View
4
Download
0
Category
Preview:
Citation preview
Copyright © 2017 Forcepoint. All rights reserved.
Forcepoint
Cybersecurity Solutions
Copyright © 2017 Forcepoint. All rights reserved. | 2
Cloud Security
Forcepoint Email Security
Forcepoint Linux Security
Forcepoint Web Security
Forcepoint CASB
Network Security
Forcepoint NGFW
Data & Insider Threat Security
Forcepoint Insider Threat
Forcepoint DLP
Forcepoint DLP Endpoint
Forcepoint InnerView (Global Governments Business Only)
Forcepoint Convergence
Forcepoint Spotlight
Forcepoint CrossView
Cross Domain & Multi-Level Security
Forcepoint Trusted Thin Client
Forcepoint Trusted Thin Client: Remote
Forcepoint High Speed Guard
Forcepoint Small Format Guard
Forcepoint Trusted Gateway System
Forcepoint Trusted Print Delivery
Forcepoint Trusted Mail System
Forcepoint SimShield
Forcepoint WebShield
Additional Solutions (Global Governments Only)
Forcepoint SureView Analytics
Forcepoint Trusted Access Mobile
LIST OF CYBERSECURITY SOLUTIONS
Copyright © 2017 Forcepoint. All rights reserved. | 3
FORCEPOINT CLOUD WEB
SECURITY
▸ Integrated DLP
▸ Integrated sandboxing
▸ CASB integration
▸ Direct Connect
▸ Easy dashboard access to
forensic data
FORCEPOINT CASB
▸ Integration with Web
Security and DLP
▸ Enables Forcepoint to
understand behaviors in
the cloud
FORCEPOINT CLOUD
EMAIL SECURITY
▸ Integrated DLP
▸ Integrated sandboxing
▸ Rich data collection
▸ Optical Character
Recognition
▸ Encrypted file detection
▸ Image analysis
▸ ADVANCED THREAT
PROTECTION
▸ Sandboxing integrated
with FP Web Security,
Email Security, and
NGFW solutions
▸ Threat Protection for
Linux
CLOUD SECURITY
BUSINESS OUTCOMES PRODUCTS & FEATURES
ACCOLADES
Protecting people from compromise as they use the web and email from any location, on any device
Protect every user, everywhere without the need for
an appliance
Safely embrace business in the cloud
Reliable performance in the industry’s most secure
cloud
Leverage rich data collection to help identify “high
risk” users and defend against insider threats
Help make you compliant (e.g., GDRP)
2016 IDC MarketScape: SaaS Email Security: Leader
2016 IDC MarketScape: Hardware Email Security: Leader
2016 IDC MarketScape: Worldwide Email Security: Leader
2016 IDC MarketScape: WW Web Security: Leader
2015 Forrester Wave: SaaS Web Content Security Wave: Leader
2016 Corporate Web Security Market Quadrant: Top Player2016 Secure Email Gateway Market Quadrant: Top Player
2016 APT Protection Market Quadrant: Top Player2015 Best Web Content Management Solution2014 Best Advanced Persistent Threat (APT) Protection
Copyright © 2017 Forcepoint. All rights reserved. | 4
Stops the spam and phishing emails that introduce ransomware and other advanced threats before they can compromise users or infect systems with malware on the industry’s most secure cloud infrastructure.
Core Email Security defenses can be expanded with dynamic Advanced Malware Detection (aka sandboxing) and the ability to coordinate with Forcepoint Web Security to stop threats across the entire threat lifecycle.
Control Phishing through advanced detection techniques as well as unique Phishing Education. High Risk User Behavior reports and other Forcepoint innovations.
URL Wrapping and other capabilities protect users from threats whenever and wherever they access email, and unique attachment controls can secure sensitive information from being accessed on BYOD or other less secure devices.
Email Encryption secures confidential communications while a range of DLP controls protect IP and other sensitive information from accidental loss or malicious acts by insiders.
