This document discusses the need for modern web security solutions and touts the capabilities of Forcepoint's Secure Web Gateway. It notes trends like hybrid cloud deployments, mobile workers, and shadow IT that have expanded organizations' attack surfaces. It then summarizes Forcepoint's critical capabilities like threat defense, flexible deployment options, cloud app control, mobile optimization, and data loss prevention. The document promotes Forcepoint's advanced classification engine and efficacy against threats compared to competitors. It also describes Forcepoint's malware protection, CASB functionality, adaptive architecture, and value in terms of ROI and reduced malware incidents.
16. 1
6
ANALYTICS MANAGEMENT ORCHESTRATION
THE FLOW
OF DATA
THE RHYTHM
OF PEOPLE
Forcepoint
UEBA
Forcepoint
SD-WAN &
NGFW
Forcepoint
Insider Threat
Forcepoint
Web & Email
Security
Forcepoint
Data Guard
Forcepoint
DLP
Forcepoint
CASB
SECURE WEB GATEWAY KEY PART OF THE HUMAN POINT SYSTEM
17. THE FLOW
OF DATA
THE
RHYTHM OF
PEOPLE
EACH PRODUCT ELEMENT:
ANALYTICS MANAGEMENT ORCHESTRATION
Forcepoint
UEBA
Forcepoint
SD-WAN &
NGFW
Forcepoint
Insider
Threat
Forcepoint
Web & Email
Security
Forcepoint
Data Guard
Forcepoint
DLP
Forcepoint
CASB
Has best in class capabilities
Can be your starting point
Integrates together as a system with
unified management and policy
Works with an existing environment
DESIGN TENETS OF THE HUMAN POINT SYSTEM
HUMAN POINT SYSTEM COMPONENTS
The Human Point system brings together that broad portfolio of products I mentioned earlier to address and understand the rhythm of people and the flow of your data.
It brings together:
UEBA
DLP
Insider Threat
CASB
Next Generation Firewall
Data Guard
Web and Email Security
-- all under the umbrella of analytics common management, and orchestration.
We designed this system very purposefully, with very specific tenets.
HUMAN POINT DESIGN TENETS
We made sure that each product element has best-in-class capabilities and would allow you to start anywhere.
Start with any of our elements
Don’t have to buy them in any particular order or buy all of them
Start with any of them
The more you buy, the better it gets
They integrate together the system with unified management and policy
Key design tenets was to make sure that they work with your existing environment
We know from talking to many CISOs that they’ve made many investments in their security infrastructures. And nobody wants to do a rip and replace. So we made sure that we could integrate with the existing security environments and infrastructure that our customers are ready to put in place.
Let’s look at some examples.