About Forcepoint
Asia

About Forcepoint

Forcepoint is the leading user and data protection cybersecurity company, entrusted to safeguard organizations while driving digital transformation and growth. Forcepoint's solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value. The Forcepoint Human Point platform delivers Risk-Adaptive Protection to continuously ensure trusted use of critical data and systems. 

SOLUTIONS / PRODUCTS

Dynamic Data Protection: Keep people productive and data secure via risk-adaptive protection.

A modern Zero Trust architecture drives organizations towards a more data and user-centric approach while moving away from being perimeter-centric. It is a key element for today's digital business.

Forcepoint's Dynamic Data Protection (DDP) fits right in to your Zero Trust architecture with:

  • Individualized adaptive data policies
  • Behavioral analytics driven insights
  • Data discovery and classification
  • Maximizing security analyst efficiency and reducing fatigue

 

Dynamic User Protection: Identify and mitigate risky behaviors from compromised users.

Dynamic User Protection (DUP) is cloud-based user activity monitoring solution that uses Indicators of Behavior (IOBs) — a context-rich monitoring approach that analyzes user activities — to mitigate risk at the earliest point of detection.

  • Gain meaningful visibility into user interactions with critical data
  • Implement a Zero Trust model with continuous user validation
  • Detect risk "left of loss" with comprehensive risk scoring
  • Investigate risk from insiders with efficiency and ease

 

Dynamic Edge Protection: Security-as-a-service for using web, cloud, and private apps—keep threats out and data in.

Secure Access Service Edge (SASE) is a new, unified way to safeguard your use of web, cloud, and private applications without the hassles of point products. Forcepoint takes SASE even further, combining true, enterprise-class data loss prevention with secure access and advanced threat protection.

Now, your people can work anywhere, safely and efficiently, keeping threats out and sensitive data in.

  • Web, cloud, and data security in a single cloud service
  • Remote access to private apps without the pain of VPNs
  • Risk-based protection for personalized, automated security
  • Operational efficiency, managed from the cloud

 

Insider Threat: Unrivaled visibility into user behavior to detect threats from within.

Forcepoint Insider Threat saves you time and effort by automatically scoring and prioritizing your riskiest users, reducing the need to dig through thousands of alerts. This frees your team to focus on high-priority tasks and improves efficiencies. Forcepoint Insider Threat also provides the context and forensic evidence needed for undeniable attribution and chain of custody– simplifying investigations, prosecution, and compliance.

 

Behavioral Analytics: Visibility, analytics, and automated control - converged into a single solution.

Forcepoint Behavioural Analytics is a powerful platform with a defined generic data model, flexible enough to handle incredibly diverse data yet structured enough to apply powerful big data analytics. The product's information model provides specific guidelines for how to map data from different sources in order to maximise the effectiveness of the analytic engines.

 

Cross Domain Security: Efficiency and security for segmented network environments.

Forcepoint cross domain solutions allow organizations to centralize servers where data is stored – be that in a datacenter, the cloud or a hybrid of the two. Cross domain transfer guards ensure files and data get where they are needed when they are needed without risk of compromise through mistakes or portable media.

 

CASB (Cloud Access Security Broker): Complete security for all cloud applications.

  • Complete visibility into shadow: IT Identify and categorize cloud apps to access risk and pinpoint which services to allow and monitor with Forcepoint Cloud Access Security Broker (CASB).
  • Prevent compromised accounts: Stop bad actors from accessing cloud application data. Use leading machine learning and UEBA capabilities to establish behavioral fingerprints for advanced risk calculation.
  • Secure mobile access to cloud apps: Apply unique access and security policies on a per-device basis by easily distinguishing between managed and unmanaged (BYOD) devices.

 

Email Security: Integrated data protection with uniform policy across email.