Assessment & Authorization/Certification: ISO/IEC 27001, ISO/IEC 27018, Cloud Security Alliance (CSA) Open Security, Trust & Assurance Registry (CSTAR) Certification, HIPAA/HITECH, UK – G-Cloud, Canadian PIPEDA, ENISA, Privacy Shield, ISO 22301, ISO 27017, NIST 800-171, New Zealand Cloud Computing (NZCC) Framework, PCI-DSS, SOC 2 Certified.
Export Notes: Software Encryption classification: 5D002.c.1. Authorized for License Exception ENC under Sections 740.17 (b)(1) and (b)(3) of the EAR. Technology Classification 5E002.a. Authorized for License Exception ENC under Sections 740.17 (A) and (B)(2) (iv) (B).
CLOUD SECURITY: FORCEPOINT EMAIL SECURITY
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 5
Automates Linux memory forensics to verify the integrity of the
kernel and processes on each server.
Detects rootkits, backdoors, unauthorized processes and other
signs of intrusions that may have penetrated all other defenses.
Its memory forensics alerts can be easily integrated into any existing
Security Incident Event Management (SIEM) system so that your
team can carry out quick, in-depth investigation and response.
Leverages SSH infrastructure for network communication,
eliminating the need for an always-running agent
Export Notes: #G144692 7/31/12, Encryption classification: 5D002.c.1 per 740.17 (B)(3). No
export licenses required worldwide. Semi-annual reporting required. "Use" Technology Classification
5E002.a per 740.17 (B) (2) (IV) (B). No export licenses required worldwide, does have semi-annual
reporting required. Any other technology requires a license.
CLOUD SECURITY: FORCEPOINT LINUX SECURITY
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 6
The proven leader in preventing data loss, whether deployed in the Cloud, hybrid or on premise.
Real-Time Analysis for Advanced Threat Protection
Integrated Sandboxing
Easy Dashboard Access to Forensic Data
Integrated Data Theft Defenses
Stops more advanced, non-signature threats to your data than any other solution – including Blue Coat, Cisco, and McAfee (Intel Security)!
Assessment & Authorization/Certification: ISO/IEC 27001, ISO/IEC 27018, Cloud Security Alliance (CSA) Open Security, Trust & Assurance Registry (CSTAR) Certification, HIPAA/HITECH, UK – G-Cloud, Canadian PIPEDA, ENISA, Privacy Shield, ISO 22301, ISO 27017, NIST 800-171, New Zealand Cloud Computing (NZCC) Framework, PCI-DSS, SOC 2 Certified.
Export Notes: Software Encryption classification: 5D002.c.1. Authorized for License Exception ENC under Sections 740.17 (b)(1) and (b)(3) of the EAR. Technology Classification 5E002.a. Authorized for License Exception ENC under Sections 740.17 (A) and (B)(2) (iv) (B).
CLOUD SECURITY: FORCEPOINT WEB SECURITY
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 7
Helps organizations eliminate security and compliance
blind spots by providing visibility and control over
shadow IT and unsanctioned cloud applications.
Provides both the ability to discover the use of unsanctioned
cloud applications and assess associated risk.
Control how sanctioned cloud applications such as Office 365,
Google Suite, Salesforce, Box, Dropbox and others are used in
order to prevent the loss of critical intellectual property.
Enables organizations to embrace the cloud by ensuring that
their users are not engaging in risky behaviors without slowing
them down
Export Notes: The Forcepoint CASB (formerly Skyfence) Cloud software product has been classified with an
ECCN of 5D002.c.1 under the jurisdiction of the U.S. EAR. Forcepoint CASB is authorized for export under
‘ENC/Unrestricted, per 740.17(b)(3)(iii)’.
CLOUD SECURITY: FORCEPOINT CASB
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 8
NETWORK SECURITY
PRODUCTS & FEATURESBUSINESS OUTCOMES
ACCOLADES
FORCEPOINT NGFW
▸ Connectivity – instant-setup VPNs
▸ Availability – zero-downtime updates
▸ Efficacy – pioneer in IPS evasion defense
▸ Scalability – 16x clustering, orchestration
▸ Manageability – centralized Smart Policies
▸ Visibility – interactive 360° visualization
Connect and Protect seamlessly –
Data Center, Edge, Branch, Cloud
50% Cut in TCO Burden
95% Reduction in Network Downtime
100% Evasion Protection
Giving visibility to people's actions in the network while keeping attackers out – across data centers, offices, branches, and cloud
NETWORKING SECURITY
CONNECT & PROTECT
2016 NSS Labs
RECOMMENDED:
Next Generation Firewall
2016 NSS Labs
RECOMMENDED:
Next Generation IPS
▸ Uniform solution for physical, virtual, cloud
▸ Fast decryption with granular privacy control
▸ Mission-critical application proxies
▸ Broadband network clustering
▸ Sandboxing and Web Security integration
▸ Managed Service Provider (MSP) support
Availability
Connectivity
EfficacyScalability
Manageability
Visibility
Copyright © 2017 Forcepoint. All rights reserved. | 9
Forcepoint Next Generation Firewall (NGFW) protects enterprise networks with high-
performance security supported by real-time updates. This enables Forcepoint to deliver
the industry’s best defense against advanced evasions along with complete NGFW
protection.
Deploy, monitor, and update thousands of firewalls, VPNs and IPSs from a single console.
Eliminate downtime with high-availability clustering and Multi-Link networking.
Block attacks and manage encrypted traffic without hurting performance.
A pioneer in Advanced Evasion Technique defenses and proxy technologies for mission-critical
applications.
Both physical and virtual appliances.
Forcepoint Security Management Center (SMC) enables efficient, centralized management of
NGFWs and IPSs in distributed enterprise environments – from datacenters and edge to
branches and cloud.
Assessment & Authorization/Certification: FIPS 140-2, CSPN by ANSSI certified. Planned UC-APL, CNSSP-11, CNSSI 1253 IA
Controls planned for NGFW 6.4 (Q1 2018).
Export Notes: Software Encryption classification: 5D002.c.1. Authorized for License Exception ENC under Sections 740.17 (a) and
(b)(2) of the EAR. Appliances Classification 5A002.a.1. Authorized for License Exception ENC under Sections 740.17 (a) and (b)(2)
of the EAR. Technology Classification 5E002.a. Authorized for License Exception ENC under Sections 740.17 (A) and (B)(2) (iv) (B).
NETWORK SECURITY: FORCEPOINT NGFW
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 10
DATA & INSIDER THREAT SECURITY
SOLUTIONSBUSINESS OUTCOMES
ACCOLADES
1 DLP and Insider threat available today. Advanced Data & Insider Threat available 1Q2018
Understanding people’s behavior and intent to protect critical IP
2016 Enterprise Data Loss Prevention MQ:
Leaders Quadrant
2016 Critical Capabilities for Enterprise
DLP: Highest Product Score in Regulatory
Compliance Use Case
2016 Forrester Wave: Data Loss Prevention
Suites: Leader
2015 Best DLP Solution-EMEA
2015 SureView Insider Threat Review
FORCEPOINT DLP▸ Data Discovery
▸ Fingerprinting
▸ Policy Enforcement
▸ Analytics: Incidents
▸ Risk Scoring
FORCEPOINT INSIDER THREAT▸ User Behavior Observation
▸ User Context Capture
▸ Video Capture Replay
▸ Analytics: User Behavior
▸ Risk Scoring
Preventing data breaches and loss
Centralized situational awareness of user and
system activities
More productive employees by understanding intent
Greater efficiency by combining DLP, UEBA, IMS,
SOAR
Satisfying the compliance needs of boards and
regulators
FORCEPOINT ADVANCED DATA
& INSIDER THREAT1
▸ Forcepoint DLP & Insider Threat,
including: Threat Operations,
Response & Orchestration
▸ Advanced Analytics
▸ Risk Adaptive Protection
Observe
Prevent
unauthorized
data movement
Investigate
Protect
Identify
malicious
users
Detailed
metadata &
video to
contextualize
actions
Replay events
with multiple
accounts and
systems
Broad
awareness of
user activities
Monitor accounts
and system
activitiesOrchestrate
Copyright © 2017 Forcepoint. All rights reserved. | 11
Proactive, endpoint, information protection solution that
enables safe and effective use of business-critical
technologies by capturing human behavior technical
observables, which include policy violations, compliance
incidents or malicious acts that are warning signs leading
up to a breach.
