FORCEPOINT Moving Your Business Forward Without Fear

Slides:



Advertisements
Similar presentations
Palo Alto Networks Jay Flanyak Channel Business Manager
Advertisements

©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Dell Connected Security Solutions Simplify & unify.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
The Changing World of Endpoint Protection
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Blue Coat Cloud Continuum
OFFICE 365 APP BUILDER PROFILE: Druva
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Insider Threat and Data Leakege Considerations and Solutions
Protect your organization against external threats (Security)
Cloud App Security vs. O365 Advanced Security Management
Comprehensive Security and Compliance at an Affordable Price.
Transforming business
Microsoft Azure-Powered BlueCielo Meridian360 Portal Improves Asset Data Integrity and Facilitates Secure Collaboration with External Stakeholders MICROSOFT.
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Hybrid Management and Security
Microsoft Operations Management Suite Insight and Analytics
Journey to Microsoft Secure Cloud
Partner Logo Veropath Offers a Next-Gen Expense Management SaaS Technology Solution, Built Specifically to Harness Big Data Analytics Capabilities in Azure.
Real-time protection for web sites and web apps against ATTACKS
Azure Information Protection Strategy and Roadmap
SaaS Application Deep Dive
Active Cyber Security, OnDemand
Protect sensitive information with Office 365 DLP
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Extending classification ,labeling , and protection to 3rd party applications Kartik Microsoft Tony Digital Guardian Amit Cohen.
The utility belt for managing security and compliance in Office 365
Prevent Costly Data Leaks from Microsoft Office 365
MyHealthDirect’s Enterprise Scheduling Platform, Based on Microsoft Azure, Improves the Patient Experience and Reduces Patient Readmissions MICROSOFT AZURE.
DESIGN, DEPLOY, COLLABORATE.
Company Overview & Strategy
Securing Your Digital Transformation
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Strong Security for Your Weak Link:
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Utilizing the Capabilities of Microsoft Azure, Skipper Offers a Results-Based Platform That Helps Digital Advertisers with the Marketing of Their Mobile.
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
Agolo Summarization Platform Integrates with Microsoft OneDrive to Relate Enterprise Cloud Documents with Real-Time News Summaries OFFICE 365 APP BUILDER.
Securing the Threats of Tomorrow, Today.
Protect Your Microsoft Azure Cloud Assets Against Inside and Outside Threats With Balabit’s Shell Control Box Privileged User Monitoring Solution Partner.
Secure once, run anywhere Simplify your security with Sophos
Microsoft Azure, RightsWATCH Help Users Keep Sensitive Information Safe from Security Breaches Resulting from Accidental or Malicious Disclosure MICROSOFT.
XtremeData on the Microsoft Azure Cloud Platform:
AIMS for BizTalk, Built on the Microsoft Azure Platform, Empowers Enterprises to Automate Insight and Analytics and Boost Value Creation MICROSOFT AZURE.
Healthcare Cloud Security Stack for Microsoft Azure
Create a Modern Workplace with Microsoft 365
Technical Capabilities
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Data Insights Summit
<offer name> with Microsoft 365 Business Secure Deployment
Built on the Powerful Azure Platform, Angoss Helps Businesses Turn Data into Actionable Insights That Reduce Risk, Increase Organizational Performance.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Microsoft Data Insights Summit
The Intelligent Enterprise and SAP Business One
Presentation transcript:

FORCEPOINT Moving Your Business Forward Without Fear

AGENDA The Forcepoint Story Product Strategy for 2016 Questions

CONNECTING USERS TO DATA Creating Opportunities for Change Cloud Apps (Office 365, Box, Google Apps, etc.) Mobile Office Corp Servers NETWORKS Other Locations Websites USERS DATA Partners & Supply Chain Email Endpoint Media Customers IN THE CLOUD, ON THE ROAD, IN THE OFFICE

NEW OPPORTUNITIES BRING NEW CHALLENGES EMBRACE TRANSFORMATIVE TECHNOLOGIES Cloud, mobility, and more – safely & efficiently COMBAT ESCALATING THREATS Insider threats (accidental or malicious) and outsider targeted attacks are inevitable 1000+ Vendors & Incident Noise REDUCE POINT PRODUCT OVERLOAD Complexity & alert fatigue drain IT teams that have too few staff with the right skills

