Forcepoint Cloud Access Security Broker
Partners — Forcepoint Cloud Access Security Broker

Forcepoint Cloud Access Security Broker provides visibility and control over sanctioned and unsanctioned cloud apps to enable their safe and productive use. Unsanctioned adoption of cloud apps is a top cloud security concern for enterprises. Forcepoint Cloud Access Security Broker secure and non—intrusive approach to cloud app discovery and risk scoring ensures that IT can eliminate blind spots by uncovering what cloud apps are used by employees and their risk profiles. Inspect files and cloud content in real—time to prevent the malicious or unintentional leakage of confidential information. Identify and analyze sensitive or regulated data stored in cloud file — sync services to understand sharing permissions exposure and ensure compliance with regulations such as PCI DSS, SOX, and HIPAA. Minimize the risk of data proliferation to unmanaged or untrusted devices by enforcing device—based access rules. Prevent the downloading or syncing of data to unmanaged devices while allowing online access only to cloud data.

Forcepoint Cloud Access Security Broker monitors all user activity and analyzes usage patterns to rapidly detect anomalies that can indicate an account takeover. The dashboard provides a wealth of cloud analytics, highlighting suspicious activities and attempts to compromise accounts. Forcepoint Cloud Access Security Broker uses cloud APIs to analyze your cloud tenants, helping IT review users and admins to detect dormant accounts, external users, and ex—employees that might still have access to your cloud apps. In addition, Forcepoint Cloud Access Security Broker inspects your tenant security configurations to detect deficiencies and to recommend best—practice settings for effective cloud governance. Forcepoint Cloud Access Security Broker is the only cloud access security broker out there that protects enterprise data from theft and loss due to compromised, malicious, and careless users and that correlates activity anomalies with risky IP addresses. Uncovers cloud apps — sanctioned and unsanctioned — by inspecting data in user access logs across the enterprise.

Forcepoint Cloud Access Security Broker Cloud Governance

Forcepoint Cloud Access Security Broker provides a searchable Cloud App Directory where customers can view details, including customized risk factors, for each cloud app discovered. Harness the ability to categorize and prioritize each cloud app as high, medium, or low risk. Application risk scoring and weighting are based on several categories (Compliance, Security Settings, General Info, Data Leakage, Data Ownership, Account Termination Policy and Auditing), the consolidated results of which can help you prioritize your risk mitigation “to do” list. Gain visibility into cloud app security settings and get notified when SaaS admins make critical configuration changes. Forcepoint Cloud Access Security Broker compares these settings against a set of industry best practices or compliance standards (e.g., HIPAA, PCI DSS, ISO, CSA) and highlights deficiencies that require immediate attention. Scan corporate files and data stored in file—sharing services such as OneDrive, Box, Dropbox and Google Drive. See which ones are sensitive or contain regulated data so that you can initiate a remediation workflow, if necessary (e.g., alert) to meet your compliance requirements.

Forcepoint CASB

Forcepoint Cloud Access Security Broker provides visibility and control over sanctioned and unsanctioned cloud apps to enable their safe and productive use. Unsanctioned adoption of cloud apps is a top cloud security concern for enterprises. Forcepoint CASB’s secure and non—intrusive approach to cloud app discovery and risk scoring ensures that IT can eliminate blind spots by uncovering what cloud apps are used by employees and their risk profiles.

Inspect files and cloud content in real-time to prevent the malicious or unintentional leakage of confidential information. Identify and analyze sensitive or regulated data stored in cloud file-sync services to understand sharing permissions exposure and ensure compliance with regulations such as PCI, SOX, and HIPAA. Minimize the risk of data proliferation to unmanaged or untrusted devices by enforcing device—based access rules. Prevent the downloading or syncing of data to unmanaged devices while allowing online access only to cloud data.

Email incident workflow makes it easy to data owners and business stakeholders without needing to provide access to the DLP management system. Detect and protect even a fragment of structured or unstructured data. The industry’s most advanced fingerprinting technology allows you to detect and protect even a fragment of structured or unstructured data on a Windows or Mac endpoint device, whether it’s on or off the corporate network.

Forcepoint Insider Threat Data Protection is the only DLP solution with the behavioral analytics that understands employee behavior, recording user actions to identify and stop insider theft and the exfiltration of critical data caused by malicious or accidental behavior. Forcepoint Insider Threat Protection dramatically simplifies your data protection and prevention by focusing on what matters, your people and your data.

Forcepoint has a vision for a new approach to enterprise security: understand cyber behaviors to stop the bad and free the good. Forcepoint next generation firewalls block attacks and prevent the theft of data and intellectual property while transforming your infrastructure and operations for the better. Forcepoint NGFW connects and protects people and data throughout your offices, branches, and the cloud — all with the greatest efficiency, availability and security.You can deploy, monitor and update thousands of firewalls, IPSs and VPNs — all from a single console.

Map business processes into strong, accurate controls to foil advanced attacks, disrupt data theft and properly handle encrypted traffic. Cut network operating expenses in half and eliminate downtime throughout your network to keep your business running smoothly. Advances in cloud technology have given organizations increased flexibility and rapid collaboration capabilities. In order to reap these benefits, your organization must streamline security with an intelligent, cloud—first solution that protects in real—time and that will enable your long term mission and protect your reputation.

Protect your enterprise’s distributed data centers, edges, branches, cloud networks and the people who use them with the world’s best network security that delivers unrivaled efficiency, availability and global connectivity. Forcepoint Network Security delivers these immediate benefits to highly distributed enterprise networks. Cut your total cost of ownership burden by 50%, eliminate practically all network downtime, and slash theft without sacrificing performance. Solve these critical problems with the Next—Generation Firewall and take the burden and downtime out of connecting your branch offices.

Remotely deploy the NGFW to branch offices via our zero—touch deployment and Installation Cloud. The zero—downtime approach to clustering multiple firewalls keeps your site up and running even when you're updating policies or upgrading the software in the devices themselves. A Multi—Link VPN lets you combine multiple broadband connections (even from different Internet Service Providers) into a single link for automatic resilience, all at a fraction of the cost of dedicated MPLS lines.