Complements APT solutions by providing irrefutable and
unambiguous attribution of end-user activity.
Provides full context for rapidly discerning malicious from
benign actions that are easily reviewed and understood by
non-technical personnel—all while respecting employee
privacy guidelines
Can be deployed for audits and investigations across
multiple network architectures using a wide variety of
security concepts of operations
Export Notes: #G168690 dated 11/14/16: Software Encryption classification: 5D002.c.1.
Authorized for License Exception ENC under Sections 740.17(A) and (B)(3)(iii) of the
EAR. Technology Classification 5E002.a. Authorized for License Exception ENC under
Sections 740.17(A) and (B)(2).
DATA & INSIDER THREAT SECURITY: FORCEPOINT INSIDER THREAT
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 12
Forcepoint DLP is recognized as one of the most innovative Data Loss Prevention (DLP) solutions designed to secure personal data, intellectual property and other sensitive information on your network from attack and exfiltration.
Incident Risk Ranking Dashboard – First in the industry’s to cluster incidents with risk scoring the severity of the incidents. Generates a stack ranked report identifying the incidents posing the greatest risk to an organization.
Advanced Technology - OCR for visibility to text hidden in an image. Drip DLP to stop the “low and slow” theft of stealing data in small volumes over time. Integrates with an insider threat solution linking data movement to the user behaviors
Export Notes: Software Encryption classification: 5D002.c.1. Authorized for License Exception ENC under Sections 740.17(A) and (B)(3)(iii) of the EAR. Technology Classification 5E002.a. Authorized for License Exception ENC under Sections 740.17(A) and (B)(2).
DATA & INSIDER THREAT SECURITY: FORCEPOINT DLP
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 13
Forcepoint DLP Endpoint extends Forcepoint
DLP capabilities to protect endpoint devices
against data theft whether they are on or off
the corporate network.
Powerful DLP capabilities enable customers to
secure personal data, intellectual property and other
sensitive information on MacOS, Linux or Windows
endpoints, and USB/Removable media.
Preconfigured policies allow customers to meet
compliance requirements.
Export Notes: Software Encryption classification: 5D002.c.1. Authorized for License
Exception ENC under Sections 740.17(A) and (B)(3)(iii) of the EAR. Technology
Classification 5E002.a. Authorized for License Exception ENC under Sections 740.17(A)
and (B)(2).
DATA & INSIDER THREAT SECURITY: FORCEPOINT DLP ENDPOINT
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 14
Proactive User Activity Monitoring (UAM) and insider threat management solution that provides a low-risk, high-capability path to implementing the UAM component of an insider threat detection and prevention program.
Protects agencies and their critical data by monitoring technical observables such as data’s location and movement, as well as the actions (including precursor actions) of users who access, alter and transport that data.
Full audit capabilities prevent misuse of the system or tampering with evidence.
Export Notes: ITAR-controlled – USML Category XIII(b)(1) requiring Export License or Technical Assistance Agreement (TAA).
DATA & INSIDER THREAT SECURITY: FORCEPOINT INNERVIEW
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 15
Convergence aggregates data from multiple
external sources such as HR records, personnel
security data, phone logs and physical access
control directly into Forcepoint InnerView.
The aggregation of this data with existing
InnerView data provides a broader set of easily
searchable data that can produce more insight
into an individual’s activities and behaviors.
This enterprise visibility from multiple security
data sources, enables rapid identification,
prioritization and response to policy breaches,
cybersecurity attacks and insider threats.
The unified view of these disparate data sources fulfills
Intelligence Community Standard 700-2 requirements.
