PART OF THE HUMAN POINT SYSTEM
THE FLOW
OF DATA
THE
RHYTHM OF
PEOPLE
EACH PRODUCT ELEMENT:
ANALYTICS MANAGEMENT ORCHESTRATION
Forcepoint
UEBA
Forcepoint
SD-WAN &
NGFW
Forcepoint
Insider
Threat
Forcepoint
Web & Email
Security
Forcepoint
Data Guard
Forcepoint
DLP
Forcepoint
CASB
 Has best in class capabilities
 Can be your starting point
 Integrates together as a system with
unified management and policy
 Works with an existing environment
DESIGN TENETS OF THE HUMAN POINT SYSTEM
Copyright © 2018 Forcepoint | 18
A SECURE WEB GATEWAY THAT
DELIVERS REAL CUSTOMER VALUE
122% return on
investment when switching
to Forcepoint Web Security2
100x reduction in the
number of malware incidents2
52% better efficacy against
real-world threats compared
with nearest competitor1
1. Miercom Testing (2015-2016 Non-Signature Threats)
2. Forrester TEI Study 2017
Copyright © 2018 Forcepoint. | 19
LOOKING TO PARTNER WITH YOU
PARTNER WITH
FORCEPOINT.
GET YOU THE
SOLUTION YOU
NEED TODAY.
PLAN FOR WHAT
YOU WANT TO
BUILD TOMORROW.
Copyright © 2018 Forcepoint. | 20
THANK YOU

