SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Copyright © 2018 Forcepoint | 1
Have you outgrown your web security?
Joakim (JK) Lialias
Sr. Director - Product Marketing
Copyright © 2018 Forcepoint. | 2
TRENDS IMPACTING APPROACH TO SECURITY
71% of enterprises
have hybrid cloud
deployments
1.87 billion
of mobile workers around
the world by 2020
>1,000
SaaS applications used
at a typical company
1/3 of enterprises will
experience a successful
attack targeting their
Shadow IT resources by
2020
An expanded attack surface that threatens
worker productivity and critical data
Copyright © 2018 Forcepoint | 3Copyright © 2018 Forcepoint. | 3
Is your security
solution having
trouble keeping up?
Explore what a modern
security solution looks
like—built to tackle the
evolving threat
landscape while
adapting to today’s
global, mobile
workforce.
Copyright © 2018 Forcepoint | 4
CRITICAL CAPABILITIES OF SECURE WEB GATEWAY
Real-time threat defense
against advanced threats
Flexible deployment
options with robust protection
across deployment options
Insight and control to cloud
applications integrated with
Secure Web Gateway
Optimize Secure
Connectivity for mobile
workforce productivity
Data Loss Prevention to
control outbound traffic
containing critical data
Copyright © 2018 Forcepoint. | 5
BETTER SECURITY, LESS COMPLEXITY
– AND THE EFFICACY TO BACK IT UP
With Forcepoint, you get comprehensive, real-time threat defense.
Advanced algorithms powering Real-Time Security classification to inspect all web content for
malicious or suspicious code.
Machine learning for Real-Time Content classification to quickly and accurately classify web pages.
Intelligent URL classification to assess and classify new pages and links on the fly.
Unique incident risk rating to quickly cut through the noise delivered by alerts.
POWERED BY FORCEPOINT’S ADVANCED CLASSIFICATION ENGINE (ACE)
+52% better efficacy to protect against real-world threats
compared with the nearest web security competitor.
*Miercom Security Effectiveness Testing https://www.forcepoint.com/2015-miercom-security-effectiveness-test-report
Copyright © 2018 Forcepoint. | 6
ACE is why no one stops more
threats than Forcepoint.
+10,000 analytics insights
Signature-based tools
Predictive security engines built on
machine learning and rules-based
algorithms (Signature-less)
Inline operation that blocks threats
MEET ACE – DEFEATING RANSOMWARE AND
SOPHISTICATED THREATS ALONG THE KILL CHAIN
Anti-Malware
Reputation
Analysis
Advanced
Malware
Detection
Anti-Spam/
Phishing
Real-time Data
Classification
Real-time
Content
Classification
Real-time
Security
Classification
URL
Classification
Advanced
Classification
Engine
(ACE)
Copyright © 2018 Forcepoint. | 7
EXTEND PROTECTION WITH ADVANCED MALWARE PROTECTION
Unmatched accuracy that eliminates
crippling false positives
Comprehensive and actionable
intelligence to optimize remediation
efforts for incident response teams
Full system emulation to effectively
counter advanced evasions
Shared global threat intelligence that
can update other solutions
+100% efficacy in advanced
malware detection1
Zero false positives when
convicting or exonerating advanced
malware3
1. NSS Labs 2016 APT Test (Lastline)
Forcepoint AMD offers seamless integration with Web Security solutions
for a comprehensive defense delivered via cloud or on-premises
Copyright © 2018 Forcepoint. | 8
EXTENDING CASB FUNCTIONALITY TO WEB SECURITY
Forcepoint Secure Web Gateway Cloud
Application Control Module
CASB capabilities for Cloud Application traffic as
it traverses the Forcepoint Web Security
Solution.
• Proxy based activity visibility
• Anomaly detection + UEBA + Risk analysis
• Real-time mitigation options
• AD and SIEM integration
Seamless and smooth implementation of CASB
with one proxy
Building on visibility and control for unsanctioned cloud
applications with advanced CASB functionality tightly integrated
Copyright © 2018 Forcepoint. | 9
ADVANCED CASB FUNCTIONALITY…YES IT IS BUILT IN…
Copyright © 2018 Forcepoint | 10
FORCEPOINT
IS A TOP CHOICE
FOR ENTERPRISE
COMPANIES.
SEE WHY LEGACY
VENDORS DON’T
EVEN COME CLOSE.
Copyright © 2018 Forcepoint. | 11
Forcepoint – Comprehensive Protection Legacy Players – Fragmented Protection
LEGACY VENDORS OFFER FRAGMENTED PROTECTION
Leading zero-day malware protection that
combines ACE, AMD, CASB, and our proven
ThreatSeeker Intelligence cloud.
• INCLUDED + ADVANCED
Create robust reports using an intuitive drag-and-drop
interface—all within a centralized reporting system with
unrivalled visibility and analytics.
• BUILT-IN
Avoid creating a fragmented security solution that requires
multiple solutions for sandboxing and analytics. With
Forcepoint, you get ACE and optional AMD already built in.
• EXPANSIVE CASB INLCUDED
Shadow IT, discovery, and control is a native inclusion in
Forcepoint Web Security. Integrate Inline CASB capabilities
easily with add-on module.
Convoluted solutions requiring multiple
products and vendors to deploy a standard
security solution, incurring additional costs.
• ADDITIONAL COST + LIMITATION
Additional SKUs and costs required beyond basic reporting
capabilities. Reports are not in real-time and not
investigative.
• ADDITIONAL VENDORS
Sandboxing and analytics require third-party vendors like
