Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

10/15/2019
09:30 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Forcepoint Delivers Global Security Cloud Offering

Forcepoint uniquely delivers global cloud infrastructure with 160 points of presence, industry's most comprehensive cloud certifications and patent-pending proxy-less endpoint

Forcepoint today announced the expansion of the company's global cloud infrastructure to enable enterprises and government agencies to securely access web-based content whether they are in the office, a remote workforce, or road warriors on the move. Forcepoint is committed to delivering customers market-leading security solutions designed for today's cloud-first world. The company's expanded cloud infrastructure reach today is delivering enhanced enterprise-class cloud security with anywhere, anytime availability backed with the assurance that customers worldwide meet or exceed stringent data privacy and compliance regulations – without compromising performance or productivity.

With today's announcement, Forcepoint uniquely offers the industry's most expansive global cloud footprint with the availability of Forcepoint Web Security across 160 public points of presence (PoPs) in 128 countries – more than 65% total global presence. This PoP expansion brings Forcepoint services to virtually anywhere in the world while delivering optimal security and productivity enhancing capabilities including low latency, data sovereignty, and content localization.

"In a cloud-first world, people are the new perimeter. That's why we're starting to see legacy security players still embracing an infrastructure-centric approach increasingly become irrelevant," said Matthew Moynahan, CEO of Forcepoint. "If the security industry does not transform from a world of point products to cloud-native capabilities, it too will have this $100 trillion global digital transformation business opportunity pass it by. Utilizing modern cybersecurity from enterprise-class cloud-first companies such as Forcepoint can in fact help enterprises leapfrog the competition by accelerating their digital transformation efforts with dynamic and proactive security designed for today's modern threat landscape."

Forcepoint Web Security features GDPR-friendly certifications that ensure data privacy across the entire operations lifecycle. With the highest level of cloud security available to customers across each of the company's physical data centers, including SOC2, ISO 27001, and Privacy Shield, Forcepoint makes digital transformation safe, compliant, and easy for global organizations.

Additionally, Forcepoint Web Security offers the most comprehensive level of security in the industry including two major certifications not held or certified by other vendors today, these include; ISO 27018, which governs personally identifiable information, and Cloud Security Alliance (CSA) Star Gold, based on the GDPR Code of Conduct, which governs software security and cross-functional operations in a cloud setting.

Highly-distributed global organizations can also rely on Forcepoint to deliver a unique endpoint option to support their remote and roaming workforce. Forcepoint Direct Connect Endpoint™ (DCEP), is a patent-pending proxy-less endpoint that secures nearly one million endpoints. As the industry's only proxy-less endpoint, DCEP broadens secure connectivity, reduces latency, and increases productivity to allow for better application compatibility, and to obtain accurate, business-critical geolocation. DCEP is ideal for securing a highly mobile workforce or utilized behind other defenses such as guest networks or users within non-proxy friendly networks.

"At Forcepoint, we are committed to delivering optimal cloud-first customer experiences across the globe," said Nico Fischbach, Global CTO at Forcepoint. "Through a hyper-localized end-user experience, we can increase productivity by delivering content directly to where the user is located instead of where the data center is based. This expansion allows Forcepoint Web Security to continue to provide extensive support for historically underserved localization needs across Latin America, Eastern Europe, and the Middle East."

For additional information on Forcepoint's expansive global cloud security infrastructure, please visit https://www.forcepoint.com/deployment/cloud-data-security.

About Forcepoint
Forcepoint is the global human-centric cybersecurity company transforming the digital enterprise by continuously adapting security response to the dynamic risk posed by individual users and machines. The Forcepoint Human Point system delivers Risk-Adaptive Protection to continuously ensure trusted use of data and systems. Based in Austin, Texas, Forcepoint protects the human point for thousands of enterprise and government customers in more than 150 countries. For more about Forcepoint, visit www.forcepoint.com.

Join Forcepoint on Social Media
Facebook: https://www.facebook.com/ForcepointLLC/
LinkedIn: https://www.linkedin.com/company/forcepoint
Twitter: https://www.twitter.com/forcepointsec
Instagram: https://www.instagram.com/forcepoint

Media Contact
Rachael Lyon
[email protected]

SOURCE Forcepoint

Related Links

https://www.forcepoint.com

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13897
PUBLISHED: 2020-06-07
HESK before 3.1.10 allows reflected XSS.
CVE-2020-13894
PUBLISHED: 2020-06-07
handler/upload_handler.jsp in DEXT5 Editor through 3.5.1402961 allows an attacker to download arbitrary files via the savefilepath field.
CVE-2020-13895
PUBLISHED: 2020-06-07
Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module before 0.32 for Perl fails to verify correct ECDSA signatures when r and s are small and when s = 1. This happens when using the curve secp256r1 (prime256v1). This could conceivably have a security-relevant impact if an attacker wishes...
CVE-2020-13890
PUBLISHED: 2020-06-06
The Neon theme 2.0 before 2020-06-03 for Bootstrap allows XSS via an Add Task Input operation in a dashboard.
CVE-2020-13889
PUBLISHED: 2020-06-06
showAlert() in the administration panel in Bludit 3.12.0 allows XSS.