Call a Specialist Today! 800-886-5369

Forcepoint Threat Protection Appliance
Defense-Grade Malware Protection For the Most Confidential Networks and Data


Forcepoint Products
Forcepoint Threat Protection Appliance - Web
Forcepoint Threat Protection Appliance - Web, 25 - 100 Users, 1 Year
- Pricing per user for quantities 25-100
#TPW-A-CP12-N
Contact us for pricing!
Forcepoint Threat Protection Appliance - Email
Forcepoint Threat Protection Appliance - Email, 25 - 100 Users, 1 Year
- Pricing per user for quantities 25-100
#TPE-A-CP12-N
Contact us for pricing!
Forcepoint Threat Protection Appliance - Endpoint
Forcepoint Threat Protection Appliance - Endpoint, 25 - 100 Users, 1 Year
- Pricing per user for quantities 25-100
#TPEP-A-CP12-N
Contact us for pricing!

Click here to jump to more pricing!

Overview:

Protect your on-premise IT architecture with an advanced enterprise solution engineered to protect the most highly secure networks from sophisticated malware, tailored attacks and APTs.

Banks, government agencies and other organizations entrusted with highly-regulated and sensitive data need enterprise-class malware protection deployed directly into their own datacenters to detect, analyze and defend against advanced Web- and email-based attacks.

Forcepoint Threat Protection Appliance fills this need with a high-performance malware analysis platform that provides the visibility required for security teams to respond to and remediate threats quickly, detect lateral movement and get attackers off the network. Defense organizations that are continually subjected to the most advanced cyberattacks count on this solution to contain exposure and minimize disruptions.

Threat Protection Appliance can also be combined with Forcepoint TRITON RiskVision to give you even greater insights into previously undetected threats across Web, email and cloud channels, and with SureView Insider Threat for deeper understanding of potentially damaging user activity on your network.

Features and Benefits:

Benefits

  • Provides comprehensive visibility into network traffic, endpoint actions (U.S. only) and inbound/outbound files to give you deeper understanding of external and internal threats.
  • Incorporates Forcepoint ThreatScope technology to add defense-grade malware analysis — including multiple detection algorithms and sandboxes — to your on-premise security deployment.
  • Enables your security team to rapidly detect and prioritize threats using advanced visualizations and analytics.
  • Identifies malicious files and all of their locations across your network so your team can target remediation efforts where they matter most.
  • Contains exposure and damage by limiting the dwell time and lateral movement of malware.
  • Scales to the largest networks to grow as your enterprise grows.

Features

  • Powerful malware detection and sandboxing technology using Forcepoint ThreatScope.
  • Security intelligence from the Forcepoint ThreatSeeker Intelligence Cloud.
  • Straightforward interoperation with existing email infrastructures.
  • Optional visibility into files received via API or removable media such as USB keys (U.S. only).
  • Tested in the most stringent commercial and government security environments.
  • Available Integration with TRITON AP-WEB, AP-EMAIL, RiskVision and SureView Insider Threat

Solutions:

Organizations of all sizes today are facing unprecedented, 24/7 daily threats to their infrastructure from sophisticated, organized, and well-funded adversaries. These threat actors are often motivated by significant financial gain and sponsored by nation-states, criminal organizations, or radical political groups.

According to the 2015 Cost of Data Breach Study: Global Analysis1 by Ponemon Institute research, businesses across all industries, including healthcare, financial services, industrial manufacturing, government, education, and media services providers, including their partner and reseller networks, are real targets for damaging cyber-attacks including data breaches. Not only do you face more advanced cybercriminals now, but also the types of information of value to them are continually expanding to include financial, information technology, operations, human resources, legal, marketing, sales, and development. All of these types of confidential information are now at risk of being compromised, modified, and electronically stolen.

These cybercriminals (a.k.a. threat actors) have the capabilities to co-opt your systems by evading signature-based detection and to stealthily exploit unknown vulnerabilities in your network for years masking them as normal operations. These malicious attacks result in intellectual property compromise, decreased operational productivity, missed opportunities, and significant impact to your organization’s bottom line. At the end of the day, through direct and indirect costs, these breaches will put in jeopardy the three most important parts of your business: your intellectual property, your customers, and your brand reputation.

Threat Protection Appliance Overview

Organizations require a new, more sophisticated suite of cyber products specifically designed to detect attacks of an unknown and unconventional nature in order to omit exposure and mitigate risks to your organization. Today’s new breed of cyberattacks is unrelenting. Threat Protection Appliance detects and helps to quickly combat advanced internal and external threats in real-time.

Organizations like yours trust and depend on Threat Protection Appliance to contain exposure, minimize disruptions, and protect critical organizational assets.

Defending Against Advanced Persistent Threats

Continuous Monitoring
Threat Protection Appliance provides your organization with unparalleled awareness of threats through comprehensive monitoring of endpoint activity and inbound content and incorporates advanced behavioral analytics to detect unknown threats.

Our expansive detection technology uses a variety of analytic techniques to monitor and contextualize events in real-time. For example, machine-learning algorithms are used to provide adaptive behavioral baselines and spot anomalies, while heuristic analysis is used to detect similarities to known threat signatures.

The solution employs both proprietary and third party algorithms that run in parallel. We use correlation algorithms to interpret results and determine whether something is a threat or not. As the threat landscape changes, we continue to evolve out detection algorithms.

