Hi [[ session.user.profile.firstName ]]

Forcepoint Network Security

  • Date
  • Rating
  • Views
  • Enterprise SD-WAN in the Real World
    Enterprise SD-WAN in the Real World
    Jim Fulton, Solution Director, Forcepoint, James Smith & Glyn Miles, Link-Connect Recorded: Jun 18 2018 56 mins
    Unlike traditional network architectures, software-defined wide-area networking (SD-WAN) makes it possible to harness existing network technology to better align operations and business policies. While many companies identify a need to evolve to SD-WAN, they are not always convinced SD-WAN can deliver the necessary enterprise capabilities.

    Join us for a webinar with Link-Connect to learn how they use Forcepoint NGFWs to deliver enterprise-class SD-WAN to manage more than 400 sites from a single management console.

    In this webcast, learn how Forcepoint NGFW:

    •Simplifies operations. Management is easier with central management, visibility and hierarchical policies.
    •Saves investment dollars. Smarter use of capacity and the ability to visualize and prioritize traffic reduces connectivity costs.
    •Boosts business outcomes. Optimized capacity, increased security and ensured high availability
  • Next Generation Intrusion Prevention System
    Next Generation Intrusion Prevention System
    Thomas Skybakmoen, Research Director, NSS Labs Recorded: May 23 2018 63 mins
    NSS Labs Reveals Most Effective Network Security Products

    NSS Labs, an industry leader in third-party assessments of NGFWs, recently released the results of their Next Generation Intrusion Prevention Systems (NGIPS) Report, which measures security effectiveness against evasions and exploits.

    Join Thomas Skybakmoen, Distinguished Research Director for NSS Labs, as he shares the latest results from the NSS Labs NGIPS Report and why NSS Labs recommends the Forcepoint NGFW to be on every company's short list.
  • Continuous Security Validation, by NSS Labs
    Continuous Security Validation, by NSS Labs
    Anil Nandigam, Snr. Director, Product Marketing, NSS Labs Recorded: May 16 2018 47 mins
    How Effective is Your Security?

    The threat landscape is constantly evolving, and cybercriminals are finding new attack vectors to bypass enterprise security controls and penetrate the network. By the same token, security products are in a constant state of catch-up. Sure, you can rely on them to block yesterday’s threats, but they’re not adept at protecting from new variations, and subsequently rely on patches to fill the gap.

    Now, more than ever, you need a way to continuously validate the security controls you have in place. In this webcast, we explore how continuous security validation can help you address your security effectiveness, quantify risk and deliver peace of mind to key stakeholders.
  • Scaling Network Security
    Scaling Network Security
    Rob Lesieur, Director of Network Security Product Marketing, Forcepoint / Stephen Lawton, Special projects manager, SC Media Recorded: May 9 2018 36 mins
    In some ways, building a scalable network is easier than it was in the past; in other ways, it’s far more complex. It’s relatively easy to move applications and storage to the cloud, but paramount themes such as compliance and data security can add perplexity to those efforts. When conducted without IT oversight, ad hoc cloud use can lead to compliance violations.

    Watch the webinar as Rob Lesieur, Director of Network Security Product Marketing at Forcepoint, and Stephen Lawton, Special projects manager from SC Media, discuss trends affecting network security across the market. This 20/20 webcast looks at the challenges of scaling a network correctly, to ensure security is baked in, not stapled on.
  • Is Your Firewall Vulnerable to the Evasion Gap?
    Is Your Firewall Vulnerable to the Evasion Gap?
    Jim Fulton, Product Marketing, Forcepoint Recorded: May 2 2018 52 mins
    The 2017 NSS Labs NGFW Test was startling: despite strong claims of efficacy across the industry, there’s an expanding gap between NGFWs that are truly secure and those that are vulnerable to Advanced Evasion Techniques (AETs). Attackers use tricks like these to get exploits and malware into your network undetected.

    Want to know where your NGFW falls in the Evasion Gap? You can now use Evader, Forcepoint’s premier, software-based testing environment for evasions, to see how well your firewalls and IPS defenses stand up to AETs.

