Forcepoint'S Cloud and On Premise Email Security

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8
At a glance
Powered by AI
The key takeaways are that most large scale cyberattacks originate from email, and Forcepoint Email Security aims to stop these attacks by identifying targeted threats, high-risk users, and insider threats across inbound and outbound communications.

Some of the email security challenges mentioned are that APTs commonly use email for early stages in attacks, email needs to address data theft and insider threats, and businesses are adopting cloud services while users have risky habits.

Forcepoint Email Security uses Forcepoint's Advanced Classification Engine (ACE) to identify malicious lures, exploit kits, emerging threats, botnet communications, and can identify zero-day malware threats using file behavioral sandboxing to stop advanced targeted threats.

Forcepoint Email Security

FORCEPOINT’S CLOUD AND ON PREMISE EMAIL SECURITY


Forcepoint Email Security
FORCEPOINT’S CLOUD AND
ON PREMISE EMAIL SECURITY

Most large scale cyberattacks originate from email, using


advanced, coordinated tactics, such as socially engineered lures
and targeted phishing. As these multi-stage threats blend web and Email security challenges
email elements throughout attacks, they present a “Kill Chain” of
opportunities to stop them before the breach occurs. • APTs commonly use email for early stages in
their advanced attacks.

Maximize your use and safety of email


• Email must do more to address data theft
Forcepoint Email Security identifies targeted attacks, high-risk and insider threats.
users and insider threats, while empowering mobile workers and
the safe adoption of new technologies like Office 365 and • Businesses are adopting Office 365 and other
Box Enterprise. cloud-based services to expand and compete.

From inbound attack activity to outbound data theft or botnet • Risky user habits can easily lead to security
communication attempts, Forcepoint Email Security secures mixed breaches and data loss.
environments with content aware defenses, protecting email
communications as part of a complete and connected defense
system against Advanced Persistent Threats (APTs) and other
types of advanced threats.

www.forcepoint.com
“Ultimately, we are very happy Forcepoint Email Security

with the Forcepoint products.


Forcepoint Email Security is doing
its job and stopping any problems
before they reach our server.”
— Ray Finck, Manager of Information Systems, Lowe Lippmann

Forcepoint Email Security capabilities


STOP APT AND OTHER ADVANCED TARGETED THREATS SAFELY ADOPT CLOUD TECHNOLOGIES LIKE OFFICE 365 AND
Forcepoint’s Advanced Classification Engine (ACE) is at the heart BOX ENTERPRISE WHILE SUPPORTING A MOBILE WORKFORCE
of all Forcepoint solutions. ACE identifies malicious lures, exploit IT departments are strained to maintain current systems while
kits, emerging threats, botnet communications and other supporting an increasingly mobile workforce and the demands to
advanced threat activity across the Kill Chain. This enables adopt new technologies like Office 365. Forcepoint Email Security
Forcepoint Email Security to identify the early stages of an attack. provides industry-leading capabilities that leverage systems and
It can even identify Zero-day malware threats using powerful other information to control communications, such as preventing
assessment capabilities that include fully-integrated, file total access to sensitive email attachments on vulnerable mobile
behavioral sandboxing. devices, while permitting full access on fully-secured laptops.
These inbound and outbound defenses are all supported on
SECURE SENSITIVE DATA AGAINST EXTERNAL ATTACKS Office 365.
AND INSIDER THREATS
To prepare for a malicious insider threat or the potentially IDENTIFY ”HIGH-RISK” USER BEHAVIOR AND EDUCATE
successful cyberattack, it’s vital that outbound communications USERS TO IMPROVE AWARENESS
be monitored. This is also necessary both for data theft The rich data collections in Forcepoint Email Security are used
compliance needs as well as for business requirements. Only by a number of policies to report and identify systems that may
Forcepoint provides the technology to stop data infiltration and require special IT attention. They generate a report on Indicators
exfiltration with capabilities such as: of Compromise to identify infected systems, and more proactive
• OCR (Optical Character Recognition) scanning to identify reports on suspicious behavior, including potential insider
sensitive data hidden in images such as scanned documents threats, such as “disgruntled employee” activity. User feedback
or screen shots. capabilities educate employees as mistakes are made, helping
• Encrypted file detection to recognize custom encrypted files them to better learn and understand safe email best practices.
designed to defy identification.
• Drip data loss prevention (DLP) monitoring to identify where
sensitive data is leaked in small quantities over time.
• Advanced analysis of malicious files and macros typically
embedded in with MS Office files.

3
Enhanced Protection Modules

OPTIONAL HYBRID Leverage Forcepoint’s global cloud services for performance and scalability
CLOUD DEPLOYMENT Combine on premise threat defenses with cloud-based pre-filtering services to preserve bandwidth
with industry-leading anti-spam SLA’s. The hybrid module adds URL Sandboxing and Phishing
Education to the Email Security solution.