Unique New COMPANY, Offering A NEW APPROACH Commercial Agility with Content Security & DLP Cloud / On-Premise / Hybrid Pioneer on Cyber Frontlines with Financial Resources Deep Understanding of Threat Detection Networking Innovator with Advanced Evasion Prevention Security at Scale

PROTECTING WHAT’S MOST IMPORTANT TO YOU Safeguarding users, data and networks Against insider threats & advanced attacks – in the cloud, on the road, in the office Beyond simplifying compliance: enabling better decision-making to streamline security and business Image from Wikimedia

A New Kind of Security Company Experience & financial commitment to build true security platform Unique ability to commercialize expertise gained on the cyber frontlines Backed by 90+ years of innovation making the world a safer place

GLOBAL SCALE TO SUPPORT YOU FOLLOW THE SUN SUPPORT >20,000 customers 155 countries 2,200 employees 44 offices 4,000 partners 380 patents & patent applications 20 Data Centers Avg. CSAT 8.7-9.0 Headquarters, Austin, TX Engineering & Operations Cloud Data Center Sales & Support AMERICAS EMEA APAC

What Analysts Are Saying 2016 Enterprise DLP MQ: Leader 2015 Secure Web Gateway MQ: Leader 2015 Secure Email Gateway MQ: Visionary 2015 Q2 Forrester Wave™: SaaS Web Content Security: Leader 2012-2015 NSS Labs: NGFW Recommended, 100% of Evasions Blocked 2013-2014 IDC MarketScape: WW Messaging Security: Leader

MORE THAN 20,000 CUSTOMERS WORLDWIDE ACROSS MANY INDUSTRIES GOVERNMENT & DEFENSE BIO-TECH ENERGY & NATURAL RESOURCES FINANCIAL SERVICES FOOD SERVICES AND PRODUCTS TECH & PROFESSIONAL SERVICES HEALTHCARE SERVICES HOTELS, MOTELS AND RESORTS INFORMATION TECHNOLOGY MANUFACTURING MEDIA AND ENTERTAINMENT RETAIL AND WHOLESALE TELECOMMUNICATIONS TRANSPORTATION UTILITY OEM

Protect users, data and networks Get faster, more accurate insights Rapidly get back to normal Swiftly identify breaches Use rich context to drive remediation processes more effectively and efficiently Aggregate & analyze information from across your organization From Insiders (accidental & malicious) as well as Outsiders In the Cloud, on the road, in the office

A Unified PLATFORM for Security Solutions Web & Email Security with advanced threat protection Insider Threat Detection & DLP with automated user behavior monitoring Security for Office 365 Shadow IT Discovery Threat Protection for Linux Cloud App Farms Next-Generation Firewalls for highly distributed organizations ThreatSeeker Intelligence Cloud

Solutions Powered by Integrated Products Web & Email Security with advanced threat protection Available as: On-premise Gateway, Cloud Service, Hybrid of both Content Security AP-WEB AP-EMAIL Threat Protection Cloud Insider Threat Data Protection AP-DATA AP-ENDPOINT DLP SureView Insider Threat Insider Threat Detection & DLP with automated user behavior monitoring & data policy enforcement Security for Office 365 Shadow IT Discovery Threat Protection for Linux Cloud App Farms Security for Cloud Threat Protection for Linux AP-DATA DISCOVER RiskVision Network Security Stonesoft NGFW Sidewinder Proxy FW Next-Generation Firewalls

1000+ Vendors & Incident Noise Safeguard users, data & networks COMBAT ESCALATING THREATS Insider & advanced threats EMBRACE TRANSFORMATIVE TECHNOLOGIES Safely & efficiently 1000+ Vendors & Incident Noise REDUCE POINT PRODUCT OVERLOAD Cut complexity & alert fatigue #ForwardWithoutFear

Forcepoint Product Strategy 2016

Customers’ Business Challenges Drive Areas of Focus Adopt Transformative Technologies Combat Escalating Threats Reduce Point Product Overload Unified, Cloud-First Platform Security Intelligence Advanced Analytics Forcepoint’s approach: Protect our customers against internal & external security threats through a portfolio and ecosystem approach that operationalizes threat life cycle management in a cloud-first enterprise. Protect our customers against internal & external security threats through a portfolio and ecosystem approach that operationalizes threat life cycle management in a cloud-first enterprise. Defend: Capabilities that dynamically adapt to the changing needs of the perimeter less enterprise by leveraging real time intelligence and comprehensive analytics coupled with pervasive protection across the threat kill chain. Detect: Capabilities that help determine if a breach has occurred and minimize the cyber dwell time. Decide: Targeted decision making capabilities that provide predictive intent warning paired with unprecedented visibility, rich data content and contextual analysis of malicious behavior. Defeat: Capabilities that take aggressive action toward stopping adversaries from achieving their attack objectives.  

