SYS-CON MEDIA Authors: Elizabeth White, Yeshim Deniz, Zakia Bouachraoui, Carmen Gonzalez, Pat Romanski

News Feed Item

Forcepoint's Category-Defining Risk-Adaptive Protection Maximizes Data Security Without Inhibiting End-User Productivity

Dynamic Data Protection, the industry's first automated risk response solution, harnesses the power of human-centric behavior analytics for the most effective data protection against advanced threats

AUSTIN, Texas, April 16, 2018 /PRNewswire/ -- Global cybersecurity leader Forcepoint today announced the industry's first Risk-Adaptive Protection solution – called Dynamic Data Protection –  in response to the challenges enterprise and government CISOs face today in balancing airtight user and data security with business productivity.

Forcepoint Launches Risk-Adaptive Protection at RSA Conference 2018

Legacy cybersecurity solutions today rely on traditional threat blocking and static assessments that not only introduce security friction into business transactions but also overwhelm security analysts with millions of alerts from threats.

Built to address the barrage of complex and sophisticated threats facing organizations today, Forcepoint's Risk-Adaptive Protection continuously assesses risk and automatically provides proportional enforcement that can be dialed up or down. This capability is enabled through the power of human-centric behavior analytics that understand interactions with data across users, machines and accounts. Intelligent context speeds decision-making and security controls specific to changing risk in enterprise networks. With the industry's first automated enforcement capability that dynamically adapts, security analysts are now freed to focus on high value activities and eliminate the backlog of alerts from traditional security tools.

Importantly, CISOs and CIOs also can reduce traditional security friction pain points to enable productivity gains and business success, while also reducing the time required to detect and mitigate risk from days or months to a matter of seconds.

"The challenge with many security tools today is that they are static -- they don't adjust to account for different types of users and transactions -- and they are also binary: either allow fully or block completely," said Garrett Bekker, principal security analyst at 451 Research. "However, in a world of IT-enabled services delivered anywhere, whether on-premises or in the cloud, a risk-based approach that is continuously assessed and adaptively enforced can allow for more granular policy responses that can lead to more effective protection against breaches."

Human-Behavior Analytics Finally Delivers Effective Data Protection

Available later this quarter, Forcepoint's Dynamic Data Protection is the company's first Risk-Adaptive Protection solution offering. It surpasses legacy data loss prevention (DLP) offerings to uniquely deliver next-generation data protection that adaptively shapes and enforces security policies across enterprise endpoints or devices, without requiring administrator intervention.

With human-centric behavior-analytics at its core, Forcepoint Dynamic Data Protection applies an anonymous and continuously updated behavioral risk score to establish a baseline of "normal" behavior of each end-user on corporate or unmanaged networks. Forcepoint's intelligent systems, informed by the individual risk assessment, then apply a range of security countermeasures to address the identified risk. For example, Forcepoint Dynamic Data Protection can allow and monitor data access, allow access but encrypt downloads, or fully block access to sensitive files depending on the context of individual interactions with corporate data and the resulting risk score.

An organization's ability to automatically adapt enforcement policy to the most significant risk can mean the difference between protecting critical customer data, intellectual property and even mission success. As sophisticated cyber threats continue to rise, the lack of proper data protection has directly led to enterprises spending millions to restore lost data and productivity as well as customer trust.

"Escalating data breaches, stolen identities and abuses of privacy have underscored the need for a new way to continuously assess cyber behavior to protect users and data," said Matthew Moynahan, CEO at Forcepoint. "Legacy data protection based on point solutions is dead. Converged approaches is the only path forward. It's time we acted to address the use case instead of technology alone--and that starts with Forcepoint Dynamic Data Protection as the next-generation of DLP."

Forcepoint Dynamic Data Protection is the newest product offering that extends customer capabilities through the company's Human Point System. Bringing together sensor, analytics and enforcement innovations, the Human Point System enables customers to "start anywhere" with Forcepoint's best-in-class cybersecurity products, including DLP, User and Entity Behavior Analytics (UEBA), Cloud Access Security Broker (CASB), Web/Email Security, Data Guard and Network Security (NGFW), which integrate seamlessly into a system with unified policy management or plug into existing on-premises or cloud environments.

