FORCEPOINT Moving Your Business Forward Without Fear
AGENDA The Forcepoint Story Product Strategy for 2016 Questions
CONNECTING USERS TO DATA Creating Opportunities for Change Cloud Apps (Office 365, Box, Google Apps, etc.) Mobile Office Corp Servers NETWORKS Other Locations Websites USERS DATA Partners & Supply Chain Email Endpoint Media Customers IN THE CLOUD, ON THE ROAD, IN THE OFFICE
NEW OPPORTUNITIES BRING NEW CHALLENGES EMBRACE TRANSFORMATIVE TECHNOLOGIES Cloud, mobility, and more – safely & efficiently COMBAT ESCALATING THREATS Insider threats (accidental or malicious) and outsider targeted attacks are inevitable 1000+ Vendors & Incident Noise REDUCE POINT PRODUCT OVERLOAD Complexity & alert fatigue drain IT teams that have too few staff with the right skills
Unique New COMPANY, Offering A NEW APPROACH Commercial Agility with Content Security & DLP Cloud / On-Premise / Hybrid Pioneer on Cyber Frontlines with Financial Resources Deep Understanding of Threat Detection Networking Innovator with Advanced Evasion Prevention Security at Scale
PROTECTING WHAT’S MOST IMPORTANT TO YOU Safeguarding users, data and networks Against insider threats & advanced attacks – in the cloud, on the road, in the office Beyond simplifying compliance: enabling better decision-making to streamline security and business Image from Wikimedia
A New Kind of Security Company Experience & financial commitment to build true security platform Unique ability to commercialize expertise gained on the cyber frontlines Backed by 90+ years of innovation making the world a safer place
GLOBAL SCALE TO SUPPORT YOU FOLLOW THE SUN SUPPORT >20,000 customers 155 countries 2,200 employees 44 offices 4,000 partners 380 patents & patent applications 20 Data Centers Avg. CSAT 8.7-9.0 Headquarters, Austin, TX Engineering & Operations Cloud Data Center Sales & Support AMERICAS EMEA APAC
What Analysts Are Saying 2016 Enterprise DLP MQ: Leader 2015 Secure Web Gateway MQ: Leader 2015 Secure Email Gateway MQ: Visionary 2015 Q2 Forrester Wave™: SaaS Web Content Security: Leader 2012-2015 NSS Labs: NGFW Recommended, 100% of Evasions Blocked 2013-2014 IDC MarketScape: WW Messaging Security: Leader
MORE THAN 20,000 CUSTOMERS WORLDWIDE ACROSS MANY INDUSTRIES GOVERNMENT & DEFENSE BIO-TECH ENERGY & NATURAL RESOURCES FINANCIAL SERVICES FOOD SERVICES AND PRODUCTS TECH & PROFESSIONAL SERVICES HEALTHCARE SERVICES HOTELS, MOTELS AND RESORTS INFORMATION TECHNOLOGY MANUFACTURING MEDIA AND ENTERTAINMENT RETAIL AND WHOLESALE TELECOMMUNICATIONS TRANSPORTATION UTILITY OEM
Protect users, data and networks Get faster, more accurate insights Rapidly get back to normal Swiftly identify breaches Use rich context to drive remediation processes more effectively and efficiently Aggregate & analyze information from across your organization From Insiders (accidental & malicious) as well as Outsiders In the Cloud, on the road, in the office
A Unified PLATFORM for Security Solutions Web & Email Security with advanced threat protection Insider Threat Detection & DLP with automated user behavior monitoring Security for Office 365 Shadow IT Discovery Threat Protection for Linux Cloud App Farms Next-Generation Firewalls for highly distributed organizations ThreatSeeker Intelligence Cloud
Solutions Powered by Integrated Products Web & Email Security with advanced threat protection Available as: On-premise Gateway, Cloud Service, Hybrid of both Content Security AP-WEB AP-EMAIL Threat Protection Cloud Insider Threat Data Protection AP-DATA AP-ENDPOINT DLP SureView Insider Threat Insider Threat Detection & DLP with automated user behavior monitoring & data policy enforcement Security for Office 365 Shadow IT Discovery Threat Protection for Linux Cloud App Farms Security for Cloud Threat Protection for Linux AP-DATA DISCOVER RiskVision Network Security Stonesoft NGFW Sidewinder Proxy FW Next-Generation Firewalls
1000+ Vendors & Incident Noise Safeguard users, data & networks COMBAT ESCALATING THREATS Insider & advanced threats EMBRACE TRANSFORMATIVE TECHNOLOGIES Safely & efficiently 1000+ Vendors & Incident Noise REDUCE POINT PRODUCT OVERLOAD Cut complexity & alert fatigue #ForwardWithoutFear
Forcepoint Product Strategy 2016
Customers’ Business Challenges Drive Areas of Focus Adopt Transformative Technologies Combat Escalating Threats Reduce Point Product Overload Unified, Cloud-First Platform Security Intelligence Advanced Analytics Forcepoint’s approach: Protect our customers against internal & external security threats through a portfolio and ecosystem approach that operationalizes threat life cycle management in a cloud-first enterprise. Protect our customers against internal & external security threats through a portfolio and ecosystem approach that operationalizes threat life cycle management in a cloud-first enterprise. Defend: Capabilities that dynamically adapt to the changing needs of the perimeter less enterprise by leveraging real time intelligence and comprehensive analytics coupled with pervasive protection across the threat kill chain. Detect: Capabilities that help determine if a breach has occurred and minimize the cyber dwell time. Decide: Targeted decision making capabilities that provide predictive intent warning paired with unprecedented visibility, rich data content and contextual analysis of malicious behavior. Defeat: Capabilities that take aggressive action toward stopping adversaries from achieving their attack objectives.