More Related Content

Securing Beyond the Cloud Generation

  • 1. Copyright © 2018 Forcepoint | 1 Have you outgrown your web security? Joakim (JK) Lialias Sr. Director - Product Marketing
  • 2. Copyright © 2018 Forcepoint. | 2 TRENDS IMPACTING APPROACH TO SECURITY 71% of enterprises have hybrid cloud deployments 1.87 billion of mobile workers around the world by 2020 >1,000 SaaS applications used at a typical company 1/3 of enterprises will experience a successful attack targeting their Shadow IT resources by 2020 An expanded attack surface that threatens worker productivity and critical data
  • 3. Copyright © 2018 Forcepoint | 3Copyright © 2018 Forcepoint. | 3 Is your security solution having trouble keeping up? Explore what a modern security solution looks like—built to tackle the evolving threat landscape while adapting to today’s global, mobile workforce.
  • 4. Copyright © 2018 Forcepoint | 4 CRITICAL CAPABILITIES OF SECURE WEB GATEWAY Real-time threat defense against advanced threats Flexible deployment options with robust protection across deployment options Insight and control to cloud applications integrated with Secure Web Gateway Optimize Secure Connectivity for mobile workforce productivity Data Loss Prevention to control outbound traffic containing critical data
  • 5. Copyright © 2018 Forcepoint. | 5 BETTER SECURITY, LESS COMPLEXITY – AND THE EFFICACY TO BACK IT UP With Forcepoint, you get comprehensive, real-time threat defense. Advanced algorithms powering Real-Time Security classification to inspect all web content for malicious or suspicious code. Machine learning for Real-Time Content classification to quickly and accurately classify web pages. Intelligent URL classification to assess and classify new pages and links on the fly. Unique incident risk rating to quickly cut through the noise delivered by alerts. POWERED BY FORCEPOINT’S ADVANCED CLASSIFICATION ENGINE (ACE) +52% better efficacy to protect against real-world threats compared with the nearest web security competitor. *Miercom Security Effectiveness Testing https://www.forcepoint.com/2015-miercom-security-effectiveness-test-report
  • 6. Copyright © 2018 Forcepoint. | 6 ACE is why no one stops more threats than Forcepoint. +10,000 analytics insights Signature-based tools Predictive security engines built on machine learning and rules-based algorithms (Signature-less) Inline operation that blocks threats MEET ACE – DEFEATING RANSOMWARE AND SOPHISTICATED THREATS ALONG THE KILL CHAIN Anti-Malware Reputation Analysis Advanced Malware Detection Anti-Spam/ Phishing Real-time Data Classification Real-time Content Classification Real-time Security Classification URL Classification Advanced Classification Engine (ACE)
  • 7. Copyright © 2018 Forcepoint. | 7 EXTEND PROTECTION WITH ADVANCED MALWARE PROTECTION Unmatched accuracy that eliminates crippling false positives Comprehensive and actionable intelligence to optimize remediation efforts for incident response teams Full system emulation to effectively counter advanced evasions Shared global threat intelligence that can update other solutions +100% efficacy in advanced malware detection1 Zero false positives when convicting or exonerating advanced malware3 1. NSS Labs 2016 APT Test (Lastline) Forcepoint AMD offers seamless integration with Web Security solutions for a comprehensive defense delivered via cloud or on-premises
  • 8. Copyright © 2018 Forcepoint. | 8 EXTENDING CASB FUNCTIONALITY TO WEB SECURITY Forcepoint Secure Web Gateway Cloud Application Control Module CASB capabilities for Cloud Application traffic as it traverses the Forcepoint Web Security Solution. • Proxy based activity visibility • Anomaly detection + UEBA + Risk analysis • Real-time mitigation options • AD and SIEM integration Seamless and smooth implementation of CASB with one proxy Building on visibility and control for unsanctioned cloud applications with advanced CASB functionality tightly integrated
  • 9. Copyright © 2018 Forcepoint. | 9 ADVANCED CASB FUNCTIONALITY…YES IT IS BUILT IN…
  • 10. Copyright © 2018 Forcepoint | 10 FORCEPOINT IS A TOP CHOICE FOR ENTERPRISE COMPANIES. SEE WHY LEGACY VENDORS DON’T EVEN COME CLOSE.
  • 11. Copyright © 2018 Forcepoint. | 11 Forcepoint – Comprehensive Protection Legacy Players – Fragmented Protection LEGACY VENDORS OFFER FRAGMENTED PROTECTION Leading zero-day malware protection that combines ACE, AMD, CASB, and our proven ThreatSeeker Intelligence cloud. • INCLUDED + ADVANCED Create robust reports using an intuitive drag-and-drop interface—all within a centralized reporting system with unrivalled visibility and analytics. • BUILT-IN Avoid creating a fragmented security solution that requires multiple solutions for sandboxing and analytics. With Forcepoint, you get ACE and optional AMD already built in. • EXPANSIVE CASB INLCUDED Shadow IT, discovery, and control is a native inclusion in Forcepoint Web Security. Integrate Inline CASB capabilities easily with add-on module. Convoluted solutions requiring multiple products and vendors to deploy a standard security solution, incurring additional costs. • ADDITIONAL COST + LIMITATION Additional SKUs and costs required beyond basic reporting capabilities. Reports are not in real-time and not investigative. • ADDITIONAL VENDORS Sandboxing and analytics require third-party vendors like FireEye or Menlo Security, making your security more complex to manage. • ADDITIONAL COST Looking for a CASB solution? Get ready to spend more money. With an added SKU comes an additional layer of complexity, leaving you with a limited, “light” CASB solution with basic visibility.
  • 12. Copyright © 2018 Forcepoint. | 12 Forcepoint – Effective Protection Legacy Players – Limited Protection LEGACY VENDORS OFFERS LIMITATIONS IN PROTECTION Forcepoint ACE engine delivers real-time protection capabilities for robust protection against advanced threats. • REAL-TIME PROTECTION Advanced predictive analytics that delivers real-time security, content, and data classification. • CONTEXTUAL PROTECTION Broad based contextual assessments done to help ensure accuracy while helping to eliminate false positives. • DEEP INSPECTION Over 10,000 analytics insights that enable deep inspections. Lack of robust and consistent real-time protection creating a less effective defense against advanced threats. • LACK OF REAL-TIME PROTECTION No real-time analysis of malicious code. DRTP/WebPulse is used to categorize web site content and can generate several false-positives • LIMITATIONS IN PROTECTION The engine DRTP/WebPulse cannot scan session-based content or protect by login prompt. Focused on traditional web categories and fail with dynamic content (which increases constantly). Too many “secure all or nothing” configuration options • LACK OF ADVANCED SECURITY MECHANISMS WebPulse analytics is used for detection which lacks advanced security mechanisms. Weakness in early stages of an attack (exploit code, obfuscation, etc.).
  • 13. Copyright © 2018 Forcepoint. | 13 Forcepoint – Reliable Mobility Legacy Players – Unpredictable Mobility LEGACY VENDORS LEAVE YOU WITH COVERAGE GAPS • Forcepoint supports the evolving global workforce with innovative solutions to ensure connectivity for the anywhere, anytime user. • We offer adaptable endpoint options to secure your users, including our patent- pending Direct Connect Endpoint™. • Lack of options for endpoint agents and • No sandbox option for the cloud hinders your organization’s growth and adaptability of security solutions that protect the evolving global, mobile workforce.
  • 14. Copyright © 2018 Forcepoint. | 14 Forcepoint – Adaptive Architecture Legacy Players – Coverage Uncertainty LEGACY VENDORS MAKE IT DIFFICULT TO SCALE YOUR BUSINESS • Looking to change deployment architectures? Prepare for additional costs and more layers of complexity in migrating your solution. • Other legacy vendors are box-heavy, with drastically more expensive appliance and maintenance costs—often bundled into a multi-year agreement. • Flexible deployment architectures, whether you’re cloud-first, hybrid, or exploring what cloud can do for you. • Only Forcepoint offers true license mobility. Start where you need to be and move when you’re ready—without additional subscription costs. • Looking for an on-prem solution? Forcepoint offers enterprise-grade appliances at a fraction of the cost, including our no-cost virtual appliance
  • 15. Copyright © 2018 Forcepoint. | 15 YOU DON’T’ WEAR YESTERDAY’S SOCKS – WHY USE YESTERDAY’S SECURITY SOLUTION? At Forcepoint, we’re all about reducing complexity to drive increased productivity with better security outcomes—with unification of:  Web Security with Cloud Access Security Broker (CASB)  Data Loss Prevention (DLP)  Advanced Malware Detection (AMD)  Next Generation Firewall (URL Filtering) Products that communicate with each other, share policies, and create a dynamic environment for receiving, interpreting, and acting on data.
  • 16. 1 6 ANALYTICS MANAGEMENT ORCHESTRATION THE FLOW OF DATA THE RHYTHM OF PEOPLE Forcepoint UEBA Forcepoint SD-WAN & NGFW Forcepoint Insider Threat Forcepoint Web & Email Security Forcepoint Data Guard Forcepoint DLP Forcepoint CASB SECURE WEB GATEWAY KEY PART OF THE HUMAN POINT SYSTEM
  • 17. THE FLOW OF DATA THE RHYTHM OF PEOPLE EACH PRODUCT ELEMENT: ANALYTICS MANAGEMENT ORCHESTRATION Forcepoint UEBA Forcepoint SD-WAN & NGFW Forcepoint Insider Threat Forcepoint Web & Email Security Forcepoint Data Guard Forcepoint DLP Forcepoint CASB  Has best in class capabilities  Can be your starting point  Integrates together as a system with unified management and policy  Works with an existing environment DESIGN TENETS OF THE HUMAN POINT SYSTEM
  • 18. Copyright © 2018 Forcepoint | 18 A SECURE WEB GATEWAY THAT DELIVERS REAL CUSTOMER VALUE 122% return on investment when switching to Forcepoint Web Security2 100x reduction in the number of malware incidents2 52% better efficacy against real-world threats compared with nearest competitor1 1. Miercom Testing (2015-2016 Non-Signature Threats) 2. Forrester TEI Study 2017
  • 19. Copyright © 2018 Forcepoint. | 19 LOOKING TO PARTNER WITH YOU PARTNER WITH FORCEPOINT. GET YOU THE SOLUTION YOU NEED TODAY. PLAN FOR WHAT YOU WANT TO BUILD TOMORROW.
  • 20. Copyright © 2018 Forcepoint. | 20 THANK YOU

Editor's Notes

  1. HUMAN POINT SYSTEM COMPONENTS The Human Point system brings together that broad portfolio of products I mentioned earlier to address and understand the rhythm of people and the flow of your data. It brings together: UEBA DLP Insider Threat CASB Next Generation Firewall Data Guard Web and Email Security -- all under the umbrella of analytics common management, and orchestration. We designed this system very purposefully, with very specific tenets.
  2. HUMAN POINT DESIGN TENETS We made sure that each product element has best-in-class capabilities and would allow you to start anywhere. Start with any of our elements Don’t have to buy them in any particular order or buy all of them Start with any of them The more you buy, the better it gets They integrate together the system with unified management and policy Key design tenets was to make sure that they work with your existing environment We know from talking to many CISOs that they’ve made many investments in their security infrastructures. And nobody wants to do a rip and replace. So we made sure that we could integrate with the existing security environments and infrastructure that our customers are ready to put in place. Let’s look at some examples.