Threat Protection Appliance includes a Windows endpoint agent that pervasively monitors the end-point across a variety of sensors including: files, emails, web/ webmail, removable media and IM with file/registry scanning to detect threats and protect your organization from data losses and breaches. Moreover, unlike other vendor products, our Threat Protection Appliance’s end-point agent monitors systems resources, especially during software upgrades. It has an inconspicuous footprint and monitors threats without adverse impacts to the user experience.

Threat Protection Appliance includes an extremely robust endpoint component that simplifies deployments and lessens the need to deploy complicated SSL inspection technology.

Proprietary Hypervisor Technology
Our behavioral / sandbox analysis engine contains a proprietary hypervisor. Threat actors know that their malware is being detonated in sandboxes for analysis. Therefore, they build evasion mechanisms into their malware to detect whether it is being run in commonly deployed hypervisors. Threat Protection Appliance proprietary hypervisor technology does not leave footprints on guest operating systems, making it extremely difficult for threat actors to build effective malware evasion mechanisms.

Prioritizing Alerts and Minimizing Exposure

Contextual Awareness
Threat Protection Appliance enables the determination of threat location (e.g., email, network endpoint breach) and the extent of the threats. The solution provides analytics, visualizations, and link analysis capabilities to discover capabilities and detect/combat advanced internal/external threats enabling security professionals to quickly prioritize alerts and remediate the highest priority threats in real-time decreasing overall detection and escalation time. It protects your most critical information assets by identifying who is accessing data, what they are accessing, when and where it is accessed, and whether the data was moved. You can determine if suspicious activities on endpoints are malicious or inadvertent (e.g., insider attacks, low-andslow ATP, or inadvertent user error) enabling rapid forensic analysis and investigation through relational awareness.

Proprietary Visualizations and Analytics
Threat Protection Appliance has an intuitive user interface allowing analysts to quickly prioritize alerts and remediate the highest priority threats in real-time decreasing overall detection and escalation time.

Comprehensive Visibility
Threat Protection Appliance’s comprehensive visibility into endpoint actions and inbound/ outbound files enables your security professionals to understand their security posture and to assess the effectiveness of their defense.

Enterprise Scale and Interoperability

Enterprise-Scalability
Threat Protection Appliance has been deployed within large organizations and scales to tens of thousands of endpoints, millions of emails, and gigabits of network traffic.

Complements Existing Email Controls and Enables Interoperability
Threat Protection Appliance enhances traditional signature based email filtering technologies such as antispam and anti-virus to prevent malicious content.

Conclusion

Threat Protection Appliance protects your organization against advanced internal and external threats in real-time. This enables your security professionals to prioritize and quickly remediate and contain threats and breaches. Global organizations just like yours trust and depend on our Threat Protection Appliance to contain exposure, minimize disruptions, and protect critical organizational assets.

Documentation:

Download the Forcepoint Threat Protection Appliance Datasheet (.PDF)

Price Note:

Forcepoint Threat Protection Appliance - Web, 25 - 100 Users, 1 Year
- Pricing per user for quantities 25-100
#TPW-A-CP12-N
Contact us for pricing!
Forcepoint Threat Protection Appliance - Web, 101 - 250 Users, 1 Year
- Pricing per user for quantities 101-250
#TPW-B-CP12-N
Our Price: $18.00
Forcepoint Threat Protection Appliance - Web, 251 - 500 Users, 1 Year
- Pricing per user for quantities 251-500
#TPW-C-CP12-N
Our Price: $16.00
Forcepoint Threat Protection Appliance - Web, 501 - 1,000 Users, 1 Year
- Pricing per user for quantities 501-1,000
#TPW-D-CP12-N
Our Price: $14.00

For more than 1,000 users, please use our Quote Request Form!

Forcepoint Threat Protection Appliance - Email, 25 - 100 Users, 1 Year
- Pricing per user for quantities 25-100
#TPE-A-CP12-N
Contact us for pricing!
Forcepoint Threat Protection Appliance - Email, 101 - 250 Users, 1 Year
- Pricing per user for quantities 101-250
#TPE-B-CP12-N
Our Price: $25.00
Forcepoint Threat Protection Appliance - Email, 251 - 500 Users, 1 Year
- Pricing per user for quantities 251-500
#TPE-C-CP12-N
Our Price: $22.00
Forcepoint Threat Protection Appliance - Email, 501 - 1,000 Users, 1 Year
- Pricing per user for quantities 501-1,000
#TPE-D-CP12-N
Our Price: $20.00

For more than 1,000 users, please use our Quote Request Form!

Forcepoint Threat Protection Appliance - Endpoint, 25 - 100 Users, 1 Year
- Pricing per user for quantities 25-100
#TPEP-A-CP12-N
Contact us for pricing!
Forcepoint Threat Protection Appliance - Endpoint, 101 - 250 Users, 1 Year
- Pricing per user for quantities 101-250
#TPEP-B-CP12-N
Contact us for pricing!
Forcepoint Threat Protection Appliance - Endpoint, 251 - 500 Users, 1 Year
- Pricing per user for quantities 251-500
#TPEP-C-CP12-N
Our Price: $25.00
Forcepoint Threat Protection Appliance - Endpoint, 501 - 1,000 Users, 1 Year
- Pricing per user for quantities 501-1,000
#TPEP-D-CP12-N
Our Price: $21.00

For more than 1,000 users, please use our Quote Request Form!