ForcePoint

Displaying 1 - 10 of 48 results

  • Forcepoint Stonesoft NGFW Exclusive Webinar

    Videos · Nov 2016 · Provided By ForcePoint

    Security is in a constant state of flux, organisations must balance anticipating new security threats and staying up-to-date with evolving infrastructures while enabling business growth and IT projects with minimal downtime and resources. In this Forcepoint Stonesoft NGWF Exclusive Webinar, we discuss the challenges...

    Watch Now
  • Testing NGFW: Three Points of Value Critical to Your Enterprise

    Webcasts · Nov 2016 · Provided By ForcePoint

    The three key drivers of NGFW solution deployment success: Integration with security workflow, total cost of ownership and security effectiveness. Which solution will work best for your distributed enterprise? Security insight leaders NSS Labs shares its methodology for testing NGFW capabilities, including key features to consider when selecting a solution.

    View This Now
  • The 2016 Ponemon Study on the Insecurity of Priviledge Users

    White Papers · Oct 2016 · Provided By ForcePoint

    Privileged users often are your riskiest employees. Anyone with elevated access to data, systems and computer assets, from account managers to corporate executives is a risk. Read the Ponemon Report to see how your privileged users can be serious insider risk.Read more.

    Read More
  • Thrive with Office 365™ and Hybrid Security

    White Papers · Oct 2016 · Provided By ForcePoint

    Office 365 has proven itself to be a wonderful business-enabling technology that delivers efficiencies for organisations around the world. Its strengths and weaknesses will help you protect your critical data from advanced attacks and insider abuse.

    Read More
  • Securing Data During an M&A

    White Papers · Oct 2016 · Provided By ForcePoint

    When going through the M&A process, most organizations don’t know how to protect their critical data. Security disparities between two organizations are common, usually requiring the one with less strict security requirements to bring theirs into alignment. In addition, employees of companies going through M&A activities typically have some...

    Read More
  • Are Advanced Evasion Techniques Already Beating Your Network Defenses?

    Ebooks · Oct 2016 · Provided By ForcePoint

    Most organizations have spent the past decade ramping up responses to network security threats, cybercrime and compliance regulations. However, Forcepoint™ research shows that advanced evasion techniques (AETs) continue to break the security protection model that most organizations rely on today. Given the changing threat landscape, we need to...

    Read More
  • The 2016 Ponemon Study on the Insecurity of Privileged Users

    White Papers · Oct 2016 · Provided By ForcePoint

    Privileged users often are your riskiest employees. Anyone with elevated access to data, systems and computer assets, from account managers to executives pose a risk and 66% of respondents say privileged users look at information just out of curiosity. The Ponemon Report, “2016 Study on the Insecurity of Privileged Users,”...

    Download Now
  • Advanced Evasion Techniques for Dummies

    White Papers · Oct 2016 · Provided By ForcePoint

    Advanced evasion techniques (AETs) are here to stay, and you need to know how to stop them. In this e-book, Forcepoint security expert Klaus Majewski explains how AETs defeat traditional security measures and how you can beat them, with special attention to the risks posed to industrial control systems.

    Read More
  • How to More Thoroughly Protect Email in Exchange Online

    White Papers · Oct 2016 · Provided By ForcePoint

    This whitepaper explores the use of third-party email security, advanced threat detection and data loss prevention solutions to supplement or replace the security services available from Microsoft for Exchange Online.

    Read More
  • Forcepoint™ Insider Threat Data Protection

    White Papers · Oct 2016 · Provided By ForcePoint

    In 2015, the top three types of breached data were personally identifiable information (PII), authentication credentials and intellectual property (IP). What's more, 37% of these breaches were the result of insider behavior – either deliberate or unintentional. Early visibility into risky user behavior gives you advanced warning into threats to...

    Download Now