2. “Old Wine, New Bottles”
PURPOSE-BUILT COMPANY HUMAN CENTRIC CYBERSECURITY
4One of the largest private cybersecurity companies in the world, with thousands
of enterprise and government customers in more than 150 countries.
4Created by Raytheon in 2016 to commercialize defense-grade technologies
for the enterprise security market.
4Supporting global governments, defense and intelligence communities to ensure
success of the world’s most high-consequence missions.
UEBA
NGFW
WEB,
EMAIL, DLPCASB
CROSS DOMAIN
Cyber Products
INSIDER THREAT
UAM
Cyber Products
3. 3
Governments
Financial Health Care
Information
Technology
Energy &
Utilities
Government Security & Commercial Innovation
20+ Years Protecting Government Missions
Solutions in Use across Intelligence, Defense and
Civilian Agencies
Trusted by Systems Integrators & Services
Providers – Securing Customers & Themselves
Unmatched Expertise Across Sectors
Integrators &
Services Providers
SMC
SMC
CUSTOMER SUCCESS IS IN OUR DNA
4. DIGITAL
ACTIVITY
“BAD”“GOOD”
THE TRADITIONAL APPROACH TO CYBERSECURITY
‣ Trusting static policies in a
dynamic environment
‣ Decide what is good or bad at a
single point in time
‣ Configure your defenses to stop
the bad from entering and allow
the good to pass through
THREAT CENTRIC
Necessary but insufficient
A LACK
OF CONTEXT
EASY TO
CLASSIFY
EASY TO
CLASSIFY
HARD TO
CLASSIFY
5. SECURITY
EFFECTIVENESS
Data-centricThreat-centric
4 UEBA
4 Anti-Virus
4 Firewall
4 Secure Web Gateway
4 NGFW
4 Email Gateway
4 DLP
4 CASB
4 UEBA
4 Anti-Virus
4 Firewall
4 Secure Web Gateway
4 NGFW
4 Email Gateway
4 DLP
4 CASB
Source: Gartner, Cybersecurity Maturity Curve
OUR JOURNEY TOGETHER – The Enemy is OUTSIDE the Walls
1987
1994
2001
~2007
Mobility and Access created
a paradigm shift.
EVERYWHERE
6. “BAD”“GOOD”
NEW PARADIGM: HUMAN-CENTRIC CYBERSECURITY BEHAVIOR CENTRIC
DIGITAL
ACTIVITY
‣ Detect individuals interacting
with system that pose the
greatest potential user risk
‣ Rapidly and anonymously
understand potential risky
behavior and context around it
‣ Decide what is good or bad
based on how users interact with
your most valuable data
‣ Continuously revisit your
decisions as you and our
machines learn
PROVIDE
CONTEXT
TO MAKE
OPTIMAL
SECURITY
DECISIONS
Risk-adaptive security
CHANGE FROM THREAT CENTRIC TO BEHAVIOR CENTRIC
7. 7
DATAPEOPLE
FOCUS ON THE TRUE CONSTANTS: The Human Side of Cyber: interacting with data
PEOPLE DATA
Understanding the intersection of
people, critical data and IP over
networks of different trust levels.
THE HUMAN POINT
8. VISIBILITY CONTROL ENFORCEMENT
Know where your critical data is & who
is interacting with it everywhere
One policy to manage data
movement & access across
ALL distributed systems
Risk adaptive protection to act on change
in human risk to critical data in real time
the rhythm of your people the flow of your data
PROTECT THE HUMAN POINT BY UNDERSTANDING
AND
8
9. 9
100x reduction in
malware incidents when
deploying Forcepoint.1
Forcepoint
Web & Email
Security
Forcepoint
Data Guard
Eliminates costly and time-consuming
manual data transfers of highly-
regulated, sensitive data.
Forcepoint
NGFW
Cuts network expenses by 50%, reduces
cyberattacks by up to 86%, slashes
incident response time as much as 73%.
Forcepoint
CASB
Broadest cloud application support with unique
customized risk assessment based on user
behavior and data access classification.
Forcepoint
Insider Threat
The most comprehensive
understanding of user intent,
trusted on over 1M endpoints.
Forcepoint
DLP
Gartner Magic Quadrant
Leader in Enterprise DLP
9 consecutive times.
Forcepoint
UEBA
The leader in actionable
insights based on
risk-adaptive scoring.
BEST IN CLASS CAPABILITIES: START ANYWHERE AND SCALE OUT
10. 10
BEST IN CLASS CAPABILITIES: ITAR Controlled CROSS DOMAIN SOLUTIONS
Forcepoint
Data Guard
Forcepoint
Trusted
Thin Client
Forcepoint
Trusted Print
Delivery
Forcepoint
Trusted Mail
System
Forcepoint
High Speed
Guard
Forcepoint
SimShield
Forcepoint
Trusted
Gateway
System
Forcepoint
WebShield
Eliminates costly and time-consuming
manual data transfers of highly-regulated,
sensitive data.
Multilevel training and testing cost savings realized
through same time, multi-groups training and early
issue detection and correction.
Simultaneous multilevel access
providing significant ROI through
reductions in infrastructure,
hardware, office space, power
consumption, and administration. Significant cost savings from reduced
printer hardware at individual security
levels and decreased capital investment,
maintenance, consumables
and administration.
Secure, ‘on-demand’ web browsing
from one security domain to another,
eliminating data duplication and
streamlining network traffic.
A single inbox to consolidate email from
different networks at the highest level
Exceptional built-in manual review and automatic
validations; enabling safe and simultaneous file movement
between networks at different sensitivity levels.
Demonstrated the industry’s
fastest bi-directional
transfer rates of more than
9 gigabits per second (Gb/s)
11. HUMAN POINT SYSTEM ADDRESSES THESE
CONCERNS OF CISOs A
11
Data is now stored everywhere
and accessed from anywhere
Too many point solutions with
no unified security policy
Too many alerts -- cannot
determine critical signal
Enforcement is manual,
reactive, and too late
Visibility
4 Forcepoint DLP and Forcepoint Insider Threat combine to provide
powerful investigation capabilities, including video
4 Forcepoint NGFW offers central visibility into distributed locations
4 Cross Domain Solutions enable access and transfer of sensitive data
between segmented networks
Alert
Efficacy
4 Forcepoint UEBA applies analytics to cut through the noise
4 Forcepoint DLP’s Incident Risk Ranking identifies and offers
guidance to address the riskiest behavior
Dynamic
Enforcement
4 Forcepoint UEBA provides context into user actions across
disparate data sources to identify out-of-compliance activity
4 Forcepoint DLP remediates fraudulent activity before it happens
Integrated
System
4 Forcepoint’s Human Point System provides an integrated view of
clouds, 3rd party apps and users
4 Forcepoint’s system unifies multiple solutions in a single location
12. SECURITY
EFFECTIVENESS
Data-centric Risk adaptiveThreat-centric
4 UEBA
4 Anti-Virus
4 Firewall
4 Secure Web
Gateway
4 NGFW
4 Email
Gateway
4 DLP
4 Insider Threat
4 CASB
4 DLP
Source: Gartner, Cybersecurity Maturity Curve
RISK ADAPTIVE AND SECURITY EFFECTIVENESS:
OPPORTUNITIES TO UPGRADE CYBER POSTURE
4 Cross
Domain
Solutions
Forcepoint
UEBA
Forcepoint
NGFW
Forcepoint
Insider
Threat
Forcepoint
Web/Email
Security
Forcepoint
Data Guard
Forcepoint
DLP
Forcepoint
CASB
THE
HUMAN POINT
SYSTEM
13. OUR MISSION IS ALIGNED WITH YOURS
• Protecting NATSEC: 125 Cleared Staff
• Operational Readiness
• Cost Savings
• Accreditation: Speed to Deployment
13