Why must we accept that breaches are inevitable? While traditional data protection provides visibility into your employee’s data activity, it lacks the context behind user interactions. Systems struggle to distinguish between legitimate and risky data usage, triggering excessive alerts that overwhelm IT security teams.
Forcepoint Customer Stories
These teams face a choice: to apply restrictive policies that mitigate risk, which inhibits productivity, or allow minimal policy enforcement to enable productivity. Adding a distributed workforce on top of this scenario ratchets up the security challenges.
With Forcepoint as their cybersecurity partner, enterprises can avoid that impossible choice. Instead, security leaders at organizations around the world have embarked on a journey to protect users and data by focusing on interactions with data.
Communisis deploys flexible security solutions to support digital transformation
The work we do for our clients means there's a heck of a lot of personal data flowing through our network.
We have to make sure that information is secure, plus protect for example, a proprietary marketing piece that a major brand is about to release.
Communisis has built up our expertise and our clients’ trust that we’ll keep their information safe over the last 10 years. It’s critical to our business.”
Communisis provides communications and print management services for some of the UK’s largest government agencies, financial service firms, and insurance companies, as well as creative and point-of-sale marketing for global brands. These engagements require best-in-class cybersecurity solutions for data, web, email, and cloud. Communisis has trusted Forcepoint Web Security, Email Security, and DLP to safeguard its people and data for years. The company decided to enhance its security posture with Forcepoint Dynamic Data Protection (DDP) for risk-adaptive data defense and CASB for visibility into cloud usage—to better align its security strategy with its digital transformation journey.
More from Michelle Griffey:
We can start to be much more targeted in our security, rather than almost putting a wall up and saying, 'We’re not going to let anybody do anything'.
It's going to allow us to enable our teams to work better to their own role in their own job.”
A model for modern cybersecurity: state-of-the-art C4 Center protects its data and its citizens
The Command, Control, Communications and Computing Center (C4) Center in León, Mexico provides the emergency response dispatch service to 1.6 million citizens. To stop leaks of sensitive information, the agency responsible set out to build the most technologically advanced emergency response and a role model for other agencies across the country.
Here's what Edgar Orta, Assistant IT Manager at the León C4 Center had to say:
Our operators rely heavily on certain cloud-based apps to share sensitive and confidential information inside the institution.
It is our job to ensure the use of clouds to guarantee the confidentiality of the information.”
To effectively direct first responders, dispatchers must get the right information from callers—and that requires people trust the dispatchers to protect their privacy and the sensitive information they provide. Since partnering with Forcepoint, León’s C4 Center has reduced data breaches and is experiencing fewer data exfiltration attempts as users see cybersecurity measures put into practice.
More from Edgar Orta:
Forcepoint works as an inhibitor to people who may want to leak something. People know we know who sent the information and where.
We strengthened areas that we hadn’t covered at the endpoint, such as knowing what data is being shared, what information travels between which users, and how much time users are spending with data and in applications.”
Solving big challenges from compliance to remote workforce protection at Pelephone
As the first company in Israel to offer mobile phone services, Pelephone needed to solve a number of business challenges including: comply with national data security regulations, prevent data leaks that could damage corporate reputation and violate the law, protect a remote workforce, and increase visibility and enable better corporate controls.
With the massive amount of confidential information the company has accumulated, Information Security Manager Sesil Sela and the Pelephone team implemented very tight policy rules using Forcepoint DLP. This fastidious attention to detail in security combined with Forcepoint DLP has enabled Pelephone to detect and stop several malicious insiders from stealing IP before it was too late, including an attempt to carry out customer account information in a backpack at 3 o’clock in the morning.
The coronavirus pandemic forced Sela’s team to adjust its policies and controls on the fly. As more staff started working from home and connecting to cloud-based services on their own, the security team could fine tune Forcepoint data protection rules to both fit the need for the employees to access data from anywhere while providing better visibility 24/7 and enable more proactive alerts and controls.
Here's what Sesil Sela, Information Security Manager for Pelephone had to say:
Forcepoint DLP gave us more visibility through alerts that showed employees emailing sensitive data to their personal accounts in order to do their work remotely.
This insight allowed us to share best practices and coach employees on how they could work better from home using the corporate tools they already had, like video conferencing for remote collaboration and communication, without having to circumvent our security policies.”
User and data protection everywhere
Enterprise-class organizations like Communisis in the UK, C4 Center in Mexico, and Pelephone in Israel have implemented flexible security frameworks capable of safeguarding data in multiple locations with the ability to easily integrate behavior analytics or awareness of cloud apps and services now or in the future. Their savvy security leaders know they can modernize cybersecurity by partnering with Forcepoint. Their approach to security safely enables employees as much as it protects critical data and ensures regulatory compliance.
To find out more about how Forcepoint’s integrated cybersecurity platform helped each of these enterprises, check out the complete customer stories or read more about the products mentioned in the article.
Read the customer case studies:
Request a free trial of Forcepoint DLP
Learn more about the Forcepoint security products: