Forcepoint’s Cross Domain solutions support the unique and complex missions and objectives undertaken by the people who protect national security. From intelligence communities to defense departments and civilian agencies, these cyber warriors require rapid, accurate and secure ways to support their data-driven missions. Our people-centric solutions focus on securing and simplifying the intersection of technology, data and human beings, delivering solutions and services that work with and for your users to effectively and efficiently accomplish their missions.

Intelligence officers, analysts, commanders and warfighters use Cross Domain Solutions to access and transfer networks, data and files at speeds previously unimagined. Security now works in their favor: They’re able to collaborate when and where they need to, without onerous logistical barriers. That means better mission decisions in real time and faster innovation with less hardware and overhead.

Our Approach

  • Forcepoint Cross Domain access and transfer solutions address mission security and effectiveness
  • Effectively and efficiently support the mission with seamless and secure cross domain access to all required networks and the associated data
  • Enable system administrators with enterprise-scale administration tools to support a global footprint
  • Balance the need to share data against the need to protect both the data itself and the agency as a whole
  • Ensure that data and files arrive at their appointed destinations quickly and reliably, in the right format and free of malware.

The ability to securely connect to multiple networks from one device resulted in significant cost savings.

Confidential Organization
Forrester Cross Domain Total Economic Impact Report 2017

Solutions to Fit Your Needs

Unique challenges require a more unique perspective. Forcepoint provides custom solutions that marry unparalleled experience, cutting edge products and industry-leading expertise to meet even the most demanding needs

Our Insights

Is this Petya, NotPetya, GoldenEye, ExPetr, or PetrWrap?

Please note:​ This is an update to our original analysis posted on June 27, 2017.
Forcepoint Security Labs will continue to refer to this as a Petya outbreak, although other vendors have chosen to apply additional or alternative names to it.
In straightforward...

Blog