    Join our Evader webcast, hosted by the SANS Institute, and learn how to:

    - How Advanced Attacks Get In: Evasions – Exploits – Malware
    - The Evasion Gap – why it has just opened up
    - Demo of Evasions Getting Through Leading Firewalls
  • NSS Labs Newest Trends in Network Security
    NSS Labs Newest Trends in Network Security
    Thomas Skybakmoen, Research Director, NSS Labs Recorded: Apr 25 2018 47 mins
    Join NSS Labs' Thomas Skybakmoen, Distinguished Research Director from NSS Labs, as he discusses the newest trends in security.

    Network security systems are putting a new emphasis on providing multiple levels of defenses, with threats like WannaCry and Petya combining different techniques to penetrate and spread throughout organizations' networks.

    Today’s attackers use Advanced Evasion Techniques (AETs) to hide exploits of vulnerabilities that enable malware to be injected into target systems. It’s no longer enough to focus on access control or simple anti-virus scanning. Edge security systems (whether deployed at a perimeter or between internal segments) are combatting new multi-pronged attacks at each of these stages.

    To make more informed decisions, security professionals should look to independent tests such as NSS Labs’ NGFW evasion tests, NGIPS test and Breach Detection System test.
  • Building and Securing your SD-WAN
    Building and Securing your SD-WAN
    Klaus Majewski, Director Engineering Services, Network Security, Forcepoint Recorded: Sep 27 2017 31 mins
    It’s no secret that digital transformation initiatives such as customer experience optimization and operational process transformation raise productivity levels and lower organizational costs. However, implementing such policies causes additional demands on the infrastructure, often requiring diversification into hybrid or wide area networks (SD-WANs). Organizations must ensure security will not be compromised in the process, since these initiatives raise red flags with regard to data visibility and control.

    Join this webcast to learn why SD-WAN security must be included as fundamental consideration of digital transformation plans.
  • Securing your Cloud Strategy: SaaS, Office365 and more
    Securing your Cloud Strategy: SaaS, Office365 and more
    Rob Lesieur, Director, Network Security Product Marketing, Forcepoint Recorded: Sep 27 2017 21 mins
    T organizations seek to decrease innovation cycles and to increase productivity by enabling Office 365, SaaS, and other cloud apps. However, as network admins seek to expand capacity, availability, and transform their networks, they must work to prioritize security.

    In this webcast we will explore:

    • How transformation to the cloud can increase IT risk as data is more widely dispersed
    • How providing protection close to users and data in the cloud as well as on the ground work off the same policies, have visibility in the same console, and can be reported on and monitored by the same incident response teams
    • Why network security must offer new levels of scale, management and flexibility
  • Are evasions hiding exploits and malware from your defenses?
    Are evasions hiding exploits and malware from your defenses?
    Jim Fulton, Sr. Director, Network Security Product Marketing, Forcepoint Recorded: Sep 27 2017 31 mins
    On the surface, sending information over networks seems straightforward; but, in reality, there are many ways that networking protocols at all levels can be abused to make traffic unrecognizable. By hiding the contents of what they’re transmitting, attackers can readily send malware-laden exploits in and steal data out. Simple techniques, such as trying to use signatures to recognize patterns don’t work for evasions, leading to a wide disparity in the levels of protection afforded by different brands of firewalls. This “Evasion Gap” can be clearly seen in the results of NSS Labs’ recent NGFW tests. Security professionals can also test their defenses against evasions with tools such as Ixia’s BreakingPoint systems and Forcepoint’s Evader software.
  • 2017 US State of Cybercrime: The Reality of Today’s Security Risks
    2017 US State of Cybercrime: The Reality of Today’s Security Risks
    Dr. Richard Ford, Chief Scientist, Forcepoint - Bob Bragdon, SVP/Publisher, CSO at IDG Enterprise Recorded: Sep 27 2017 36 mins
    Excerpts from the US State of Cybercrime Survey, conducted by CSO, US Secret Service, Carnegie Mellon University CERT, and Forcepoint

Embed in website or blog