Call a Specialist Today! 833-335-0427

Forcepoint TRITON AP-DATA
Stop Data Theft, Meet Regulatory Compliance and Secure Your Intellectual Property from Internal and External Threats


Sorry, this product is no longer available, please contact us for a replacement.


Click here to jump to more pricing!

Overview:

Environment Options

V-Series Appliances
V-Series Appliances

Forcepoint enables you to discover and secure your critical data whether it resides on premise, in the cloud or on an off network endpoint device. We extend our Enterprise DLP across your high-risk data loss channels as well stopping data loss and theft by malicious insiders, outsiders and broken business processes.

Data is at the heart of your organization. You use it every hour of the day to serve customers, keep accurate records and make good decisions. But the enterprise technologies you count on for handling data are prone to leaks, and determined attackers, both internal and external, would love to steal your data and put your organization in the headlines for all the wrong reasons.

TRITON AP-DATA gives you the defenses you need to protect your sensitive data wherever it lives — on endpoints, in the cloud or on-premise. Its powerful DLP functionality and other features help you secure financial records, intellectual property, personally identifying information (PII) and other sensitive data, while a user-friendly wizard makes it easy to deploy. Simply choose your geographic location and industry, and see in a single template all the common compliance regulations relevant for you.

For even greater protection against malicious or careless insiders, combine AP-DATA with SureView Insider Threat.

Deploy Cloud Services Without Compromising Security

Forcepoint enables you to adopt cloud services like Box, Salesforce.com, Citrix ShareFile and Microsoft Office 365 without compromising your security posture. AP-DATA gives you visibility to data and the ability to monitor and prevent the exfiltration of your critical data.

Protection that follows your users

From regulatory compliance data to intellectual property, Forcepoint keeps your data secure regardless of where it resides. PreciseID fingerprinting gives you the ability to discover even just a partial fingerprint of structured or unstructured data on Mac OS and Microsoft endpoint devices, on and off the corporate network.

Forcepoint DLP empowers your business

  • Reduce the risk of data theft while adopting cloud services like Office 365 and Box Enterprise with increased data visibility.
  • Implement effective security controls you can easily audit to meet compliance and regulatory requirements.
  • Identify sensitive data within images such as scanned data and screen shots.
  • Identify and prevent insider threats with behavioral analytics.
  • Easily find and secure files stored on Mac, Windows, and Linux endpoint devices.
  • Unify your security solutions, coordinate defense policies, share intelligence along multiple points and enjoy centralized management of your data security.
  • Incident management center and email workflow enables the right people to review and respond to data loss incidents.

TRITON AP-DATA Components

There are two core options within TRITON AP-DATA that can be deployed together or independently to meet your security requirements. This gives you the flexibility you need to meet data protection challenges both today and as your organization grows.

TRITON AP-DATA Discover

To secure data, you must be able to find it wherever it resides. TRITON AP-DATA Discover enables you to detect and secure data-at-rest across your network as well as in cloud services such as Microsoft Office 365, Citrix ShareFile and Box Enterprise. With the addition of TRITON AP-ENDPOINT DLP, the power of AP-DATA Discover can be extended to MacOS and Microsoft Windows endpoints on and off the network.

  • Adopt cloud services such as Microsoft Office 365, Box Enterprise and Citrix ShareFile without fear of data theft
  • Identify and secure sensitive data within screenshots, PDFs and other images using embedded OCR (Optical Character Recognition) technology
  • Easily find and secure files stored on MacOS, Windows and Linux endpoint devices

TRITON AP-DATA Gateway

The last chance to stop data theft is when data-in-motion passes through email and Web channels. TRITON AP-DATA Gateway helps identify and prevent malicious and accidental data exfiltration, whether originating from outside attacks or insider threats. Counter advanced threat evasion techniques with powerful OCR to recognize data within an image, and use drip DLP to stop the theft of data one record at a time.

  • Embrace cloud services like Microsoft Office 365 and Box while maintaining data visibility and control
  • Identify data theft attempts that use evasions such as custom encryption or data transmitted in small amounts over time
  • Control insider threats by identifying high-risk employees and providing proactive user education

Features:

  • Enterprise DLP functionality
  • Drip DLP to identify “low-and-slow” attacks
  • Optical character recognition (OCR) to identify data conveyed in images
  • Unified management, reporting and dashboards across all TRITON APX products
  • AP-DATA Email Gateway for Microsoft Office 365 with deployment options in Microsoft Azure allows you to discover and protect in the Azure cloud
  • Recognize sensitive data hidden in images, scanned documents and screen shots.
  • Securely deploy cloud services like Office 365 and Box Enterprise by retaining visibility and control over sensitive data.
  • Drip DLP considers cumulative data transmission activity over time to discover small amounts of data leakage.
  • Identify high-risk employees by identifying activities that are indicative of data theft.
  • Detect fingerprinted data on endpoint devices on or off the corporate network.
  • Mac OS X and Windows supported endpoint devices.
  • Detect sensitive data being sent out of the organization via email, web uploads, IM, and cloud service clients. Includes SSL decryption when used with TRITON AP-WEB.

Capabilities:

Embrace innovation with confidence
Meeting your customer needs and remaining competitive requires innovation and enabling your workforce to adopt new technologies. Forcepoint’s TRITON AP-DATA lets you safely leverage powerful cloud services like Office 365, Box Enterprise and SalesForce.com, allowing your organization to continue to grow and innovate. TRITON AP-DATA empowers your roaming workforce by protecting your sensitive data and intellectual property both on and off-network.

Find and secure sensitive data within an image
A malicious screen shot or legacy records scanned and stored as images present blind spots for traditional DLP solutions, but not for TRITON AP-DATA. With Forcepoint’s OCR (Optical Character Recognition), you can reliably identify and secure sensitive data within an image. This unique ability allows you to control the flow of sensitive information in screenshots, fax pages, smart phones and table photos, as well as documents such as checks, receipts, and scanned legacy files, protecting you from advanced attacks and the Insider Threat of data theft. Other unique capabilities can identify custom encryption and “Drip DLP” methods that are often used to evade detection.

Meet and demonstrate compliance
An extensive library of out-of-the-box policies make it easy for your IT staff to quickly implement controls to meet regulatory requirements and secure intellectual property. You can choose the appropriate policies to meet your compliance requirements, as well as the policies needed to secure your intellectual property. Forcepoint provides a set of advanced IP detection capabilities flexible enough to meet data protection needs with a user friendly GUI interface enabling you select the polices to secure your intellectual property and sensitive data all in one template. Forcepoint also helps you to satisfy auditors with standardized reports while enabling you to customize reports as needed.

Identify "High-Risk" user behavior and educate users to improve awareness
From user error to malicious intent, end users are often at the heart of data loss incidents. Forcepoint TRITON AP-DATA uses behavioral analytics to proactively identify high-risk users:

  • Naive users often pose a risk due to bad habits that can be highlighted and corrected before data loss occurs.
  • Disgruntled employees can be identified early in the commission of malicious activity.

Forcepoint TRITON AP-DATA safely provides users the access to the data that they need to help drive the organization forward while mitigating Insider Threats.

Components and Add-On Modules:

There are two core options within TRITON AP-DATA that can be deployed together or independently to meet your security goals. This provides you the flexibility to meet today’s needs and the ability to grow with your organization.

TRITON AP-DATA Discover

To secure data, you must be able to find it wherever it resides. TRITON AP-DATA DISCOVER enables you to find and secure sensitive data across your network, as well as the sensitive data stored in cloud services like Office 365 and Box Enterprise. With the addition of TRITON APENDPOINT DLP, the power of AP-DATA Discover can be extended to Mac OS X and Windows endpoints on and off the network.