Export Notes: Software classification EAR99. Export license is typically not
required.
DATA & INSIDER THREAT SECURITY: CONVERGENCE
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 16
An open interface that allows access to
Insider InnerView by sophisticated third
party analytics platforms. The interface
gives a seamless, unified view of
analytic results along with the
supporting user behavior information.
Supports two way data integration with
universal support for SIEM/HBSS
platforms.
Export Notes: Software classification EAR99. Export license is typically
not required.
DATA & INSIDER THREAT SECURITY: SPOTLIGHT
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 17
With the addition of Forcepoint High Speed Guard to
Forcepoint InnerView, agencies gain the ability to analyze
events across disparate security domains on one
Investigator Workbench to capture a single
comprehensive view of user activities.
Information sent between the client and collector first
pass through the cross domain solution to ensure:
Audit policies downloaded from higher security
levels do not contain classified data inappropriate
for the lower networks
Data intended for certain networks remain
separate
Only verified Forcepoint InnerView agent traffic is
passed along to the InnerView system.
Export Notes: Software classification EAR99. Export license is typically not
required. See also Forcepoint High Speed Guard
DATA & INSIDER THREAT SECURITY: CROSSVIEW
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 18
CROSS DOMAIN & MULTI-LEVEL SECURITY
PRODUCTS & FEATURESBUSINESS OUTCOMES
Built-in security to support the cyber warrior and
the global mission
Reliably share information with mission partners
Reduce costs while increasing efficiencies and
security
The Global Governments business develops and sells
products while also serving as a go-to-market support
arm into government markets for other Forcepoint
businesses
EXPORTABILITY
Trusted Thin Client | High Speed Guard | Small
Format Guard | “Matisse” | “Dali” | Trusted Gateway
System | Trusted Print Delivery| Trusted Mail
System | WebShield | SimShield | InnerView
ITAR / Export
Controlled
Products
Exportable
Products
SureView Analytics | “Van Gogh” (NEW 2H17) |
“Rafael” | Trusted Access Mobile
sold by Global Governments worldwide…
CROSS DOMAIN – SECURE DATA ACCESS ▸ Reduce hardware footprint while allowing secure, simultaneous access to multiple
separated networks of varied classification levels from a single endpoint
▸ Centralized management and monitoring
▸ Scalability to easily add networks
▸ Enable users everywhere
Enabling people to easily and seamlessly access critical information across multiple secure networks
▸ Printer consolidation in multi-level
enterprises
▸ Fixed-format transfer for distributed
simulation operations, live training
exercises and test events
▸ Secure browse-down and data
retrieval
▸ Automate and audit secure data
movement between secure networks
▸ Highly complex, bi-directional, automated
machine-to-machine transfer
▸ Real-time streaming video support
▸ Solutions to meet SWaP-C requirements
▸ Workflow mechanism for efficient person-
to-person file transfer. Facilitates Reliable
Human Review (RHR) and ensures that
all security checks are performed
CROSS DOMAIN – SECURE DATA & File TRANSFER
Copyright © 2017 Forcepoint. All rights reserved. | 19
Secure simultaneous access to information on any number of networks from a single endpoint. Designed for enterprise deployments with centralized management and monitoring, scalability to easily add networks and clients.
Hardware and virtual desktop infrastructure (VDI) agnostic
Integrates with common virtualization and consolidation technologies such as Citrix®, Microsoft®, and VMware®
Reduces desktop hardware and allows for space reclamation
Reduces infrastructure for cabling and cooling
Streamlined administration with robust enterprise management capabilities
Commercial-Off-The-Shelf (COTS) solution
Assessment & Authorization/Certification: An approved access cross domain solution on the Unified Cross Domain Services Management Office (UCDSMO) Cross Domain Baseline for Secret and Below Interoperability (SABI), Top Secret/SCI and Below Interoperability (TSABI). Assessed and Authorized by authorities according to NIST guidelines in the US and Five-Eyes nations.
