Presentation is loading. Please wait.

Presentation is loading. Please wait.

FORCEPOINT Moving Your Business Forward Without Fear

Similar presentations


Presentation on theme: "FORCEPOINT Moving Your Business Forward Without Fear"— Presentation transcript:

1 FORCEPOINT Moving Your Business Forward Without Fear

2 AGENDA The Forcepoint Story Product Strategy for 2016 Questions

3 CONNECTING USERS TO DATA Creating Opportunities for Change
Cloud Apps (Office 365, Box, Google Apps, etc.) Mobile Office Corp Servers NETWORKS Other Locations Websites USERS DATA Partners & Supply Chain Endpoint Media Customers IN THE CLOUD, ON THE ROAD, IN THE OFFICE

4 NEW OPPORTUNITIES BRING NEW CHALLENGES
EMBRACE TRANSFORMATIVE TECHNOLOGIES Cloud, mobility, and more – safely & efficiently COMBAT ESCALATING THREATS Insider threats (accidental or malicious) and outsider targeted attacks are inevitable 1000+ Vendors & Incident Noise REDUCE POINT PRODUCT OVERLOAD Complexity & alert fatigue drain IT teams that have too few staff with the right skills

5 Unique New COMPANY, Offering A NEW APPROACH
Commercial Agility with Content Security & DLP Cloud / On-Premise / Hybrid Pioneer on Cyber Frontlines with Financial Resources Deep Understanding of Threat Detection Networking Innovator with Advanced Evasion Prevention Security at Scale

6 PROTECTING WHAT’S MOST IMPORTANT TO YOU
Safeguarding users, data and networks Against insider threats & advanced attacks – in the cloud, on the road, in the office Beyond simplifying compliance: enabling better decision-making to streamline security and business Image from Wikimedia

7 A New Kind of Security Company
Experience & financial commitment to build true security platform Unique ability to commercialize expertise gained on the cyber frontlines Backed by 90+ years of innovation making the world a safer place

8 GLOBAL SCALE TO SUPPORT YOU
FOLLOW THE SUN SUPPORT >20,000 customers 155 countries 2,200 employees 44 offices 4,000 partners 380 patents & patent applications 20 Data Centers Avg. CSAT Headquarters, Austin, TX Engineering & Operations Cloud Data Center Sales & Support AMERICAS EMEA APAC

9 What Analysts Are Saying
2016 Enterprise DLP MQ: Leader 2015 Secure Web Gateway MQ: Leader 2015 Secure Gateway MQ: Visionary 2015 Q2 Forrester Wave™: SaaS Web Content Security: Leader NSS Labs: NGFW Recommended, 100% of Evasions Blocked IDC MarketScape: WW Messaging Security: Leader

10 MORE THAN 20,000 CUSTOMERS WORLDWIDE ACROSS MANY INDUSTRIES
GOVERNMENT & DEFENSE BIO-TECH ENERGY & NATURAL RESOURCES FINANCIAL SERVICES FOOD SERVICES AND PRODUCTS TECH & PROFESSIONAL SERVICES HEALTHCARE SERVICES HOTELS, MOTELS AND RESORTS INFORMATION TECHNOLOGY MANUFACTURING MEDIA AND ENTERTAINMENT RETAIL AND WHOLESALE TELECOMMUNICATIONS TRANSPORTATION UTILITY OEM

11 Protect users, data and networks Get faster, more accurate insights
Rapidly get back to normal Swiftly identify breaches Use rich context to drive remediation processes more effectively and efficiently Aggregate & analyze information from across your organization From Insiders (accidental & malicious) as well as Outsiders In the Cloud, on the road, in the office

12 A Unified PLATFORM for Security Solutions
Web & Security with advanced threat protection Insider Threat Detection & DLP with automated user behavior monitoring Security for Office 365 Shadow IT Discovery Threat Protection for Linux Cloud App Farms Next-Generation Firewalls for highly distributed organizations ThreatSeeker Intelligence Cloud

13 Solutions Powered by Integrated Products
Web & Security with advanced threat protection Available as: On-premise Gateway, Cloud Service, Hybrid of both Content Security AP-WEB AP- Threat Protection Cloud Insider Threat Data Protection AP-DATA AP-ENDPOINT DLP SureView Insider Threat Insider Threat Detection & DLP with automated user behavior monitoring & data policy enforcement Security for Office 365 Shadow IT Discovery Threat Protection for Linux Cloud App Farms Security for Cloud Threat Protection for Linux AP-DATA DISCOVER RiskVision Network Security Stonesoft NGFW Sidewinder Proxy FW Next-Generation Firewalls

14 1000+ Vendors & Incident Noise
Safeguard users, data & networks COMBAT ESCALATING THREATS Insider & advanced threats EMBRACE TRANSFORMATIVE TECHNOLOGIES Safely & efficiently 1000+ Vendors & Incident Noise REDUCE POINT PRODUCT OVERLOAD Cut complexity & alert fatigue #ForwardWithoutFear