TRITON AP-DATA Gateway

The last chance to stop data theft is when it is in motion through Email and Web channels. TRITON AP-DATA GATEWAY helps identify and prevent malicious and accidental data loss from outside attacks or from the growing Insider Threat. Counter advanced threat evasion techniques with powerful OCR to recognize data within an image. Use Drip DLP to stop the theft of data one record at a time, and for behavior and anomaly monitoring for high-risk user identification.

TRITON AP-ENDPOINT DLP

Forcepoint TRITON AP-ENDPOINT DLP extends OCR, ‘Drip DLP’, and other data theft controls capabilities to Mac OS X and Windows endpoints, both on and off your network. Forcepoint enables the secure sharing of data stored on removable storage using policy driven file encryption. Monitor web uploads including HTTPS as well as uploads to cloud services like Office 365 and Box Enterprise. Full integration with Outlook, Notes, and mail clients all while using the same user interface as Forcepoint’s Data, Web, Email, and Endpoint solutions.

Image Analysis Module

To meet regulatory obligations in many parts of the world, or simply to ensure a harrassment-free environment, the optional Image Analyses Module provides the power to identify explicit images, such as pornography, stored on the organzation's network or in motion through Email or Web channels.


TRITON AP-ENDPOINT DLP, TRITON AP-DATA & Modules TRITON AP-DATA Discover TRITON AP-DATA Gateway TRITON AP-ENDPOINT DLP
ACE (Advanced Classification Engine)
Real-time assessment of content, scripts, and other potential threat components.
   
Behavioral File Sandboxing
An additional malware analysis option activated within ACE, especially useful for zero-day malware detection.
   
URL Sandboxing
Modifies suspicious URLs for additional analysis when the user clicks the link.
   
Scan and Remediate
Supports network and cloud resources, such as Office 365 and Box Enterprise. Endpoint scanning is available with AP-ENDPOINT, sold separately
  w/Discover
OCR (Optical Character Recognition)
Extract text within images for policy violation assessment
 
Drip DLP
Detect small amounts of data theft over extended periods of time.
 
Enterprise-Class DLP Capabilities
Includes advanced fingerprinting and machine learning.
Custom-Encrypted Upload Detection
Identify the use of encryption methods designed to evade DLP analysis.
Password File Data Theft Detection
Coordinate with the network to detect the illegitimate transmission of user credentials.
MAC OS X and Windows Endpoints    
USB Security
Monitor, block, or force encryption of data sent to USB storage.
   
Application Data Controls
(ie. cut, paste, copy, screen capture)
   
TRITON Unified Security Center
Unified policies, dashboards, reports and more reduce the time and expertise required to achieve results.

ACE (Advanced Classification Engine)Power Behind TRITON Solutions:

ACE (Advanced Classification Engine)

Forcepoint ACE provides real-time, inline contextual defenses for Web, Email, Data and Mobile security by using composite risk scoring and predictive analytics to deliver the most effective security available. It also provides containment by analyzing inbound and outbound traffic with data-aware defenses for industry-leading data theft protection. Classifiers for real-time security, data and content analysis — the result of years of research and development — enable ACE to detect more threats than traditional anti-virus engines every day (the proof is updated daily at http://securitylabs.forcepoint.com). ACE is the primary defense behind all Forcepoint TRITON solutions and is supported by the Forcepoint ThreatSeeker Intelligence Cloud.

Integrated set of defense assessment capabilities in 8 key areas.

  • 10,000 analytics available to support deep inspections.
  • Predictive security engine sees several moves ahead.
  • Inline operation not only monitors, but blocks threats.

ThreatSeeker Intelligence Cloud

The ThreatSeeker Intelligence Cloud, managed by Forcepoint Security Labs, provides the core collective security intelligence for all Forcepoint security products. It unites more than 900 million endpoints, including inputs from Facebook, and, with Forcepoint ACE security defenses, analyzes up to 5 billion requests per day. This expansive awareness of security threats enables the ThreatSeeker Intelligence Cloud to offer real-time security updates that block Advanced Threats, malware, phishing attacks, lures and scams, plus provides the latest web ratings. The ThreatSeeker Intelligence Cloud is unmatched in size and in its use of ACE real-time defenses to analyze collective inputs. (When you upgrade to Web Security, the ThreatSeeker Intelligence Cloud helps reduce your exposure to web threats and data theft.)

TRITON Architecture

With best-in-class security and a unified architecture, Forcepoint TRITON offers point-of-click protection with real-time, inline defenses from Forcepoint ACE. The unmatched real-time defenses of ACE are backed by Forcepoint ThreatSeeker Intelligence Cloud and the expertise of Forcepoint Security Labs researchers. The powerful result is a single, unified architecture with one unified user interface and unified security intelligence.

A unified, cloud-centric security platform to safeguard users, data and networks

Forcepoint’s unified, cloud-centric security platform integrates with your existing infrastructure to help you safeguard your users, data and networks. Powered by our TRITON 4D Platform, our ACE shared security services work closely with our global ThreatSeeker Intelligence Cloud to provide up-to-the-moment knowledge of the latest advanced threats that is shared across our products.

While our products are modular, integrating through our platform means our solutions can share a common security context, helping to detect suspicious activity and content sooner. The platform also provides better insights throughout the network so you take the best actions to fix breaches and reduce dwell time.

Integrated 4D

Protect your data throughout the threat lifecycle

Protect your data throughout the threat lifecycle

Solutions backed by the TRITON 4D Platform

  • Content Security
    Forcepoint enables your employees to safely communicate and read content received over email, the web and other channels without being attacked by advanced threats. In addition, sophisticated Data Loss Prevention, integrated directly into our security gateways, helps prevent information from being accidentally or maliciously transmitted to places it doesn’t belong.
  • Insider Threat Data Protection
    Every moment, your employees accidentally or intentionally create opportunities for breaches. Forcepoint lets you monitor user activity to identify the early warning signs of risky behavior, then detect and block attempts to move sensitive data in and out of your organization. Our solutions can automatically identify the riskiest users within an organization, based on their behaviors and on how they use data. This unique approach gathers rich context, including recording and playback of user activities before, during and after risky behaviors, giving you the data to take the right actions to protect your business.
  • Security for Cloud
    Forcepoint’s comprehensive products enable organizations to safely move their business to the Cloud, taking advantage of the latest technologies for mobile users and distributed organizations. We enable your mobile and distributed workforces to take full advantage of Office 365, web applications and email without sacrificing the controls and security you need. Forcepoint enables you to discover confidential data stored in sanctioned business apps like Box and Salesforce, and to identify risky unsanctioned apps that users access. We even give you the ability to protect the Linux server farms running your applications by detecting potential threats without compromising the performance of your line-of-business systems.
  • Network Security
    In today’s world, organizations are more decentralized than ever. From a single console, our next-generation firewall lets you reliably enforce security policies across your headquarters, corporate locations, divisions, branches, remote offices and even home offices. It integrates application control, sophisticated evasion prevention and an intrusion prevention system (IPS) into a single, easy-to-deploy solution.

TRITON APX

TRITON APX provides many key benefits to organizations interested in deploying the best possible protection against Advanced Threats across the “7-Stage Kill Chain.” They can be summarized in these three statements:

  • Deploy Adaptive Security - Deploy adaptive security solutions for rapidly changing technology and threat landscapes.
  • Protect Everywhere - The perimeter is the data. Protect critical information from theft whether on-premise, in the cloud or on mobile devices.
  • Raise the Security IQ - Combat the cyber security skills shortage by providing predictive actionable intelligence across the entire threat lifecycle.

7-Stage Kill Chain

Price Note: