Forcepoint'S Cloud and On Premise Email Security
Forcepoint'S Cloud and On Premise Email Security
Forcepoint'S Cloud and On Premise Email Security
From inbound attack activity to outbound data theft or botnet • Risky user habits can easily lead to security
communication attempts, Forcepoint Email Security secures mixed breaches and data loss.
environments with content aware defenses, protecting email
communications as part of a complete and connected defense
system against Advanced Persistent Threats (APTs) and other
types of advanced threats.
www.forcepoint.com
“Ultimately, we are very happy Forcepoint Email Security
3
Enhanced Protection Modules
OPTIONAL HYBRID Leverage Forcepoint’s global cloud services for performance and scalability
CLOUD DEPLOYMENT Combine on premise threat defenses with cloud-based pre-filtering services to preserve bandwidth
with industry-leading anti-spam SLA’s. The hybrid module adds URL Sandboxing and Phishing
Education to the Email Security solution.
CLOUD SANDBOX Integrate behavioral sandboxing for automatic and manual analysis of malware files
Supplement Forcepoint ACE analytics with an integrated file sandbox for additional deep inspection. Take
advantage of behavioral analysis in a virtual environment to uncover the malicious behavior of Zero-day
and other advanced malware. Test files automatically or manually to generate detailed forensics.
IMAGE ANALYSIS Identify explicit images to enforce acceptable use and compliance
The Forcepoint Image Analysis Module allows employers to take proactive measures to monitor,
educate and enforce company email policy with regard to explicit or pornographic image attachments.
www.forcepoint.com
Forcepoint Forcepoint Email Security
5
The power behind Forcepoint solutions
FORCEPOINT ACE
Forcepoint ACE provides real-time, inline, contextual defenses
for Web, Email, Data and Mobile security by using composite risk
scoring and predictive analytics to deliver the most effective security
available. It also provides containment by analyzing inbound and
outbound traffic with data-aware defenses for industry-leading data
theft protection. Classifiers for real-time security, data and content
analysis — the result of years of research and development — enable
ACE to detect more threats than traditional anti-virus engines (the
proof is updated daily at http://securitylabs.forcepoint.com). ACE is
the primary defense behind all Forcepoint solutions and is supported
by the Forcepoint ThreatSeeker Intelligence.
+ EMAIL ATTACKS
INTEGRATED SET OF DEFENSE ASSESSMENT WEB
CAPABILITIES IN 8 KEY AREAS.
E M AIL A TAC K S
monitors, but blocks threats.
ACE
URL
Classification Anti-Spam/
T
Phishing
Real-time
Security
WEB
Classification
AT
Content Classification
C
KS
Classification
E FT
TH
TA
DA
www.forcepoint.com
Forcepoint Email Security
TRITON Architecture
With best-in-class security and a unified architecture, TRITON
Architecture offers point-of-click protection with real-time, inline
defenses from Forcepoint ACE. The unmatched real-time defenses of
ACE are backed by Forcepoint ThreatSeeker Intelligence and the
expertise of Forcepoint Security Labs researchers. The powerful
result is a single, unified architecture with one unified user interface
and unified security intelligence.
7
CONTACT
www.forcepoint.com/contact
[BROCHURE_FORCEPOINT_EMAIL_SECURITY_EN]