Export Notes: ITAR-controlled – USML Category XIII(b)(4). Export License or Technical Assistance Agreement (TAA) required. Canadian Exemption may apply. Five-Eyes Only.
CROSS DOMAIN & MULTI-LEVEL SECURITY: FORCEPOINT TRUSTED THIN
CLIENT
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 20
Extending secure multi-network access outside of the traditional physical
security perimeter, Forcepoint Trusted Thin Client Remote utilizes the
standard accredited Forcepoint Trusted Thin Client solution, with
additional endpoint and communication security technologies, to permit
roaming access from standard-issue laptops and hybrid devices.
Trusted Thin Client endpoint software running natively as the secure host
operating system
Part of a registered Commercial Solutions for Classified (CSfC) solution
Uses dual VPN communication stack encryption
Supports flexible Linux or Windows outer and inner tunnel VPN client
deployment options
Uses off-the-shelf (approved/qualified) laptop and hybrid devices
Assessment & Authorization/Certification: See Forcepoint Trusted Thin Client for
base information.
Export Notes: ITAR-controlled – USML Category XIII(b)(4). Export License or
Technical Assistance Agreement (TAA) required. Canadian Exemption may apply.
Five-Eyes Only.
CROSS DOMAIN & MULTI-LEVEL SECURITY: FORCEPOINT TRUSTED THIN
CLIENT: REMOTE
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 21
Enables rapid, bi-directional, automated transfer of highly complex
data between multiple domains. Supports large enterprise systems
with comparatively low administration costs, making it the ideal
choice for large scale deployments that require large volume,
automated data transfers.
High Speed Guard has demonstrated the industry’s fastest bi-
directional transfer rates of more than 9 gigabits per second (Gb/s).
Commercial-Off-The-Shelf (COTS) solution
Eliminates costly and time consuming manual data transfers
Customer configurable for simplified operations and maintenance
Assessment & Authorization/Certification: An approved transfer cross
domain solution on the Unified Cross Domain Services Management Office
(UCDSMO) Cross Domain Baseline for Secret and Below Interoperability
(SABI), Top Secret/SCI and Below Interoperability (TSABI). Accredited and
evaluated by authorities in the US and Five-Eyes nations.
Export Notes: ITAR-controlled – USML Category XIII(b)(4). Export License or
Technical Assistance Agreement (TAA) required. Canadian Exemption may
apply. Five-Eyes Only.
CROSS DOMAIN & MULTI-LEVEL SECURITY: FORCEPOINT HIGH SPEED
GUARD
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 22
Highly secure, bi-directional, small form factor transfer guard that enables automated data transfers between multiple domains. Small Format Guard satisfies requirements for size, weight, power and cooling (SWaP-C), while providing high throughput and low latency.
Designed to for use in non-traditional data centers such as aircraft. The solution supports robust security protocols and is adaptable to specific mission needs.
Commercial-Off-The-Shelf (COTS) solution
Eliminates costly and time consuming manual data transfer
Improves mission effectiveness by making data available where and when it is needed
Built into the Forcepoint™ High Speed Guard™ baseline; differentiated by license
Supports low power, high throughput, and low latency transfers in non-traditional data centers.
Assessment & Authorization/Certification: See Forcepoint High Speed Guard.
Export Notes: ITAR-controlled – USML Category XIII(b)(4). Export License or Technical Assistance Agreement (TAA) required. Canadian Exemption may apply. Five-Eyes Only.
CROSS DOMAIN & MULTI-LEVEL SECURITY: FORCEPOINT SMALL FORMAT
GUARD
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 23
Provides exceptional built-in manual review and automatic validations,
such as virus scanning, dirty word search and deep content inspection,
enabling safe and simultaneous file movement between networks at
different sensitivity levels.
Includes a web-based GUI for quickly preparing and verifying files
(documents, images, etc.) for transfer between networks of different
classification levels. Trusted Gateway System provides end-to-end
auditing of the two person human review process for releasing
documents (when required by policy).
