sb-nz logo
Story image

Forcepoint updates 'human-centric' security portfolio

27 Nov 2017

Forcepoint recently revealed updates to several features in its ‘human-centric’ security portfolio designed for government agencies and enterprise.

The company says it made the updates across its firewall, data loss prevention, user and behaviour analytics and Cloud Access Security Broker platforms.

“This year’s headline grabbing breaches prove a paradigm change is needed in cybersecurity. CIOs and CISOs today must address new security challenges that come with operating in a world where traditional network perimeters have eroded,” comments Forcepoint’s global CTO Nico Fischbach.

“This continuously shifting threat landscape requires an equally transformative view on behaviour-centric security that includes understanding the nature of human intent and the ability to dynamically adapt security response. That’s the path forward to stop cyberattacks dead in their tracks.”

Forcepoint Next Generation Firewall (NGWF) includes policies and features that protect hybrid cloud environments.

Forcepoint Data Loss Prevention (DLP) now leverages its Cloud Access Security Broker (CASB) platform to provide better visibility and data sharing across applications and stops data sharing to unauthorised users or devices.

Forcepoint User and Entity Behaviour Analytics (UEBA) updates include streaming analytics and a new entity timeline.

According to Forcepoint blogger Jim Fulton, the company scored highest for security effectiveness in NSS Labs 2017 Next Generation Intrusion Prevention System Test.

The test analysed eight vendors including Forcepoint, McAfee, IBM, Fortinet, Trend Micro, Cisco, Check Point and Palo Alto Networks.

“In this year’s NGIPS Test, NSS Labs tested nine different products, including a variety of dedicated IPS-only boxes. Forcepoint NGFW achieved a 99.9% security effectiveness score, the second year in a row we've scored over 99%,” Fulton explains.

It also blocked 100% of all evasions, 99.86% of NSS CAWS live exploits and 99.91% of exploits overall.

Earlier this month the company announced the appointment of new chief information security officer Allan Alford.

He will lead the internal user and data protection program for 2700 global employees and the company’s security and governance program.

“The security industry is at an inflection point, where customers and vendors must partner to build solutions that can bring visibility to risky behaviour or abnormal data usage as the means to stop headline-grabbing data breaches,” comments Forcepoint CIO Meerah Rajavel.

“Allan understands that a new paradigm must be applied to people, process and technology to adequately address these emerging security threats,” Rajavel concludes.

Story image
As digital transformation grows in A/NZ companies, misconceptions about their role in cloud security abound
While an 81% majority of A/NZ organisations are accelerating their digital transformation, a giant 99% of surveyed respondents say they believe their cloud security provider provides enough protection, according to a Trend Micro study. More
Story image
Hornetsecurity acquires Altaro, the latest in acquisition spree
The move is a culmination of a medley of acquisitions made by Hornetsecurity recently, following the January 2019 acquisition of Spamina, a Spanish cloud email security company, as well as EveryCloud, its British market partner, in early 2020.More
Story image
Users pay with personal data - Kaspersky on WhatsApp move to share data with Facebook
"Nothing is truly free, and, unfortunately, the current business model for free services means that, essentially, we pay with our data."More
Story image
A brief history of cyber-threats — from 2000 to 2020
Many significant cybersecurity events have occurred since the year 2000 — not every one of them ‘firsts’, but all of them correlating with a change in security behaviour or protection.More
Story image
IronNet expands Asia Pacific presence with new strategic partnership
“The combination of M.Tech’s extensive network in Asia Pacific and our unparalleled expertise in threat intelligence and detection will help more enterprises across the region to proactively identify and take down known and unknown threats before they happen.”More
Story image
IT professionals destroying end-of-life hardware over fears of data breaches - report
IT directors are destroying end of life tech hardware as opposed to erasing its data out of fear of making a mistake and facing data breaches.More