  • Secure sensitive data against external attacks: Stop data infiltration and exfiltration with advanced email protection capabilities like Optical Character Recogition (OCR), encrypted file detection, and drip data loss prevention.
  • Stop advanced threats: Defend against malicious code in email and attachments and reveal evasive zero-day threats through real-time, deep content inspection.
  • Reduce complexity in supporting a remote workforce: Control access to sensitive email attachments with granular controls for different device types that are easy to administer from our cloud portal.
  • Identify high-risk user behavior and educate your team: Gain rich context about potential threats, including Indicators of Behavior (IoB), that help identify infected devices and risky user behavior. Give users automatic feedback when they perform inappropriate actions.

 

Private Access: Zero Trust Network Access (ZTNA) for private apps— without the pain of VPNs.

  • Make remote access to private applications seamless and safe: Empower your remote workers to be more productive by safely freeing them from the complexities of VPNs or having to work differently when remote.
  • Personalize access so each user can only get to the apps they need: Give each user secure private access to internal apps while preventing intruders from spreading inside your network.
  • Stop threats from breaking into your network from remote devices: Protect private apps and networks against threats from remote networks and devices with advanced intrusion prevention technology.
  • Gain better visibility and control over usage of private apps: See who is using your private apps and how they're being protected.
  • Keep private apps hidden from the internet as you migrate them to your private clouds everywhere: Simplify your transformation to the cloud, without changing how your people work.

 

Remote Browser Isolation: Isolate content from the end user and protect endpoints from malware.

Forcepoint web security technology provides unrivaled threat protection. The Advanced Classification Engine (ACE) identifies threats using comprehensive analytics including behavioral baselines and real-time global threat intelligence. And the dynamic security platform is powered by human-centric behavioral intelligence to understand risky activities. Forcepoint Remote Browser Isolation powered by Ericom delivers enhanced protection to secure environments using browser isolation.

 

Data Guard: Eliminate costly and time-consuming manual data transfers of sensitive data between segmented networks.

Forcepoint Data Guard delivers this balance by enabling highly complex, bidirectional, automated data and file transfers between physically separated networks. To provide defense-grade data control at scale, Data Guard leverages a trusted operating system and security policies that enforce role and process separation and isolation for automated, byte-level content inspection and sanitization, with customizable rules to handle even the most specialized data types and protocols.

SOLUTIONS / PRODUCTS

Dynamic Data Protection: Keep people productive and data secure via risk-adaptive protection.

A modern Zero Trust architecture drives organizations towards a more data and user-centric approach while moving away from being perimeter-centric. It is a key element for today's digital business.

Forcepoint's Dynamic Data Protection (DDP) fits right in to your Zero Trust architecture with:

  • Individualized adaptive data policies
  • Behavioral analytics driven insights
  • Data discovery and classification
  • Maximizing security analyst efficiency and reducing fatigue

 

Dynamic User Protection: Identify and mitigate risky behaviors from compromised users.

Dynamic User Protection (DUP) is cloud-based user activity monitoring solution that uses Indicators of Behavior (IOBs) — a context-rich monitoring approach that analyzes user activities — to mitigate risk at the earliest point of detection.

  • Gain meaningful visibility into user interactions with critical data
  • Implement a Zero Trust model with continuous user validation
  • Detect risk "left of loss" with comprehensive risk scoring
  • Investigate risk from insiders with efficiency and ease

 

Dynamic Edge Protection: Security-as-a-service for using web, cloud, and private apps—keep threats out and data in.

Secure Access Service Edge (SASE) is a new, unified way to safeguard your use of web, cloud, and private applications without the hassles of point products. Forcepoint takes SASE even further, combining true, enterprise-class data loss prevention with secure access and advanced threat protection.

Now, your people can work anywhere, safely and efficiently, keeping threats out and sensitive data in.

  • Web, cloud, and data security in a single cloud service
  • Remote access to private apps without the pain of VPNs
  • Risk-based protection for personalized, automated security
  • Operational efficiency, managed from the cloud

 

Insider Threat: Unrivaled visibility into user behavior to detect threats from within.

