Forcepoint Web Security (formerly TRITON AP-WEB)

Advanced threat protection with added local management controls to ensure compliance

TRITON AP-WEB (now Forcepoint Web Security) is updated more frequently than other, similar, networked offerings. The amount of data that we see is enormous and the number of threats that have been identified is enormous. We very much enjoy that protection.

Bruce Chitester
Security Analyst
Adventist Health

Discover, Monitor & Control Cloud Application Use

Many organizations today have turned to cloud applications to support cloud-first initiatives. This places new security challenges on IT teams to determine what cloud applications and services are being used, which users are accessing them, and how to control their use. Forcepoint Web Security enables customers to:

Discover cloud applications being used within your organization.

Monitor usage of cloud apps, including those that represent risk to your enterprise.

Control users jeopardizing your sensitive data through use of cloud applications.

Robust Protection for Users—Wherever They Go

Advanced threats involve sophisticated, multi-stage attacks with built-in techniques that evade detection while stealing your sensitive data. Insider threats—such as employee theft and internally accessed malware—are just as damaging as external threats.

Forcepoint Web Security provides industry-leading reporting, sandboxing and DLP capabilities, and stops more advanced, non-signature threats to your data than any other solution – including Blue Coat, Cisco, and Zscaler. Forcepoint Web Security is built on a unified platform that enables Forcepoint products to work together, and protects data everywhere—whether in your private cloud, on premise or via a hybrid deployment with Forcepoint Cloud. Forcepoint Web Security is the proven leader in preventing data loss, whether deployed in your private cloud, on premise or a hybrid deployment with Forcepoint Cloud.

Forcepoint does more than any other security solution. Others just weren’t there—they either do it at a different level or only do subcomponents of what they should. Overall, Forcepoint is the better solution.
- Neil Addleton, Security Advisor, South Australia Health

Looking for Forcepoint URL Filtering?

Features

  • Enterprise-grade DLP protection
  • Highly accurate, real-time identification and classification of threats using Forcepoint Advanced Classification Engine (ACE)
  • Real-time threat intelligence from the Forcepoint ThreatSeeker Intelligence (formerly ThreatSeeker Intelligence Cloud), which gives visibility into current global cyber threat activity
  • Unified management, reporting and dashboard across multiple Forcepoint products

Add ons

Forcepoint DLP for Web and Email (formerly DLP Module)

From a damaged reputation to regulatory fines and penalties, a data breach can have devastating consequences. Forcepoint DLP for Web and Email enables you to discover and protect sensitive data in the Cloud or on-premise. Secure personal data, intellectual property and meet compliance requirements quickly, with custom or out-of-the-box policies by using Forcepoint's unique DLP capabilities to stop data theft.

Forcepoint Cloud Web Platform (formerly Cloud/Hybrid Module)

Web security today requires the most advanced, real-time, in-line defenses, combined with ease of deployment, lower cost of operations and the availability of cloud security services. Forcepoint Cloud Web Platform extend advanced threat protection for Web clients to roaming users.

Forcepoint Mobile Security (formerly TRITON AP-MOBILE)

Your workforce relies on their iOS and Android devices to stay productive even when they’re on the move. To protect your critical data, you need assurance that their mobile device use remains secure. Forcepoint Mobile Security (formerly TRITON AP-MOBILE) delivers this capability for your organization. Forcepoint Mobile Security works with your mobile device manager (MDM) to provide protection to mobile devices. Its data-aware defenses protect against malware, phishing, malicious links and the theft of intellectual property.