Detect, investigate and control advanced Linux threats to keep vital business services going strong. We detect anomalous behavior as well as automate and scale Linux memory forensics to verify the integrity of the kernel, processes and code in memory on each server. Reducing dwell time is easy when incident response teams are quickly alerted and armed with accurate, relevant information.

Supporting hundreds or even thousands of globally distributed servers, we look deep into the memory of Linux systems to detect any signs of trouble, and then reveal the details necessary to eradicate the threat, avoid downtime and other costly repercussions. Independent or integrated security information event management (SIEM) alerts empower you to return to normal operations when faced with rootkits, backdoors, unauthorized processes or other signs of intrusion that have evaded other defenses.

Forcepoint Threat Protection for Linux

Datasheet

Forcepoint Threat Protection for Linux
Detect, Contain and Control Cyberthreats

Industry Analyst Report

Detect, Contain and Control Cyberthreats

Forcepoint Linux Security sets the standard high...No other solution has proven to accomplish what Forcepoint Linux Security does for us.

Director of Information Security
Global Trading Firm

Benefits

Ready for Today’s Applications
Includes an extensive collection of reference data to support accurate verification of kernels, applications, and other Linux software.
Supporting a Distributed World
The configurable scanning engine can automatically scan remote systems providing analysis results for remote security personal through a rich, web-based interface.
Powerful SIEM Support
Integrates with enterprise SIEM systems with a specialized app for Splunk users.  
Broad Linux Platform Support
Compatible with Linux distributions of kernel version 2.6 and higher for both 32- and 64-bit x86 systems, including the latest releases of Amazon Linux, CentOS, Debian, Fedora, Oracle Linux, Red Hat Enterprise Linux (RHEL), and Ubuntu.