15 Forcepoint Product Strategy 2016

16 Customers’ Business Challenges Drive Areas of Focus
Adopt Transformative Technologies Combat Escalating Threats Reduce Point Product Overload Unified, Cloud-First Platform Security Intelligence Advanced Analytics Forcepoint’s approach: Protect our customers against internal & external security threats through a portfolio and ecosystem approach that operationalizes threat life cycle management in a cloud-first enterprise. Protect our customers against internal & external security threats through a portfolio and ecosystem approach that operationalizes threat life cycle management in a cloud-first enterprise. Defend: Capabilities that dynamically adapt to the changing needs of the perimeter less enterprise by leveraging real time intelligence and comprehensive analytics coupled with pervasive protection across the threat kill chain. Detect: Capabilities that help determine if a breach has occurred and minimize the cyber dwell time. Decide: Targeted decision making capabilities that provide predictive intent warning paired with unprecedented visibility, rich data content and contextual analysis of malicious behavior. Defeat: Capabilities that take aggressive action toward stopping adversaries from achieving their attack objectives.

17 Initiatives In Our Key Areas of Focus
Anywhere – Cloud, On-premise, or Hybrid Any device – Corporate owned or BYOD Consistent across all apps Unified, Cloud-First Platform Adopt Transformative Technologies Global, continually updated threat database Cutting-edge advanced threat detection Adaptive scanning to block new, emerging threats Security Intelligence Combat Escalating Threats Automated discovery Linkage of malicious code & user behavior Rich Context for rapid insights & more-efficient action Advanced Analytics Reduce Point Product Overload

18 Building a Next-Gen Security Platform
A foundation created from TRITON, SureView, Stonesoft Built for the Cloud-first enterprise Leverages shared security services Drives to faster, better decision making with advanced analytics Interoperable with other security products Unified security management and reporting on a single pane of glass

19 Combined Product Platform Vision
THREATSEEKER INTELLIGENCE CLOUD INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS SECURITY FOR CLOUD NETWORK SECURITY ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM

20 Combined Product Platform Vision
THREATSEEKER INTELLIGENCE CLOUD AP-DATA SureView Insider Threat Connect AP-DATA to SureView Insider Threat for advanced user risk scoring & improved remediation INSIDER THREAT DATA PROTECTION INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS SECURITY FOR CLOUD NETWORK SECURITY ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM

21 Combined Product Platform Vision
STONESOFT THREATSEEKER INTELLIGENCE CLOUD AP-WEB Cloud integration Small form-factor appliance Sidewinder security module (proxy firewall capability) CONTENT SECURITY INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS NETWORK SECURITY NETWORK SECURITY SECURITY FOR CLOUD ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM

22 Combined Product Platform Vision
THREATSEEKER INTELLIGENCE CLOUD THREATSEEKER INTELLIGENCE CLOUD Stonesoft integration with ThreatSeeker STONESOFT INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS NETWORK SECURITY NETWORK SECURITY SECURITY FOR CLOUD ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM

23 Combined Product Platform Vision
Incident risk ranking & user behavioral profiling for AP-DATA Discovery & full remediation actions for Office 365 Exchange Online, OneDrive, SharePoint Online – and Box THREATSEEKER INTELLIGENCE CLOUD AP-DATA INSIDER THREAT DATA PROTECTION INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS SECURITY FOR CLOUD Azure RMS integration and data classification vendor integration SECURITY FOR CLOUD NETWORK SECURITY ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM

24 Combined Product Platform Vision
THREATSEEKER INTELLIGENCE CLOUD AP-WEB CONTENT SECURITY Cloud application usage & risk visibility Direct Connect Endpoint for laptop malware protection on the go, in any network Upgrade improvements Policy API for automatic import of security feeds Data center expansion INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS SECURITY FOR CLOUD SECURITY FOR CLOUD NETWORK SECURITY ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM

25 Combined Product Platform Vision
THREATSEEKER INTELLIGENCE CLOUD AP- CONTENT SECURITY Anti-phishing enhancements & adaptive learning for end users INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS NETWORK SECURITY SECURITY FOR CLOUD ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM

26 Combined Product Platform Vision
THREATSEEKER INTELLIGENCE CLOUD SUREVIEW INSIDER THREAT MacOS support for SureView Insider Threat INSIDER THREAT DATA PROTECTION INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS SECURITY FOR CLOUD NETWORK SECURITY ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM

27 TRITON 4D PLATFORM ONE MORE THING… “THE SUMMIT”
THREATSEEKER INTELLIGENCE CLOUD “THE SUMMIT” ADVANCED ANALYTICS FASTER DECISION MAKING INSIDER THREAT DATA PROTECTION CONTENT SECURITY USERS DATA NETWORKS SECURITY FOR CLOUD NETWORK SECURITY ACE SECURITY SERVICES UNIFIED MANAGEMENT APIs TRITON 4D PLATFORM

28

29

30

31 Questions & Next Steps


Download ppt "FORCEPOINT Moving Your Business Forward Without Fear"

Similar presentations


Ads by Google