Learn More at RSA 2018

Additional Resources

About Forcepoint
Forcepoint is the global human-centric cybersecurity company transforming the digital enterprise by continuously adapting security response to the dynamic risk posed by individual users and machines. The Forcepoint Human Point system delivers Risk-Adaptive Protection to continuously ensure trusted use of data and systems. Based in Austin, Texas, Forcepoint protects the human point for thousands of enterprise and government customers in more than 150 countries. www.forcepoint.com

Join Forcepoint on Social Media

LinkedIn: https://www.linkedin.com/company/forcepoint
Twitter: https://www.twitter.com/forcepointsec  
Facebook: https://www.facebook.com/ForcepointLLC/   
Instagram: https://www.instagram.com/forcepoint   

Media Contact
Rachael Lyon
[email protected]
512-664-1724

 

Forcepoint Logo (PRNewsFoto/Forcepoint)

Cision View original content with multimedia:http://www.prnewswire.com/news-releases/forcepoints-category-defining-risk-adaptive-protection-maximizes-data-security-without-inhibiting-end-user-productivity-300630129.html

SOURCE Forcepoint

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
For enterprises to maintain business competitiveness in the digital economy, IT modernization is required. And cloud, with its on-demand, elastic and scalable principles has resoundingly been identified as the infrastructure model capable of supporting fast-changing business requirements that enterprises are challenged with, as a result of our increasingly connected world. In fact, Gartner states that by 2022, 28% of enterprise IT spending will have shifted to cloud. But enterprises still must d...
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software with the simplicity and reach of the open web. With staff in 10 timezones, Isomorphic provides a global network of services related to our technology, with offerings ranging from turnkey application development to SLA-backed enterprise support. Leadin...
Cloud-Native thinking and Serverless Computing are now the norm in financial services, manufacturing, telco, healthcare, transportation, energy, media, entertainment, retail and other consumer industries, as well as the public sector. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that pro...
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.
In a recent survey, Sumo Logic surveyed 1,500 customers who employ cloud services such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). According to the survey, a quarter of the respondents have already deployed Docker containers and nearly as many (23 percent) are employing the AWS Lambda serverless computing framework. It's clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. Th...
The level of trust we have with individuals, businesses, and technology affects our lives daily. This is important to remember when discussing new technologies. For example, our level of trust is a critical factor when evaluating a new technology as a potential solution for providing business value. Given the importance of trust, imagine one's reaction upon hearing that blockchain is a "trustless trust" system. On the surface, that does sound like an oxymoron. This paper discusses how "trustless...
Public clouds dominate IT conversations but the next phase of cloud evolutions are "multi" hybrid cloud environments. The winners in the cloud services industry will be those organizations that understand how to leverage these technologies as complete service solutions for specific customer verticals. In turn, both business and IT actors throughout the enterprise will need to increase their engagement with multi-cloud deployments today while planning a technology strategy that will constitute a ...
Data center, on-premise, public-cloud, private-cloud, multi-cloud, hybrid-cloud, IoT, AI, edge, SaaS, PaaS... it's an availability, security, performance and integration nightmare even for the best of the best IT experts. Organizations realize the tremendous benefits of everything the digital transformation has to offer. Cloud adoption rates are increasing significantly, and IT budgets are morphing to follow suit. But distributing applications and infrastructure around increases risk, introdu...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Moving to Azure is the path to digital transformation, but not every journey is effective. Organizations that start with a cohesive, well-planned migration strategy can avoid common mistakes and stay a step ahead of the competition. Learn from Atmosera CEO, Jon Thomsen about the opportunities and challenges found in three pivotal phases of the journey to the cloud: Evaluation and Architecting, Migration and Management, and Optimization & Innovation. In each phase, there are distinct insights tha...
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomp...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history.
Andrew Keys is co-founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereum.
Concerns about security, downtime and latency, budgets, and general unfamiliarity with cloud technologies continue to create hesitation for many organizations that truly need to be developing a cloud strategy. Hybrid cloud solutions are helping to elevate those concerns by enabling the combination or orchestration of two or more platforms, including on-premise infrastructure, private clouds and/or third-party, public cloud services. This gives organizations more comfort to begin their digital tr...