FireEye or Menlo Security, making your security more
complex to manage.
• ADDITIONAL COST
Looking for a CASB solution? Get ready to spend more
money. With an added SKU comes an additional layer of
complexity, leaving you with a limited, “light” CASB solution
with basic visibility.
Copyright © 2018 Forcepoint. | 12
Forcepoint – Effective Protection Legacy Players – Limited Protection
LEGACY VENDORS OFFERS LIMITATIONS IN PROTECTION
Forcepoint ACE engine delivers real-time
protection capabilities for robust protection
against advanced threats.
• REAL-TIME PROTECTION
Advanced predictive analytics that delivers real-time security,
content, and data classification.
• CONTEXTUAL PROTECTION
Broad based contextual assessments done to help ensure
accuracy while helping to eliminate false positives.
• DEEP INSPECTION
Over 10,000 analytics insights that enable deep inspections.
Lack of robust and consistent real-time
protection creating a less effective defense
against advanced threats.
• LACK OF REAL-TIME PROTECTION
No real-time analysis of malicious code. DRTP/WebPulse
is used to categorize web site content and can generate
several false-positives
• LIMITATIONS IN PROTECTION
The engine DRTP/WebPulse cannot scan session-based
content or protect by login prompt. Focused on traditional
web categories and fail with dynamic content (which
increases constantly). Too many “secure all or nothing”
configuration options
• LACK OF ADVANCED SECURITY MECHANISMS
WebPulse analytics is used for detection which lacks
advanced security mechanisms. Weakness in early stages
of an attack (exploit code, obfuscation, etc.).
Copyright © 2018 Forcepoint. | 13
Forcepoint – Reliable Mobility
Legacy Players – Unpredictable Mobility
LEGACY VENDORS LEAVE YOU WITH COVERAGE GAPS
• Forcepoint supports the evolving global
workforce with innovative solutions to ensure
connectivity for the anywhere, anytime user.
• We offer adaptable endpoint options to
secure your users, including our patent-
pending Direct Connect Endpoint™.
• Lack of options for endpoint agents and
• No sandbox option for the cloud hinders
your organization’s growth and adaptability
of security solutions that protect the
evolving global, mobile workforce.
Copyright © 2018 Forcepoint. | 14
Forcepoint – Adaptive Architecture Legacy Players – Coverage Uncertainty
LEGACY VENDORS MAKE IT DIFFICULT TO SCALE YOUR BUSINESS
• Looking to change deployment
architectures? Prepare for additional
costs and more layers of complexity in
migrating your solution.
• Other legacy vendors are box-heavy,
with drastically more expensive
appliance and maintenance costs—often
bundled into a multi-year agreement.
• Flexible deployment architectures, whether
you’re cloud-first, hybrid, or exploring what
cloud can do for you.
• Only Forcepoint offers true license mobility.
Start where you need to be and move when
you’re ready—without additional
subscription costs.
• Looking for an on-prem solution?
Forcepoint offers enterprise-grade
appliances at a fraction of the cost,
including our no-cost virtual appliance
Copyright © 2018 Forcepoint. | 15
YOU DON’T’ WEAR YESTERDAY’S SOCKS
– WHY USE YESTERDAY’S SECURITY SOLUTION?
At Forcepoint, we’re all about reducing
complexity to drive increased productivity with
better security outcomes—with unification of:
 Web Security with Cloud Access Security Broker (CASB)
 Data Loss Prevention (DLP)
 Advanced Malware Detection (AMD)
 Next Generation Firewall (URL Filtering)
Products that communicate with each other, share policies,
and create a dynamic environment for receiving, interpreting,
and acting on data.
1
6
ANALYTICS MANAGEMENT ORCHESTRATION
THE FLOW
OF DATA
THE RHYTHM
OF PEOPLE
Forcepoint
UEBA
Forcepoint
SD-WAN &
NGFW
Forcepoint
Insider Threat
Forcepoint
Web & Email
Security
Forcepoint
Data Guard
Forcepoint
DLP
Forcepoint
CASB
SECURE WEB GATEWAY KEY PART OF THE HUMAN POINT SYSTEM
THE FLOW
OF DATA
THE
RHYTHM OF
PEOPLE
EACH PRODUCT ELEMENT:
ANALYTICS MANAGEMENT ORCHESTRATION
Forcepoint
UEBA
Forcepoint
SD-WAN &
NGFW
Forcepoint
Insider
Threat
Forcepoint
Web & Email
Security
Forcepoint
Data Guard
Forcepoint
DLP
Forcepoint
CASB
 Has best in class capabilities
 Can be your starting point
 Integrates together as a system with
unified management and policy
 Works with an existing environment
DESIGN TENETS OF THE HUMAN POINT SYSTEM
Copyright © 2018 Forcepoint | 18
A SECURE WEB GATEWAY THAT
DELIVERS REAL CUSTOMER VALUE
122% return on
investment when switching
to Forcepoint Web Security2
100x reduction in the
number of malware incidents2
52% better efficacy against
real-world threats compared
with nearest competitor1
1. Miercom Testing (2015-2016 Non-Signature Threats)
2. Forrester TEI Study 2017
Copyright © 2018 Forcepoint. | 19
LOOKING TO PARTNER WITH YOU
PARTNER WITH
FORCEPOINT.
GET YOU THE
SOLUTION YOU
NEED TODAY.
PLAN FOR WHAT
YOU WANT TO
BUILD TOMORROW.
Copyright © 2018 Forcepoint. | 20
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewStephen Bates
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with  Integrated CASB & IDaaS SecurityStop Hackers with  Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityOneLogin
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesNetskope
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIBM Security
 
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud SecuritySusanne Tedrick
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionNetskope
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use CasesNetskope
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of SecurityNetskope
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportIftikhar Ali Iqbal
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...Iftikhar Ali Iqbal
 
Workshop on CASB Part 2
Workshop on CASB Part 2Workshop on CASB Part 2
Workshop on CASB Part 2Priyanka Aash
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeCloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeJoAnna Cheshire
 

Was ist angesagt? (20)

CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption? CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate Overview
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with  Integrated CASB & IDaaS SecurityStop Hackers with  Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
 
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good Thing
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of Security
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Workshop on CASB Part 2
Workshop on CASB Part 2Workshop on CASB Part 2
Workshop on CASB Part 2
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeCloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
 

Ähnlich wie Securing Beyond the Cloud Generation

클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...Lucy Huh Kerner
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Amazon Web Services
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAmazon Web Services
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaCristian Garcia G.
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...gemmarie1
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Benelux
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Securitypatmisasi
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat managementRajendra Menon
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 

Ähnlich wie Securing Beyond the Cloud Generation (20)

클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 

Mehr von Forcepoint LLC

Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)Forcepoint LLC
 
Sparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security BehaviorsSparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security BehaviorsForcepoint LLC
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AIForcepoint LLC
 
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...Forcepoint LLC
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in CybersecurityForcepoint LLC
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...Forcepoint LLC
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsForcepoint LLC
 
A Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human FocusA Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human FocusForcepoint LLC
 
Cyber Convergence, Warfare and You
Cyber Convergence, Warfare and YouCyber Convergence, Warfare and You
Cyber Convergence, Warfare and YouForcepoint LLC
 
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)Forcepoint LLC
 
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksSecurity Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksForcepoint LLC
 
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterMaintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterForcepoint LLC
 
Embracing the Millennial Tsunami
Embracing the Millennial TsunamiEmbracing the Millennial Tsunami
Embracing the Millennial TsunamiForcepoint LLC
 
Revolutionary, Not Evolutionary
Revolutionary, Not EvolutionaryRevolutionary, Not Evolutionary
Revolutionary, Not EvolutionaryForcepoint LLC
 
Cybersecurity and the Human Psyche
Cybersecurity and the Human PsycheCybersecurity and the Human Psyche
Cybersecurity and the Human PsycheForcepoint LLC
 
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesAn Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesForcepoint LLC
 
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityCloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityForcepoint LLC
 

Mehr von Forcepoint LLC (19)

Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)
 
Sparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security BehaviorsSparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security Behaviors
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
A Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human FocusA Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human Focus
 
Cyber Convergence, Warfare and You
Cyber Convergence, Warfare and YouCyber Convergence, Warfare and You
Cyber Convergence, Warfare and You
 
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
 
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksSecurity Insights for Mission-Critical Networks
Security Insights for Mission-Critical Networks
 
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterMaintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
 
Embracing the Millennial Tsunami
Embracing the Millennial TsunamiEmbracing the Millennial Tsunami
Embracing the Millennial Tsunami
 
Shift the Burden
Shift the BurdenShift the Burden
Shift the Burden
 
Revolutionary, Not Evolutionary
Revolutionary, Not EvolutionaryRevolutionary, Not Evolutionary
Revolutionary, Not Evolutionary
 
Cybersecurity and the Human Psyche
Cybersecurity and the Human PsycheCybersecurity and the Human Psyche
Cybersecurity and the Human Psyche
 
The Human Point
The Human PointThe Human Point
The Human Point
 
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesAn Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
 
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityCloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Securing Beyond the Cloud Generation

  • 1. Copyright © 2018 Forcepoint | 1 Have you outgrown your web security? Joakim (JK) Lialias Sr. Director - Product Marketing
  • 2. Copyright © 2018 Forcepoint. | 2 TRENDS IMPACTING APPROACH TO SECURITY 71% of enterprises have hybrid cloud deployments 1.87 billion of mobile workers around the world by 2020 >1,000 SaaS applications used at a typical company 1/3 of enterprises will experience a successful attack targeting their Shadow IT resources by 2020 An expanded attack surface that threatens worker productivity and critical data
  • 3. Copyright © 2018 Forcepoint | 3Copyright © 2018 Forcepoint. | 3 Is your security solution having trouble keeping up? Explore what a modern security solution looks like—built to tackle the evolving threat landscape while adapting to today’s global, mobile workforce.
  • 4. Copyright © 2018 Forcepoint | 4 CRITICAL CAPABILITIES OF SECURE WEB GATEWAY Real-time threat defense against advanced threats Flexible deployment options with robust protection across deployment options Insight and control to cloud applications integrated with Secure Web Gateway Optimize Secure Connectivity for mobile workforce productivity Data Loss Prevention to control outbound traffic containing critical data
  • 5. Copyright © 2018 Forcepoint. | 5 BETTER SECURITY, LESS COMPLEXITY – AND THE EFFICACY TO BACK IT UP With Forcepoint, you get comprehensive, real-time threat defense. Advanced algorithms powering Real-Time Security classification to inspect all web content for malicious or suspicious code. Machine learning for Real-Time Content classification to quickly and accurately classify web pages. Intelligent URL classification to assess and classify new pages and links on the fly. Unique incident risk rating to quickly cut through the noise delivered by alerts. POWERED BY FORCEPOINT’S ADVANCED CLASSIFICATION ENGINE (ACE) +52% better efficacy to protect against real-world threats compared with the nearest web security competitor. *Miercom Security Effectiveness Testing https://www.forcepoint.com/2015-miercom-security-effectiveness-test-report
  • 6. Copyright © 2018 Forcepoint. | 6 ACE is why no one stops more threats than Forcepoint. +10,000 analytics insights Signature-based tools Predictive security engines built on machine learning and rules-based algorithms (Signature-less) Inline operation that blocks threats MEET ACE – DEFEATING RANSOMWARE AND SOPHISTICATED THREATS ALONG THE KILL CHAIN Anti-Malware Reputation Analysis Advanced Malware Detection Anti-Spam/ Phishing Real-time Data Classification Real-time Content Classification Real-time Security Classification URL Classification Advanced Classification Engine (ACE)
  • 7. Copyright © 2018 Forcepoint. | 7 EXTEND PROTECTION WITH ADVANCED MALWARE PROTECTION Unmatched accuracy that eliminates crippling false positives Comprehensive and actionable intelligence to optimize remediation efforts for incident response teams Full system emulation to effectively counter advanced evasions Shared global threat intelligence that can update other solutions +100% efficacy in advanced malware detection1 Zero false positives when convicting or exonerating advanced malware3 1. NSS Labs 2016 APT Test (Lastline) Forcepoint AMD offers seamless integration with Web Security solutions for a comprehensive defense delivered via cloud or on-premises
  • 8. Copyright © 2018 Forcepoint. | 8 EXTENDING CASB FUNCTIONALITY TO WEB SECURITY Forcepoint Secure Web Gateway Cloud Application Control Module CASB capabilities for Cloud Application traffic as it traverses the Forcepoint Web Security Solution. • Proxy based activity visibility • Anomaly detection + UEBA + Risk analysis • Real-time mitigation options • AD and SIEM integration Seamless and smooth implementation of CASB with one proxy Building on visibility and control for unsanctioned cloud applications with advanced CASB functionality tightly integrated
  • 9. Copyright © 2018 Forcepoint. | 9 ADVANCED CASB FUNCTIONALITY…YES IT IS BUILT IN…
  • 10. Copyright © 2018 Forcepoint | 10 FORCEPOINT IS A TOP CHOICE FOR ENTERPRISE COMPANIES. SEE WHY LEGACY VENDORS DON’T EVEN COME CLOSE.
  • 11. Copyright © 2018 Forcepoint. | 11 Forcepoint – Comprehensive Protection Legacy Players – Fragmented Protection LEGACY VENDORS OFFER FRAGMENTED PROTECTION Leading zero-day malware protection that combines ACE, AMD, CASB, and our proven ThreatSeeker Intelligence cloud. • INCLUDED + ADVANCED Create robust reports using an intuitive drag-and-drop interface—all within a centralized reporting system with unrivalled visibility and analytics. • BUILT-IN Avoid creating a fragmented security solution that requires multiple solutions for sandboxing and analytics. With Forcepoint, you get ACE and optional AMD already built in. • EXPANSIVE CASB INLCUDED Shadow IT, discovery, and control is a native inclusion in Forcepoint Web Security. Integrate Inline CASB capabilities easily with add-on module. Convoluted solutions requiring multiple products and vendors to deploy a standard security solution, incurring additional costs. • ADDITIONAL COST + LIMITATION Additional SKUs and costs required beyond basic reporting capabilities. Reports are not in real-time and not investigative. • ADDITIONAL VENDORS Sandboxing and analytics require third-party vendors like FireEye or Menlo Security, making your security more complex to manage. • ADDITIONAL COST Looking for a CASB solution? Get ready to spend more money. With an added SKU comes an additional layer of complexity, leaving you with a limited, “light” CASB solution with basic visibility.
  • 12. Copyright © 2018 Forcepoint. | 12 Forcepoint – Effective Protection Legacy Players – Limited Protection LEGACY VENDORS OFFERS LIMITATIONS IN PROTECTION Forcepoint ACE engine delivers real-time protection capabilities for robust protection against advanced threats. • REAL-TIME PROTECTION Advanced predictive analytics that delivers real-time security, content, and data classification. • CONTEXTUAL PROTECTION Broad based contextual assessments done to help ensure accuracy while helping to eliminate false positives. • DEEP INSPECTION Over 10,000 analytics insights that enable deep inspections. Lack of robust and consistent real-time protection creating a less effective defense against advanced threats. • LACK OF REAL-TIME PROTECTION No real-time analysis of malicious code. DRTP/WebPulse is used to categorize web site content and can generate several false-positives • LIMITATIONS IN PROTECTION The engine DRTP/WebPulse cannot scan session-based content or protect by login prompt. Focused on traditional web categories and fail with dynamic content (which increases constantly). Too many “secure all or nothing” configuration options • LACK OF ADVANCED SECURITY MECHANISMS WebPulse analytics is used for detection which lacks advanced security mechanisms. Weakness in early stages of an attack (exploit code, obfuscation, etc.).
  • 13. Copyright © 2018 Forcepoint. | 13 Forcepoint – Reliable Mobility Legacy Players – Unpredictable Mobility LEGACY VENDORS LEAVE YOU WITH COVERAGE GAPS • Forcepoint supports the evolving global workforce with innovative solutions to ensure connectivity for the anywhere, anytime user. • We offer adaptable endpoint options to secure your users, including our patent- pending Direct Connect Endpoint™. • Lack of options for endpoint agents and • No sandbox option for the cloud hinders your organization’s growth and adaptability of security solutions that protect the evolving global, mobile workforce.
  • 14. Copyright © 2018 Forcepoint. | 14 Forcepoint – Adaptive Architecture Legacy Players – Coverage Uncertainty LEGACY VENDORS MAKE IT DIFFICULT TO SCALE YOUR BUSINESS • Looking to change deployment architectures? Prepare for additional costs and more layers of complexity in migrating your solution. • Other legacy vendors are box-heavy, with drastically more expensive appliance and maintenance costs—often bundled into a multi-year agreement. • Flexible deployment architectures, whether you’re cloud-first, hybrid, or exploring what cloud can do for you. • Only Forcepoint offers true license mobility. Start where you need to be and move when you’re ready—without additional subscription costs. • Looking for an on-prem solution? Forcepoint offers enterprise-grade appliances at a fraction of the cost, including our no-cost virtual appliance
  • 15. Copyright © 2018 Forcepoint. | 15 YOU DON’T’ WEAR YESTERDAY’S SOCKS – WHY USE YESTERDAY’S SECURITY SOLUTION? At Forcepoint, we’re all about reducing complexity to drive increased productivity with better security outcomes—with unification of:  Web Security with Cloud Access Security Broker (CASB)  Data Loss Prevention (DLP)  Advanced Malware Detection (AMD)  Next Generation Firewall (URL Filtering) Products that communicate with each other, share policies, and create a dynamic environment for receiving, interpreting, and acting on data.
  • 16. 1 6 ANALYTICS MANAGEMENT ORCHESTRATION THE FLOW OF DATA THE RHYTHM OF PEOPLE Forcepoint UEBA Forcepoint SD-WAN & NGFW Forcepoint Insider Threat Forcepoint Web & Email Security Forcepoint Data Guard Forcepoint DLP Forcepoint CASB SECURE WEB GATEWAY KEY PART OF THE HUMAN POINT SYSTEM
  • 17. THE FLOW OF DATA THE RHYTHM OF PEOPLE EACH PRODUCT ELEMENT: ANALYTICS MANAGEMENT ORCHESTRATION Forcepoint UEBA Forcepoint SD-WAN & NGFW Forcepoint Insider Threat Forcepoint Web & Email Security Forcepoint Data Guard Forcepoint DLP Forcepoint CASB  Has best in class capabilities  Can be your starting point  Integrates together as a system with unified management and policy  Works with an existing environment DESIGN TENETS OF THE HUMAN POINT SYSTEM
  • 18. Copyright © 2018 Forcepoint | 18 A SECURE WEB GATEWAY THAT DELIVERS REAL CUSTOMER VALUE 122% return on investment when switching to Forcepoint Web Security2 100x reduction in the number of malware incidents2 52% better efficacy against real-world threats compared with nearest competitor1 1. Miercom Testing (2015-2016 Non-Signature Threats) 2. Forrester TEI Study 2017
  • 19. Copyright © 2018 Forcepoint. | 19 LOOKING TO PARTNER WITH YOU PARTNER WITH FORCEPOINT. GET YOU THE SOLUTION YOU NEED TODAY. PLAN FOR WHAT YOU WANT TO BUILD TOMORROW.
  • 20. Copyright © 2018 Forcepoint. | 20 THANK YOU

Hinweis der Redaktion

  1. HUMAN POINT SYSTEM COMPONENTS The Human Point system brings together that broad portfolio of products I mentioned earlier to address and understand the rhythm of people and the flow of your data. It brings together: UEBA DLP Insider Threat CASB Next Generation Firewall Data Guard Web and Email Security -- all under the umbrella of analytics common management, and orchestration. We designed this system very purposefully, with very specific tenets.
  2. HUMAN POINT DESIGN TENETS We made sure that each product element has best-in-class capabilities and would allow you to start anywhere. Start with any of our elements Don’t have to buy them in any particular order or buy all of them Start with any of them The more you buy, the better it gets They integrate together the system with unified management and policy Key design tenets was to make sure that they work with your existing environment We know from talking to many CISOs that they’ve made many investments in their security infrastructures. And nobody wants to do a rip and replace. So we made sure that we could integrate with the existing security environments and infrastructure that our customers are ready to put in place. Let’s look at some examples.