Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

10/15/2019
09:30 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Forcepoint Delivers Global Security Cloud Offering

Forcepoint uniquely delivers global cloud infrastructure with 160 points of presence, industry's most comprehensive cloud certifications and patent-pending proxy-less endpoint

Forcepoint today announced the expansion of the company's global cloud infrastructure to enable enterprises and government agencies to securely access web-based content whether they are in the office, a remote workforce, or road warriors on the move. Forcepoint is committed to delivering customers market-leading security solutions designed for today's cloud-first world. The company's expanded cloud infrastructure reach today is delivering enhanced enterprise-class cloud security with anywhere, anytime availability backed with the assurance that customers worldwide meet or exceed stringent data privacy and compliance regulations – without compromising performance or productivity.

With today's announcement, Forcepoint uniquely offers the industry's most expansive global cloud footprint with the availability of Forcepoint Web Security across 160 public points of presence (PoPs) in 128 countries – more than 65% total global presence. This PoP expansion brings Forcepoint services to virtually anywhere in the world while delivering optimal security and productivity enhancing capabilities including low latency, data sovereignty, and content localization.

"In a cloud-first world, people are the new perimeter. That's why we're starting to see legacy security players still embracing an infrastructure-centric approach increasingly become irrelevant," said Matthew Moynahan, CEO of Forcepoint. "If the security industry does not transform from a world of point products to cloud-native capabilities, it too will have this $100 trillion global digital transformation business opportunity pass it by. Utilizing modern cybersecurity from enterprise-class cloud-first companies such as Forcepoint can in fact help enterprises leapfrog the competition by accelerating their digital transformation efforts with dynamic and proactive security designed for today's modern threat landscape."

Forcepoint Web Security features GDPR-friendly certifications that ensure data privacy across the entire operations lifecycle. With the highest level of cloud security available to customers across each of the company's physical data centers, including SOC2, ISO 27001, and Privacy Shield, Forcepoint makes digital transformation safe, compliant, and easy for global organizations.

Additionally, Forcepoint Web Security offers the most comprehensive level of security in the industry including two major certifications not held or certified by other vendors today, these include; ISO 27018, which governs personally identifiable information, and Cloud Security Alliance (CSA) Star Gold, based on the GDPR Code of Conduct, which governs software security and cross-functional operations in a cloud setting.

Highly-distributed global organizations can also rely on Forcepoint to deliver a unique endpoint option to support their remote and roaming workforce. Forcepoint Direct Connect Endpoint™ (DCEP), is a patent-pending proxy-less endpoint that secures nearly one million endpoints. As the industry's only proxy-less endpoint, DCEP broadens secure connectivity, reduces latency, and increases productivity to allow for better application compatibility, and to obtain accurate, business-critical geolocation. DCEP is ideal for securing a highly mobile workforce or utilized behind other defenses such as guest networks or users within non-proxy friendly networks.

"At Forcepoint, we are committed to delivering optimal cloud-first customer experiences across the globe," said Nico Fischbach, Global CTO at Forcepoint. "Through a hyper-localized end-user experience, we can increase productivity by delivering content directly to where the user is located instead of where the data center is based. This expansion allows Forcepoint Web Security to continue to provide extensive support for historically underserved localization needs across Latin America, Eastern Europe, and the Middle East."

For additional information on Forcepoint's expansive global cloud security infrastructure, please visit https://www.forcepoint.com/deployment/cloud-data-security.

About Forcepoint
Forcepoint is the global human-centric cybersecurity company transforming the digital enterprise by continuously adapting security response to the dynamic risk posed by individual users and machines. The Forcepoint Human Point system delivers Risk-Adaptive Protection to continuously ensure trusted use of data and systems. Based in Austin, Texas, Forcepoint protects the human point for thousands of enterprise and government customers in more than 150 countries. For more about Forcepoint, visit www.forcepoint.com.

Join Forcepoint on Social Media
Facebook: https://www.facebook.com/ForcepointLLC/
LinkedIn: https://www.linkedin.com/company/forcepoint
Twitter: https://www.twitter.com/forcepointsec
Instagram: https://www.instagram.com/forcepoint

Media Contact
Rachael Lyon
[email protected]

SOURCE Forcepoint

Related Links

https://www.forcepoint.com

 
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
4 Security Tips as the July 15 Tax-Day Extension Draws Near
Shane Buckley, President & Chief Operating Officer, Gigamon,  7/10/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15105
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
CVE-2020-11061
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
CVE-2020-4042
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
CVE-2020-11081
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
CVE-2020-6114
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...