EMAIL DLP Block data theft with enterprise-class content-aware DLP


Prepare for the insider threat and malware data theft, achieve compliance goals and further mitigate
risks to personal information or IP. Advanced capabilities detect data theft concealed in images or
custom-encrypted files, even when transmitted in small amounts over time to evade detection.

CLOUD SANDBOX Integrate behavioral sandboxing for automatic and manual analysis of malware files
Supplement Forcepoint ACE analytics with an integrated file sandbox for additional deep inspection. Take
advantage of behavioral analysis in a virtual environment to uncover the malicious behavior of Zero-day
and other advanced malware. Test files automatically or manually to generate detailed forensics.

EMAIL ENCRYPTION Ensure the confidentiality of sensitive communications


The Forcepoint Email Encryption Module is a policy-driven technology that enables secure delivery of
email communications. It eliminates the traditional barriers of cost and complexity by offering easy
administration, without complex key management or additional hardware.

IMAGE ANALYSIS Identify explicit images to enforce acceptable use and compliance
The Forcepoint Image Analysis Module allows employers to take proactive measures to monitor,
educate and enforce company email policy with regard to explicit or pornographic image attachments.

www.forcepoint.com
Forcepoint Forcepoint Email Security

“Forcepoint Email Security was


attractive because it took away
the overhead of managing our
email security and delivered
more than we expected in
terms of resilience and ease-
of-use. Overall, Forcepoint
Email Security has enabled
us to deliver a more resilient,
professional and cost-effective
service to our users.”
—Martin Law, Head of IT, NCP

5
The power behind Forcepoint solutions
FORCEPOINT ACE
Forcepoint ACE provides real-time, inline, contextual defenses
for Web, Email, Data and Mobile security by using composite risk
scoring and predictive analytics to deliver the most effective security
available. It also provides containment by analyzing inbound and
outbound traffic with data-aware defenses for industry-leading data
theft protection. Classifiers for real-time security, data and content
analysis — the result of years of research and development — enable
ACE to detect more threats than traditional anti-virus engines (the
proof is updated daily at http://securitylabs.forcepoint.com). ACE is
the primary defense behind all Forcepoint solutions and is supported
by the Forcepoint ThreatSeeker Intelligence.

+ EMAIL ATTACKS
INTEGRATED SET OF DEFENSE ASSESSMENT WEB
CAPABILITIES IN 8 KEY AREAS.

• 10,000 analytics available to Reputation


support deep inspections. Analysis
• Predictive security engine
Anti- Behavioral
forecasts several Malware Sandboxing
moves ahead.

• Inline operation not only

E M AIL A TAC K S
monitors, but blocks threats.

ACE
URL
Classification Anti-Spam/
T

Phishing
Real-time
Security
WEB

Classification
AT

Real-time Real-time Data


TA

Content Classification
C
KS

Classification

E FT
TH
TA
DA

www.forcepoint.com
Forcepoint Email Security

Forcepoint ThreatSeeker Intelligence


The Forcepoint ThreatSeeker Intelligence, managed by Forcepoint
Security Labs, provides the core collective security intelligence
for all Forcepoint security products. Together with Forcepoint ACE
security defenses, Forcepoint ThreatSeeker Intelligence analyzes up
to 5 billion requests per day, and unites more than 900 million
endpoints, including those from Facebook.

This expansive awareness of security threats enables Forcepoint


ThreatSeeker Intelligence to offer real-time security updates that
block Advanced Threats, malware, phishing attacks, lures and scams,
while simultaneously providing the latest web ratings. Forcepoint
ThreatSeeker Intelligence is unmatched in size and in its use of ACE
real-time defenses to analyze collective inputs. When you upgrade to
Web Security, Forcepoint ThreatSeeker Intelligence helps reduce your
exposure to web threats and data theft.

TRITON Architecture
With best-in-class security and a unified architecture, TRITON
Architecture offers point-of-click protection with real-time, inline
defenses from Forcepoint ACE. The unmatched real-time defenses of
ACE are backed by Forcepoint ThreatSeeker Intelligence and the
expertise of Forcepoint Security Labs researchers. The powerful
result is a single, unified architecture with one unified user interface
and unified security intelligence.

7
CONTACT
www.forcepoint.com/contact

© 2017 Forcepoint. Forcepoint and the FORCEPOINT logo are


trademarks of Forcepoint. Raytheon is a registered trademark
of Raytheon Company. All other trademarks used in this
document are the property of their respective owners.

[BROCHURE_FORCEPOINT_EMAIL_SECURITY_EN]

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy