Category: Forcepoint
Automated Forcepoint NGFW High Availability with Azure Resource Manager
This is why Forcepoint developed an Azure Resource Manager template which deploys a redundant stack of Forcepoint Next Generation Firewall engines in Azure, networked with load balancers and virtual networks […]There’s Still Time to Register for Next Week’s SD-WAN and SASE Summit
Like other events over the last several months, this year’s Summit has gone fully digital so you can attend no matter where you are based. SD-WAN and SASE Summit 2020 […]Forcepoint Recognized by Gartner for 4th Straight Year as a Visionary in Network Firewalls
We designed Forcepoint NGFW to help enterprises and government agencies securely connect their offices, branches, private clouds and other sites at global scale. It works with our human-centric SASE security […]Future Insights – The Rise of Insider Threat-as-a-Service
When envisioning the threats to your organization, malicious nation states or greedy virtual thieves located halfway around the world might loom large. But what if the risk is an undercover […]IDG Study – Protecting the Human Side of Cybersecurity
Employees are Remote, Data is Everywhere According to a recent survey conducted in May 2020 by IDG of over 100 IT leaders, one major problem is securing the hundreds of […]Cybercriminals Exploit Brazil’s PIX Instant Payment Platform in New Phishing Attack
The largest campaign we have uncovered, with over 4,000 phishing emails sent (and blocked by Forcepoint Email Security) on 21st October 2020, urges users to register with the service with […]Zero Trust Network Access (ZTNA): The cure for the common VPN
VPNs and users don’t mix well That approach had been okay for small numbers of people working outside an office. But when everybody suddenly had to work from home, it […]Everything You Need to Know About the Cyber Voices Zero Trust Summit
If you’re a security leader for your organization, chances are good you’re at some point along a digital transformation journey that’s focused on adapting to today’s reality: how to protect […]Future Insights – The Emergence of the Zoom of Cybersecurity
This is the status quo today: We have all moved to remote working. Cloud deployment is a necessity. Digital transformation has happened—and where it hasn’t, it needs to. I always […]Shifting Gears from IOCs to IOBs
The after-the-fact nature of IOCs is one of their clearest limitations. They are documentation artifacts (hash of a file, reputation of an IP, known-bad URLs, in-memory footprint, etc) based on […]Load More