Commercial-Off-The-Shelf (COTS) solution
Web application that run the user’s browser; no desktop administration required
Multi-directional file transfer guard
Assessment & Authorization/Certification: An approved transfer cross domain
solution on the Unified Cross Domain Services Management Office (UCDSMO)
Cross Domain Baseline.
Export Notes: ITAR-controlled – USML Category XIII(b)(4). Export License or
Technical Assistance Agreement (TAA) required. Canadian Exemption may apply.
Five-Eyes Only.
CROSS DOMAIN & MULTI-LEVEL SECURITY: FORCEPOINT TRUSTED
GATEWAY SYSTEM
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 24
Secure means for users to print from existing applications at different security or sensitivity levels to a single printer located on the high side network.
Enables productivity gains for users printing in multi-level environments. Significant cost savings occurs from reduced printer hardware at individual security levels and decreased capital investment, maintenance, consumables and administration.
Commercial-Off-The-Shelf (COTS) solution
Leverages Forcepoint Trusted Gateway System for secure data transfer
Extends investment in cloud printing strategies
Standard print submission and print attributes
Organizations can save up to 65% of total printing costs (hardware, consumables, support) through printer consolidation efforts
Assessment & Authorization/Certification: Works with the approved Forcepoint Trusted Gateway System cross domain solution, which is on the Unified Cross Domain Services Management Office (UCDSMO) Cross Domain Baseline.
Export Notes: ITAR-controlled – USML Category XIII(b)(4). Export License or Technical Assistance Agreement (TAA) required. Canadian Exemption may apply. Five-Eyes Only.
CROSS DOMAIN & MULTI-LEVEL SECURITY: FORCEPOINT TRUSTED PRINT
DELIVERY
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 25
Enables the secure, policy-enforced exchange of emails and
attachments between users on different networks from one email
system, eliminating the need to switch between systems at multiple
levels. Provides a ‘single inbox’ that consolidates email residing on
various networks at the highest level.
Commercial-Off-The-Shelf (COTS) solution
Authorized for TSABI environments
Leverages Forcepoint Trusted Gateway System for secure email transfer
Eliminates costs by reducing redundant email client licenses
Increases user productivity: eliminating the need to switch between multiple
email accounts or physically relocate to access secure email
Minimizes the possibility of missing critical messages and ensures more timely
responses
Assessment & Authorization/Certification: Works with the approved Forcepoint
Trusted Gateway System cross domain solution, which is on the Unified Cross
Domain Services Management Office (UCDSMO) Cross Domain Baseline
Export Notes: ITAR-controlled – USML Category XIII(b)(4). Export License or
Technical Assistance Agreement (TAA) required. Canadian Exemption may apply.
Five-Eyes Only.
CROSS DOMAIN & MULTI-LEVEL SECURITY: FORCEPOINT TRUSTED MAIL
SYSTEM
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 26
Connecting multi-level training (live, virtual, and constructive) and testing environments in a real-world manner – across security boundaries – allows for more effective and efficient training and testing.
These efficiencies result in cost savings, a better trained warfighter and more thoroughly tested equipment. Training cost savings are realized through the ability to train multiple groups at the same time, whether they are multiple national agencies or coalition forces. Testing cost savings are realized through earlier detection and correction of issues and errors and the elimination of repeated tests.
Commercial-Off-The-Shelf (COTS) solution
Accredited and evaluated by authorities in the United States
Cross Domain, multi-level guard – SimShield Trusted Bridge™
Standalone GUI rule builder – SimShield Policy Editor™
Capability to label, segregate, protect, and exchange data between systems executing at
different sensitivity or classification levels.
Native support for DIS, HLA, TENA, RTP and MPEG2-TS protocols
Assessment & Authorization/Certification: An approved transfer cross domain
solution on the Unified Cross Domain Services Management Office (UCDSMO) Cross
Domain Baseline. The only accredited TENA guard available. Evaluated by the High
Performance Computing Modernization Program Office (HPCMPO) for connection to
Defense Research & Engineering Network (DREN) and Secure Defense Research &
Engineering Network (SDREN).
