& cplSiteName &

Forcepoint Takes Cloud Security Beyond the Perimeter

Mitch Wagner
5/24/2017
50%
50%

Forcepoint is taking a user-centric approach to cloud security, analyzing activity to find users -- and malware masquerading as users -- that threatens the enterprise.

"It's about understanding the human interaction with technology and understanding why a user is moving data," Aaron Smith, Forcepoint senior product manager for cloud security, tells Enterprise Cloud News. "Not all threats will be outside the perimeter. Some of them will be inside."

To that end, Forcepoint announced on Tuesday that it is adding new capabilities to its suite of cloud security products.

The company upgraded its Web Security product with its Cloud Application Security Broker (CASB) to add discovery and reporting of users making unsanctioned use of cloud applications and services -- known as "shadow IT."

Forcepoint acquired the Skyfence CASB from Imperva in February. (See Forcepoint Boosts Cloud Security With Acquisition.)

Forcepoint enhanced Data Loss Prevention (DLP) security analytics for web and email to include incident risk ranking, to classify the seriousness of data leaks -- incidents where confidential or proprietary data leaves the enterprise by email or other Internet channels.

And it integrates malware detection with the CASB for cloud services such as Microsoft Office 365 OneDrive, Google G Suite, and Box

Also, Forcepoint addded ISO 27018 certification to its trust program for privacy protection of personal data, to enhance compliance with the European General Data Protection Regulation (GDPR) in 27 global data centers offering full IPSEC coverage including new sites in Milan, Stockholm and Warsaw. Forcepoint previously offered ISO27001 and CSA STAR certifications with SOC attestations.

Smith noted that not all breaches detectable by Forcepoint are malicious -- some of them can be caused by employees circumventing security just to get their jobs done, for example, emailing work files to external accounts. That sort of behavior can still result in security problems, however.

While the WannaCry ransomware -- an external threat -- is generating security headlines today, internal threats are a big deal. In financial services and healthcare in particular, insiders accounted for well more than half of attacks, according to the IBM X-Force Research 2016 Cyber Security Intelligence Index. Overall, some 25% of attacks are conducted by insiders, according to the Verizon 2017 Data Breach Investigations Report. (See WannaCry Continues at a Slowed Pace and Cyberespionage, Ransomware Top 2017 Verizon DBIR.)

Forcepoint is reacting to a reality of today's threat environment -- perimeter security isn't enough. Enterprises don't even have a perimeter anymore, with data traveling from on-premises to the cloud, users hooking up personal devices to the company network, customers and partners making connections, and software-as-a-service (SaaS) applications such as Salesforce and Microsoft Office 365 essential to doing business.

Security vendors such as Cisco, Nuage and VMware are touting microsegmentation as a solution -- using network virtualization to divide the network into many compartments, with security barriers between them to prevent the spread of infection.

Forcepoint, headquartered in Austin, Texas, is a privately held cybersecurity company with 2,500 employees and 20,000 customers, backed by Raytheon and launched early last year to bring defense technologies to the private sector. Forcepoint comprises three previously separate companies -- Raytheon Cyber Products, Websense and Intel McAfee Stonesoft.

Related posts:

— Mitch Wagner Follow me on Twitter Visit my LinkedIn profile Visit my blog Friend me on Facebook Editor, Enterprise Cloud News


CALLING ALL CLOUD, NFV AND SDN COMPANIES:
Make sure your company and services are listed free of charge at Virtuapedia, the comprehensive set of searchable databases covering the companies, products, industry organizations and people that are directly involved in defining and shaping the virtualization industry.


(5)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Educational Resources
sponsor supplied content
Educational Resources Archive
Featured Video
From The Founder
Light Reading founder Steve Saunders talks with VMware's Shekar Ayyar, who explains why cloud architectures are becoming more distributed, what that means for workloads, and why telcos can still be significant cloud services players.
Flash Poll
Upcoming Live Events
May 14-16, 2018, Austin Convention Center
May 14, 2018, Brazos Hall, Austin, Texas
September 24-26, 2018, Westin Westminster, Denver
October 9, 2018, The Westin Times Square, New York
October 23, 2018, Georgia World Congress Centre, Atlanta, GA
November 7-8, 2018, London, United Kingdom
November 8, 2018, The Montcalm by Marble Arch, London
November 15, 2018, The Westin Times Square, New York
December 4-6, 2018, Lisbon, Portugal
All Upcoming Live Events
Hot Topics
Australia's Optus on Back Foot After 'Anglo Saxon' Job Ad
Ray Le Maistre, Editor-in-Chief, 4/13/2018
Is Gmail Testing Self-Destructing Messages?
Mitch Wagner, Mitch Wagner, Editor, Enterprise Cloud, Light Reading, 4/13/2018
BDAC Blowback – Ex-Chair Arrested
Mari Silbey, Senior Editor, Cable/Video, 4/17/2018
Verizon: Lack of Interoperability, Consistency Slows Automation
Carol Wilson, Editor-at-large, 4/18/2018
AT&T Exec Dishes That He's Not So Hot on Rival-Partner Comcast
Mari Silbey, Senior Editor, Cable/Video, 4/19/2018
Animals with Phones
I Heard There Was a Dresscode... Click Here
Live Digital Audio

A CSP's digital transformation involves so much more than technology. Crucial – and often most challenging – is the cultural transformation that goes along with it. As Sigma's Chief Technology Officer, Catherine Michel has extensive experience with technology as she leads the company's entire product portfolio and strategy. But she's also no stranger to merging technology and culture, having taken a company — Tribold — from inception to acquisition (by Sigma in 2013), and she continues to advise service providers on how to drive their own transformations. This impressive female leader and vocal advocate for other women in the industry will join Women in Comms for a live radio show to discuss all things digital transformation, including the cultural transformation that goes along with it.

Like Us on Facebook
Twitter Feed