Forcepoint Insider Threat saves you time and effort by automatically scoring and prioritizing your riskiest users, reducing the need to dig through thousands of alerts. This frees your team to focus on high-priority tasks and improves efficiencies. Forcepoint Insider Threat also provides the context and forensic evidence needed for undeniable attribution and chain of custody– simplifying investigations, prosecution, and compliance.

 

Behavioral Analytics: Visibility, analytics, and automated control - converged into a single solution.

Forcepoint Behavioural Analytics is a powerful platform with a defined generic data model, flexible enough to handle incredibly diverse data yet structured enough to apply powerful big data analytics. The product's information model provides specific guidelines for how to map data from different sources in order to maximise the effectiveness of the analytic engines.

 

Cross Domain Security: Efficiency and security for segmented network environments.

Forcepoint cross domain solutions allow organizations to centralize servers where data is stored – be that in a datacenter, the cloud or a hybrid of the two. Cross domain transfer guards ensure files and data get where they are needed when they are needed without risk of compromise through mistakes or portable media.

 

CASB (Cloud Access Security Broker): Complete security for all cloud applications.

  • Complete visibility into shadow: IT Identify and categorize cloud apps to access risk and pinpoint which services to allow and monitor with Forcepoint Cloud Access Security Broker (CASB).
  • Prevent compromised accounts: Stop bad actors from accessing cloud application data. Use leading machine learning and UEBA capabilities to establish behavioral fingerprints for advanced risk calculation.
  • Secure mobile access to cloud apps: Apply unique access and security policies on a per-device basis by easily distinguishing between managed and unmanaged (BYOD) devices.

 

Email Security: Integrated data protection with uniform policy across email.

  • Secure sensitive data against external attacks: Stop data infiltration and exfiltration with advanced email protection capabilities like Optical Character Recogition (OCR), encrypted file detection, and drip data loss prevention.
  • Stop advanced threats: Defend against malicious code in email and attachments and reveal evasive zero-day threats through real-time, deep content inspection.
  • Reduce complexity in supporting a remote workforce: Control access to sensitive email attachments with granular controls for different device types that are easy to administer from our cloud portal.
  • Identify high-risk user behavior and educate your team: Gain rich context about potential threats, including Indicators of Behavior (IoB), that help identify infected devices and risky user behavior. Give users automatic feedback when they perform inappropriate actions.

 

Private Access: Zero Trust Network Access (ZTNA) for private apps— without the pain of VPNs.

  • Make remote access to private applications seamless and safe: Empower your remote workers to be more productive by safely freeing them from the complexities of VPNs or having to work differently when remote.
  • Personalize access so each user can only get to the apps they need: Give each user secure private access to internal apps while preventing intruders from spreading inside your network.
  • Stop threats from breaking into your network from remote devices: Protect private apps and networks against threats from remote networks and devices with advanced intrusion prevention technology.
  • Gain better visibility and control over usage of private apps: See who is using your private apps and how they're being protected.
  • Keep private apps hidden from the internet as you migrate them to your private clouds everywhere: Simplify your transformation to the cloud, without changing how your people work.

 

Remote Browser Isolation: Isolate content from the end user and protect endpoints from malware.

Forcepoint web security technology provides unrivaled threat protection. The Advanced Classification Engine (ACE) identifies threats using comprehensive analytics including behavioral baselines and real-time global threat intelligence. And the dynamic security platform is powered by human-centric behavioral intelligence to understand risky activities. Forcepoint Remote Browser Isolation powered by Ericom delivers enhanced protection to secure environments using browser isolation.

 

Data Guard: Eliminate costly and time-consuming manual data transfers of sensitive data between segmented networks.

Forcepoint Data Guard delivers this balance by enabling highly complex, bidirectional, automated data and file transfers between physically separated networks. To provide defense-grade data control at scale, Data Guard leverages a trusted operating system and security policies that enforce role and process separation and isolation for automated, byte-level content inspection and sanitization, with customizable rules to handle even the most specialized data types and protocols.

Become a Partner

Work with NEXTGEN Distribution and we’ll help you navigate vendor solutions and deals, identify new markets, and uncover opportunities to generate demand and drive business.