Export Notes: ITAR Category IX- outside counsel determination, no past
performance to judge distribution restrictions. State Department Licenses and
technical assistance agreements required for all customers.
CROSS DOMAIN & MULTI-LEVEL SECURITY: FORCEPOINT SIMSHIELD
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 27
Provides secure web search and browse-down capabilities from high side
networks to lower level networks. Perfect for big data environments,
WebShield enables secure, ‘on-demand’ web browsing from one security
domain to another, eliminating data duplication and streamlining of network
traffic.
Commercial-Off-The-Shelf (COTS) solution
Accredited and evaluated by authorities in the United States
All requests, responses, and transfers go through security controls including dirty
word search, virus scan, and malicious content checks.
No desktop administration is required
Remote administration through the Remote Access Console (RAC)
Assessment & Authorization/Certification: An approved transfer cross domain
solution on the Unified Cross Domain Services Management Office (UCDSMO) Cross
Domain Baseline.
Export Notes: ITAR-controlled – USML Category XIII(b)(4). Export License or
Technical Assistance Agreement (TAA) required. Canadian Exemption may apply. Five-
Eyes Only.
CROSS DOMAIN & MULTI-LEVEL SECURITY: FORCEPOINT WEBSHIELD
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 28
Forcepoint SureView Analytics Forcepoint Trusted Access Mobile
ADDITIONAL SOLUTIONS – GLOBAL GOVERNMENTS ONLY
Analytics Secure Mobile Access
Copyright © 2017 Forcepoint. All rights reserved. | 29
Employs virtual data warehousing, federated search, powerful algorithms for automated information discovery and intuitive workflow tools.
Granular user access through multi-tiered security
Advanced defense-grade security protocols
Federated searching of big data across multiple source types
Virtual data warehouse architecture
Automated data discovery to find hidden associations
Integrated geospatial, temporal, statistical and link analysis visualizations
Built-in reporting tools for drawing and labeling, importing images and customizing reports
Eliminates wasteful data duplication
Minimizes time spent on data collection, collation and correlation
Maximizes time spent on analysis and informed response to reduce the dwell time of threats
Reduces TCO and logistical demands on IT and compliance teams
Export Notes: Export Notes: #G168690 dated 11/14/16: Software Encryption classification:
5D002.c.1. Authorized for License Exception ENC under Sections 740.17 (a) and (b)(3)(iii) of
the EAR. Technology Classification 5E002.a. Authorized for License Exception ENC under
Sections 740.17 (A) and (B)(2) (iv) (B)
FORCEPOINT SUREVIEW ANALYTICS
Link to Datasheet
Contact: G2 Business Development
+1 (703) 318.7134
Copyright © 2017 Forcepoint. All rights reserved. | 30
Securely and confidently accessing sensitive information from
virtually any mobile device.
Native mobile applications are virtualized in a secure virtual mobile
infrastructure (VMI) and leverage secure redisplay technologies for
user interactions. VMI enables strict yet flexible access policy
enforcement to control user devices based on contextual information
such as role, OS version, GPS location, cellular and Wi-Fi Access
Point restrictions.
For endpoint security, access on the remote mobile device is
facilitated by a secure redisplay app that is provisioned onto the
device with user-identity credentials.
Bring Your Own Device (BYOD) compatible
Co-exists with existing MDM and MAM solutions
Cost-effective
Ensures secure access to sensitive, confidential, or proprietary data
Reduces and prevents data loss and device compromise
Access to native, desktop and Web apps
NIAP validation: October 2016
FORCEPOINT TRUSTED ACCESS MOBILE
Link to Datasheet – available by request
Contact: G2 Business Development
+1 (703) 318.7134
Export Notes: #G155262 dated 8/5/14: Software Encryption classification:
5D002.c.1. Authorized for License Exception ENC under Sections 740.17
(a) and (b)(2) of the EAR. Technology Classification 5E002.a. Authorized
for License Exception ENC under Sections 740.17 (B) (2) (iv) (B) of the
EAR.
Recommended