Hi [[ session.user.profile.firstName ]]

Forcepoint Network Security

  • Date
  • Rating
  • Views
  • Building and Securing your SD-WAN
    Building and Securing your SD-WAN Klaus Majewski, Director Engineering Services, Network Security, Forcepoint Recorded: Sep 27 2017 31 mins
    It’s no secret that digital transformation initiatives such as customer experience optimization and operational process transformation raise productivity levels and lower organizational costs. However, implementing such policies causes additional demands on the infrastructure, often requiring diversification into hybrid or wide area networks (SD-WANs). Organizations must ensure security will not be compromised in the process, since these initiatives raise red flags with regard to data visibility and control.

    Join this webcast to learn why SD-WAN security must be included as fundamental consideration of digital transformation plans.
  • Securing your Cloud Strategy: SaaS, Office365 and more
    Securing your Cloud Strategy: SaaS, Office365 and more Rob Lesieur, Director, Network Security Product Marketing, Forcepoint Recorded: Sep 27 2017 21 mins
    T organizations seek to decrease innovation cycles and to increase productivity by enabling Office 365, SaaS, and other cloud apps. However, as network admins seek to expand capacity, availability, and transform their networks, they must work to prioritize security.

    In this webcast we will explore:

    • How transformation to the cloud can increase IT risk as data is more widely dispersed
    • How providing protection close to users and data in the cloud as well as on the ground work off the same policies, have visibility in the same console, and can be reported on and monitored by the same incident response teams
    • Why network security must offer new levels of scale, management and flexibility
  • Are evasions hiding exploits and malware from your defenses?
    Are evasions hiding exploits and malware from your defenses? Jim Fulton, Sr. Director, Network Security Product Marketing, Forcepoint Recorded: Sep 27 2017 31 mins
    On the surface, sending information over networks seems straightforward; but, in reality, there are many ways that networking protocols at all levels can be abused to make traffic unrecognizable. By hiding the contents of what they’re transmitting, attackers can readily send malware-laden exploits in and steal data out. Simple techniques, such as trying to use signatures to recognize patterns don’t work for evasions, leading to a wide disparity in the levels of protection afforded by different brands of firewalls. This “Evasion Gap” can be clearly seen in the results of NSS Labs’ recent NGFW tests. Security professionals can also test their defenses against evasions with tools such as Ixia’s BreakingPoint systems and Forcepoint’s Evader software.
  • 2017 US State of Cybercrime: The Reality of Today’s Security Risks
    2017 US State of Cybercrime: The Reality of Today’s Security Risks Dr. Richard Ford, Chief Scientist, Forcepoint - Bob Bragdon, SVP/Publisher, CSO at IDG Enterprise Recorded: Sep 27 2017 36 mins
    Excerpts from the US State of Cybercrime Survey, conducted by CSO, US Secret Service, Carnegie Mellon University CERT, and Forcepoint
  • NSS Labs and Forcepoint Webcast: NGFW Market Trends
    NSS Labs and Forcepoint Webcast: NGFW Market Trends Thomas Skybakmoen, Vice President of Research at independent security testing company NSS Labs, and Klaus Majewski, Director Recorded: Jul 13 2017 62 mins
    Join Thomas Skybakmoen, Vice President of Research at independent security testing company NSS Labs, and Klaus Majewski, Director of Technology at Forcepoint, as they speak on the current Next Generation Firewall (NGFW) market trends.
    In this webcast, Mr. Skybakmoen details the recently released 2016 Next-Generation Intrusion Prevention System (NGIPS) and NGFW Test Reports, which awarded Forcepoint NGFW (formerly Stonesoft®) with a coveted "recommend" rating, as well as the Cyber Advanced Warning System (CAWS) testing where Stonesoft continues to earn high marks.
    NSS Labs’ NGIPS Report focuses on five areas:
    Security Effectiveness
    Performance
    Stability and Reliability
    Management and Configuration
    Total Cost of Ownership (TCO)
  • Are You Prepared for Ransomware?
    Are You Prepared for Ransomware? Carl Leonard, Principal Security Analyst at Forcepoint Recorded: Jul 13 2017 52 mins
    One of the most frustrating threat innovations of the last decade has been ‘ransomware’ malware. Initially considered just a consumer threat, both government and commercial enterprise networks can now be listed among its victims.

    Carl Leonard, Principal Security Analyst at Forcepoint, examines the technical and business threats that ransomware continues to pose to organisations for which IT security teams must be prepared to address and overcome.
    •Which ransomware should you defend against?
    •Should you pay the ransom?
    •What can you do to protect your data and network?
  • 6 IT Priorities for Your Digital Transformation
    6 IT Priorities for Your Digital Transformation Jon Oltsik, ESG Senior Principal Analyst, and Jim Fulton, Senior Product Manager Director at Forcepoint Recorded: Jul 13 2017 47 mins
    Your organization must adopt more agile technology or risk being replaced by newer startups. But existing infrastructure can slow innovation cycles. Quickly adopting new technology is the key to survival, since digital transformation delivers revolutionary results, such as:
    •Lower costs
    •Improved product quality
    •Accelerated processes
    •Innovative products
    •Better customer support

    Listen to Jon Oltsik, ESG Senior Principal Analyst, and Jim Fulton, Senior Product Manager Director at Forcepoint, in their, “6 IT Priorities for Your Digital Transformation" webcast that explored:
    •The IT infrastructure changes that need to occur
    •How digital transformation can significantly increase the attack surface
    •Why network security must offer new levels of scale, management and flexibility

    Find out the solutions to these digital transformation challenges and revolutionize your organization’s network security!
  • Quantifying the Network Operations and Security Results of Switching to Forcepoi
    Quantifying the Network Operations and Security Results of Switching to Forcepoi Rob Ayoub and Jim Fulton Recorded: Jun 22 2017 49 mins
    In addition to protecting the network, NGFWs encourage the safe adoption of newly offered subscription-based services and support ongoing organizational initiatives to modernize network security infrastructure. Security professionals that have deployed Forcepoint NGFWs cite their Cost to Feature ratio, operational efficiency and performance as the dominant factors for their decision.

    Watch the webcast with IDC Research Director Rob Ayoub and Forcepoint Director of Product Marketing Jim Fulton as they discuss the state of our current security market and the business value of Forcepoint NGFWs.

    This interactive webcast explored Forcepoint NGFW’s effect on:
    •High profile breaches and ransomware
    •Specialized threat analysis and protection
    •SaaS and subscription services adoption
    •The global IT skills shortage
  • The New Reality: Centralizing Security when Your Network is Decentralizing
    The New Reality: Centralizing Security when Your Network is Decentralizing Michael Knapp Recorded: May 25 2017 62 mins
    Network Security practitioners are taking new approaches to handle the exploding number of locations they are asked to spin up, application delivery from virtualized centers or the cloud, and other trends that are tearing up the old playbook for traditional networks.

    Join Michael Knapp, Director of Network Security Solutions Architecture at Forcepoint, during a live SANS broadcast as he discusses a "day in the life" look at new techniques that will cut through the hype. During the webcast, Michael will provide perspectives on how highly distributed organizations can connect and protect their people and the data consistently, from virtualized data centers and complex office networks to branch locations and the cloud.

    Key topics include:
    •Deploying to new locations
    •Direct-to-Cloud implementation
    •Turning business processes into Technical Controls
    •Tackling a situation where security is changing networking
    •Increasing visibility across your entire network to understand and act quickly

Embed in website or blog