Initiatives In Our Key Areas of Focus Anywhere – Cloud, On-premise, or Hybrid Any device – Corporate owned or BYOD Consistent across all apps Unified, Cloud-First Platform Adopt Transformative Technologies Global, continually updated threat database Cutting-edge advanced threat detection Adaptive scanning to block new, emerging threats Security Intelligence Combat Escalating Threats Automated discovery Linkage of malicious code & user behavior Rich Context for rapid insights & more-efficient action Advanced Analytics Reduce Point Product Overload

Building a Next-Gen Security Platform A foundation created from TRITON, SureView, Stonesoft Built for the Cloud-first enterprise Leverages shared security services Drives to faster, better decision making with advanced analytics Interoperable with other security products Unified security management and reporting on a single pane of glass

Combined Product Platform Vision THREATSEEKER INTELLIGENCE CLOUD INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS SECURITY FOR CLOUD NETWORK SECURITY ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM

Combined Product Platform Vision THREATSEEKER INTELLIGENCE CLOUD AP-DATA SureView Insider Threat Connect AP-DATA to SureView Insider Threat for advanced user risk scoring & improved remediation INSIDER THREAT DATA PROTECTION INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS SECURITY FOR CLOUD NETWORK SECURITY ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM

Combined Product Platform Vision STONESOFT THREATSEEKER INTELLIGENCE CLOUD AP-WEB Cloud integration Small form-factor appliance Sidewinder security module (proxy firewall capability) CONTENT SECURITY INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS NETWORK SECURITY NETWORK SECURITY SECURITY FOR CLOUD ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM

Combined Product Platform Vision THREATSEEKER INTELLIGENCE CLOUD THREATSEEKER INTELLIGENCE CLOUD Stonesoft integration with ThreatSeeker STONESOFT INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS NETWORK SECURITY NETWORK SECURITY SECURITY FOR CLOUD ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM

Combined Product Platform Vision Incident risk ranking & user behavioral profiling for AP-DATA Discovery & full remediation actions for Office 365 Exchange Online, OneDrive, SharePoint Online – and Box THREATSEEKER INTELLIGENCE CLOUD AP-DATA INSIDER THREAT DATA PROTECTION INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS SECURITY FOR CLOUD Azure RMS integration and data classification vendor integration SECURITY FOR CLOUD NETWORK SECURITY ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM

Combined Product Platform Vision THREATSEEKER INTELLIGENCE CLOUD AP-WEB CONTENT SECURITY Cloud application usage & risk visibility Direct Connect Endpoint for laptop malware protection on the go, in any network Upgrade improvements Policy API for automatic import of security feeds Data center expansion INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS SECURITY FOR CLOUD SECURITY FOR CLOUD NETWORK SECURITY ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM

Combined Product Platform Vision THREATSEEKER INTELLIGENCE CLOUD AP-EMAIL CONTENT SECURITY Anti-phishing enhancements & adaptive learning for end users INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS NETWORK SECURITY SECURITY FOR CLOUD ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM

Combined Product Platform Vision THREATSEEKER INTELLIGENCE CLOUD SUREVIEW INSIDER THREAT MacOS support for SureView Insider Threat INSIDER THREAT DATA PROTECTION INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS SECURITY FOR CLOUD NETWORK SECURITY ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM

TRITON 4D PLATFORM ONE MORE THING… “THE SUMMIT” THREATSEEKER INTELLIGENCE CLOUD “THE SUMMIT” ADVANCED ANALYTICS FASTER DECISION MAKING INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS SECURITY FOR CLOUD NETWORK SECURITY ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM

Questions & Next Steps