Forcepoint Web Security

Forcepoint’s cloud and on-premises web security provides robust protection through content aware defenses and cloud app discovery and monitoring.

Forcepoint’s cloud and on-premises web security

Forcepoint Web Security provides robust protection through content aware defenses and cloud app discovery and monitoring, reducing risks to sensitive data for both on premise and mobile users.

Best of all, Forcepoint Web Security easily integrates with other Forcepoint solutions for single, consistent security controls that can protect against inbound and outbound threats with even the smallest of security teams. 

Hybrid Cloud Deployment 

Extend web protection and policy enforcement to remote users

Deploy Forcepoint Web Security as a physical or virtual appliance for your private cloud. Either choice can be further extended with Forcepoint’s global cloud infrastructure for remote user protection. 

Forcepoint Web Security goes beyond anti-virus defenses via eight defense assessment areas 

Real-Time Analysis for Advanced Threat Protection

Forcepoint Web Security goes beyond anti-virus defenses via eight defense assessment areas, using a composite scoring process with the Forcepoint ACE predictive analysis. Multiple real-time content engines analyze full web page content, active scripts, web links, contextual profiles, files and executables.

Integrated set of defense assessment capabilities in 8 key areas.

Easy Dashboard Access to Forensic Data

The Forcepoint Web Security advanced threat dashboard provides forensic reporting on who was attacked, what data was targeted, the data’s intended endpoint and how the attack was executed. Security incidents include data theft capture when possible. Defenses analyze inbound and outbound communications.

Integrated Data Theft Defenses

Industry-leading integrated data theft defenses (optional) detect and intercept data theft attempts and provide regulatory compliance for data loss prevention (DLP). Examples of these capabilities include detection of custom-encrypted uploads, password file data theft, slow data leaks (Drip-DLP), optical character recognition OCR (Optical Character Recognition) of text within images and geolocation destination awareness. 

Integrated Sandboxing

Learn how to better protect your company’s assets through automatic analyzing of malware behavior with the integrated sandbox service.

Cloud Application Discovery, Monitoring and Control

Discover cloud applications being used within your organization and prevent users from jeopardizing your data by sending to unsanctioned cloud applications and services. Easily add full Cloud Access Security Broker (CASB) capabilities for cloud applications using inline (proxy) integration. 

“Forcepoint has enabled us to think differently, architecturally, and leverage more cloud applications for improved business outcomes.”

Chris Anderson, Head of Infrastructure Services, Bendigo and Adelaide Bank 

Download Brochure