Initiatives In Our Key Areas of Focus Anywhere – Cloud, On-premise, or Hybrid Any device – Corporate owned or BYOD Consistent across all apps Unified, Cloud-First Platform Adopt Transformative Technologies Global, continually updated threat database Cutting-edge advanced threat detection Adaptive scanning to block new, emerging threats Security Intelligence Combat Escalating Threats Automated discovery Linkage of malicious code & user behavior Rich Context for rapid insights & more-efficient action Advanced Analytics Reduce Point Product Overload
Building a Next-Gen Security Platform A foundation created from TRITON, SureView, Stonesoft Built for the Cloud-first enterprise Leverages shared security services Drives to faster, better decision making with advanced analytics Interoperable with other security products Unified security management and reporting on a single pane of glass
Combined Product Platform Vision THREATSEEKER INTELLIGENCE CLOUD INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS SECURITY FOR CLOUD NETWORK SECURITY ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM
Combined Product Platform Vision THREATSEEKER INTELLIGENCE CLOUD AP-DATA SureView Insider Threat Connect AP-DATA to SureView Insider Threat for advanced user risk scoring & improved remediation INSIDER THREAT DATA PROTECTION INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS SECURITY FOR CLOUD NETWORK SECURITY ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM
Combined Product Platform Vision STONESOFT THREATSEEKER INTELLIGENCE CLOUD AP-WEB Cloud integration Small form-factor appliance Sidewinder security module (proxy firewall capability) CONTENT SECURITY INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS NETWORK SECURITY NETWORK SECURITY SECURITY FOR CLOUD ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM
Combined Product Platform Vision THREATSEEKER INTELLIGENCE CLOUD THREATSEEKER INTELLIGENCE CLOUD Stonesoft integration with ThreatSeeker STONESOFT INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS NETWORK SECURITY NETWORK SECURITY SECURITY FOR CLOUD ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM
Combined Product Platform Vision Incident risk ranking & user behavioral profiling for AP-DATA Discovery & full remediation actions for Office 365 Exchange Online, OneDrive, SharePoint Online – and Box THREATSEEKER INTELLIGENCE CLOUD AP-DATA INSIDER THREAT DATA PROTECTION INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS SECURITY FOR CLOUD Azure RMS integration and data classification vendor integration SECURITY FOR CLOUD NETWORK SECURITY ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM
Combined Product Platform Vision THREATSEEKER INTELLIGENCE CLOUD AP-WEB CONTENT SECURITY Cloud application usage & risk visibility Direct Connect Endpoint for laptop malware protection on the go, in any network Upgrade improvements Policy API for automatic import of security feeds Data center expansion INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS SECURITY FOR CLOUD SECURITY FOR CLOUD NETWORK SECURITY ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM
Combined Product Platform Vision THREATSEEKER INTELLIGENCE CLOUD AP-EMAIL CONTENT SECURITY Anti-phishing enhancements & adaptive learning for end users INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS NETWORK SECURITY SECURITY FOR CLOUD ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM
Combined Product Platform Vision THREATSEEKER INTELLIGENCE CLOUD SUREVIEW INSIDER THREAT MacOS support for SureView Insider Threat INSIDER THREAT DATA PROTECTION INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS SECURITY FOR CLOUD NETWORK SECURITY ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM
TRITON 4D PLATFORM ONE MORE THING… “THE SUMMIT” THREATSEEKER INTELLIGENCE CLOUD “THE SUMMIT” ADVANCED ANALYTICS FASTER DECISION MAKING INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS SECURITY FOR CLOUD NETWORK SECURITY ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM
Questions & Next Steps