
Forcepoint TRITON AP-WEB Cloud
Web Security That Provides Protection Wherever Today's Employees Are – at Home, on the Road and in the Office
Sorry, this product is no longer available, please contact us for a replacement.
Click here to jump to more pricing!
Overview:
Environment Options
Cloud
TRITON AP-WEB Cloud gives you the Web security you need for today's distributed workforce. It provides comprehensive real-time, inline protection against advanced threats that use sophisticated techniques to evade detection while they're stealing your sensitive data, as well as insider threats, such as employee theft and malware that slips into your network. TRITON AP-WEB stops more advanced, non-signature threats to your data than any other solution, and it's a proven leader in SaaS Web content security.
Forcepoint global cloud security service provides a robust, high performance, highly-available web and data security service for mobile users and businesses looking to shed the burden of managing hardware and updates. Continuing investment in ISO 27001 and CSA Star certifications throughout our development, deployment and operations means you can trust that your data is secure with us.
For even greater coverage, combine TRITON AP-WEB with TRITON AP-EMAIL Cloud and Threat Protection Cloud for comprehensive all-cloud defense against Web threats.
Features:
- Real-time threat intelligence from the Forcepoint ThreatSeeker Intelligence Cloud, which gives visibility into current global cyber threat activity
- Highly accurate, real-time identification and classification of threats using TRITON ACE
- Full ISO27001 compliance across development, operations, and support
- Cloud Security Alliance Security Trust & Assurance Registry (CSA Star) Certification
- Advanced Threat dashboard with forensic reporting details
- Cloud Data Security data loss detection
Add-On Modules:
TRITON AP-MOBILE
Your workforce relies on their iOS and Android devices to stay productive even when they’re on the move. To protect your critical data, you need assurance that their mobile device use remains secure. TRITON AP-MOBILE delivers this capability for your organization. Its data-aware defenses protect against malware, phishing, malicious links and the theft of intellectual property.
Threat Protection Cloud Module (Web Sandbox)
Take a modern, cloud-first approach to content security for your organization with a scalable, easy-to-deploy sandbox solution that integrates seamlessly with TRITON AP-WEB and TRITON AP-EMAIL.
Modules | ||||
TRITON AP-WEB & Modules | TRITON AP-WEB | Web DLP | Web Sandbox | TRITON AP-MOBILE |
---|---|---|---|---|
Web Proxy + SSL Explicit or transparent, multiple Auths, realm sequencing, IPv6, CC EAL 2+, FIPS 140-2 |
||||
ACE (Advanced Classification Engine) Real-time assessment of content, scripts, and other potential threat components. |
||||
Behavioral File Sandboxing An additional malware analysis option activated within ACE, especially useful for zero-day malware detection. |
||||
Drip DLP Detect small amounts of data theft over extended periods of time. |
||||
Enterprise-Class DLP Capabilities Includes advanced fingerprinting and machine learning. |
||||
Custom-Encrypted Upload Detection Identify the use of encryption methods designed to evade DLP analysis. |
||||
Password File Data Theft Detection Coordinate with the network to detect the illegitimate transmission of user credentials. |
||||
OCR (Optical Character Recognition) Extract text within images for policy violation assessment. |
||||
Advanced Threat Dashboard Forensic reporting on who, what where, how; data capture for security incidents |
||||
Web Security and Filtering Over 120 categories supported by ACE real-time classification. |
||||
YouTube for Education | ||||
Social Web Controls Provide user access to social media with enforced acceptable use policies. |
||||
Advanced Application Controls | ||||
TRITON Unified Security Center Policies, dashboards, reports and more are available in a unified console to reduce the time and expertise required to achieve results. |
||||
Mobile Device Security For iOS and Android devices. MDM by Airwatch, Web Security by Forcepoint, DLP through Active Sync. |
Power Behind TRITON Solutions:
ACE (Advanced Classification Engine)
Forcepoint ACE provides real-time, inline contextual defenses for Web, Email, Data and Mobile security by using composite risk scoring and predictive analytics to deliver the most effective security available. It also provides containment by analyzing inbound and outbound traffic with data-aware defenses for industry-leading data theft protection. Classifiers for real-time security, data and content analysis — the result of years of research and development — enable ACE to detect more threats than traditional anti-virus engines every day (the proof is updated daily at http://securitylabs.forcepoint.com). ACE is the primary defense behind all Forcepoint TRITON solutions and is supported by the Forcepoint ThreatSeeker Intelligence Cloud.
Integrated set of defense assessment capabilities in 8 key areas.
- 10,000 analytics available to support deep inspections.
- Predictive security engine sees several moves ahead.
- Inline operation not only monitors, but blocks threats.
ThreatSeeker Intelligence Cloud
The ThreatSeeker Intelligence Cloud, managed by Forcepoint Security Labs, provides the core collective security intelligence for all Forcepoint security products. It unites more than 900 million endpoints, including inputs from Facebook, and, with Forcepoint ACE security defenses, analyzes up to 5 billion requests per day. This expansive awareness of security threats enables the ThreatSeeker Intelligence Cloud to offer real-time security updates that block Advanced Threats, malware, phishing attacks, lures and scams, plus provides the latest web ratings. The ThreatSeeker Intelligence Cloud is unmatched in size and in its use of ACE real-time defenses to analyze collective inputs. (When you upgrade to Web Security, the ThreatSeeker Intelligence Cloud helps reduce your exposure to web threats and data theft.)
TRITON Architecture
With best-in-class security and a unified architecture, Forcepoint TRITON offers point-of-click protection with real-time, inline defenses from Forcepoint ACE. The unmatched real-time defenses of ACE are backed by Forcepoint ThreatSeeker Intelligence Cloud and the expertise of Forcepoint Security Labs researchers. The powerful result is a single, unified architecture with one unified user interface and unified security intelligence.
A unified, cloud-centric security platform to safeguard users, data and networks
Forcepoint’s unified, cloud-centric security platform integrates with your existing infrastructure to help you safeguard your users, data and networks. Powered by our TRITON 4D Platform, our ACE shared security services work closely with our global ThreatSeeker Intelligence Cloud to provide up-to-the-moment knowledge of the latest advanced threats that is shared across our products.
While our products are modular, integrating through our platform means our solutions can share a common security context, helping to detect suspicious activity and content sooner. The platform also provides better insights throughout the network so you take the best actions to fix breaches and reduce dwell time.
Protect your data throughout the threat lifecycle
Solutions backed by the TRITON 4D Platform
- Content Security
Forcepoint enables your employees to safely communicate and read content received over email, the web and other channels without being attacked by advanced threats. In addition, sophisticated Data Loss Prevention, integrated directly into our security gateways, helps prevent information from being accidentally or maliciously transmitted to places it doesn’t belong. - Insider Threat Data Protection
Every moment, your employees accidentally or intentionally create opportunities for breaches. Forcepoint lets you monitor user activity to identify the early warning signs of risky behavior, then detect and block attempts to move sensitive data in and out of your organization. Our solutions can automatically identify the riskiest users within an organization, based on their behaviors and on how they use data. This unique approach gathers rich context, including recording and playback of user activities before, during and after risky behaviors, giving you the data to take the right actions to protect your business. - Security for Cloud
Forcepoint’s comprehensive products enable organizations to safely move their business to the Cloud, taking advantage of the latest technologies for mobile users and distributed organizations. We enable your mobile and distributed workforces to take full advantage of Office 365, web applications and email without sacrificing the controls and security you need. Forcepoint enables you to discover confidential data stored in sanctioned business apps like Box and Salesforce, and to identify risky unsanctioned apps that users access. We even give you the ability to protect the Linux server farms running your applications by detecting potential threats without compromising the performance of your line-of-business systems. - Network Security
In today’s world, organizations are more decentralized than ever. From a single console, our next-generation firewall lets you reliably enforce security policies across your headquarters, corporate locations, divisions, branches, remote offices and even home offices. It integrates application control, sophisticated evasion prevention and an intrusion prevention system (IPS) into a single, easy-to-deploy solution.
TRITON APX
TRITON APX provides many key benefits to organizations interested in deploying the best possible protection against Advanced Threats across the “7-Stage Kill Chain.” They can be summarized in these three statements:
- Deploy Adaptive Security - Deploy adaptive security solutions for rapidly changing technology and threat landscapes.
- Protect Everywhere - The perimeter is the data. Protect critical information from theft whether on-premise, in the cloud or on mobile devices.
- Raise the Security IQ - Combat the cyber security skills shortage by providing predictive actionable intelligence across the entire threat lifecycle.
Documentation:
Download the Forcepoint TRITON AP-WEB Datasheet (.PDF)
Download the Forcepoint TRITON AP-WEB Product Matrix Datasheet (.PDF)
Price Note:
- TRITON AP-MOBILE requires either Web Cloud Module or Web Hybrid Module when added to TRITON AP-WEB.