Call a Specialist Today! 833-335-0427

Forcepoint TRITON APX Suite
Deploy Comprehensive Security With Integrated Management for Your Enterprise


Sorry, this product is no longer available, please contact us for a replacement.


Click here to jump to more pricing!

Overview:

Environment Options

Appliance
Appliance

Cloud
Cloud

Endpoint
Endpoint

Hybrid
Hybrid

Mobile
Mobile

Help your organization thrive with a unified approach to security designed for today’s complex technology landscape and advanced threats.

You want your organization to embrace the opportunities created by new advances in cloud computing, mobility and collaboration. These technologies enable the free flow of ideas and new modes of working that can drive your organization’s success. Yet they also come with increasingly complex risks that can endanger your organization and its mission.

That’s why we designed Forcepoint TRITON APX solutions to give you a unified approach to cybersecurity. Our vision empowers you to move ahead confidently — whenever and wherever you need to, on any channel, with any device. TRITON APX embodies our 4D approach to security —Defend, Detect, Decide, Defeat — giving you comprehensive protection against determined adversaries, internal and external.

Unified Architecture = Streamlined Defense-Grade Security

All TRITON APX products share a common architecture based on the TRITON ACE and ThreatSeeker Intelligence Cloud, which work together in real time to accurately identify and classify network traffic, apply policies and detect threats. TRITON APX's unified management and reporting functions streamline work for your security team, giving them the context and insights they need to make better decisions, minimize the dwell time of attacks and prevent the exfiltration of your sensitive data.

The common architecture makes it simple to deploy any combination of TRITON AP-WEB, TRITON AP-EMAIL, TRITON AP-DATA and TRITON AP-ENDPOINT to protect your organization, and we've made it easy to purchase with our TRITON APX Enterprise bundle. Depending on your organization's needs, you can also easily integrate TRITON APX products with our Threat Protection Appliance, Threat Protection Cloud or SureView Insider Threat.

TRITON APX delivers Data Theft Prevention

Protecting your data from advanced threats and data theft demands powerful solutions to these challenges:

  • Rapidly changing technology and threat landscape
  • Explosive growth of off-network users and cloud data
  • Growing Insider Threat and security professional skills gap

Organizations need to respond with a strategy that coordinates technology, policies and processes to maximize their security posture. Data Theft Prevention is that strategy

How Forcepoint leads the way in Data Theft Prevention with TRITON APX

Deploy Adaptive Security

  • Defend your data against rapidly changing threats
  • Safely adopt new technologies to innovate and grow
  • Protect with confidence across the "Kill Chain"

Protect Everywhere

  • Secure data on and off your network
  • Empower users and partners wherever they are
  • Centralize control and visibility with the unified TRITON architecture

Raise the Security IQ

  • Get actionable intelligence for your IT team
  • Improve employee security awareness and best practices
  • Proactively identify high-risk trends

TRITON APX delivers unified Data Theft Prevention so you can safely move Forward Without Fear.

TRITON APX Components

TRITON AP-WEB

Advanced Threats involve sophisticated, multistage attacks with built-in techniques to evade detection, even while stealing sensitive data. TRITON AP-WEB provides complete protection against Advanced Threats and data theft across the entire "Kill Chain" in a unified solution for on-premise, remote, mobile, and cloud users.

TRITON AP-EMAIL

Advanced Threats blend web and email elements throughout multistage cyberattacks in "Kill Chains," presenting multiple opportunities to stop attacks before possible breaches occur. TRITON AP-EMAIL identifies targeted attacks, high-risk users and Insider Threats while empowering mobile workers and safe adoption of new technologies like Office 365.

TRITON AP-DATA

TRITON AP-DATA enables you to discover and protect sensitive data wherever it lives – on endpoints, in the Cloud or on premise. Secure personal data, intellectual property, or meet compliance use cases quickly with custom or out-of-the-box policies, applying unique DLP capabilities to control data theft.

TRITON AP-ENDPOINT

TRITON AP-ENDPOINT protects roaming users against data theft while on and off the network. Secure personal data, intellectual property, and meet compliance use cases quickly with custom or out-of-the-box policies, and apply unique DLP capabilities to control data theft on Mac OS X or Windows systems.

TRITON APX Protects Across the Kill Chain

Cybercriminal attacks succeed by following the Staged-Attack model to bypass traditional defenses and steal data. These advanced attacks happen too frequently for signatures to be developed, rendering traditional standalone defenses unable to respond.

Organizations need three key security requirements to defend across the “7-Stage Kill Chain”

  • Real-time, in-line defenses that can identify Zero-day, signatureless threats and APTs.
  • Integrated Web, Email and Data security solutions powered by realtime intelligence.
  • Advanced outbound containment defenses to protect against data theft and data loss.

Forcepoint TRITON APX is the first platform to combine all three requirements into a single, unified solution

  1. TRITON APX is powered by Forcepoint ACE (Advanced Classification Engine), with powerful real-time defenses informed by global threat intelligence.
  2. TRITON APX provides unified Web, Email, Data and Endpoint security — all powered by ACE.
  3. TRITON APX incorporates data loss prevention (DLP) technology at the core of web and email security — and advanced containment defenses that can protect against data leaving your organization.
  4. TRITON APX also enables organizations to equally protect their headquarters, branch and mobile workers by deploying security on appliances, in the Cloud or a hybrid of both platforms.

With TRITON APX, your organization, employees and valuable data are protected against all 7 stages of the “Kill Chain”

7-Stage Kill Chain

Features and Benefits:

Benefits

  • Secure all attack surfaces with TRITON AP-WEB, AP-EMAIL, AP-DATA and AP-ENDPOINT defenses
  • Elevate your enterprise cybersecurity with lower IT and personnel costs
  • Protect against insider threats and prevent critical data from leaving your system in the cloud, on-premise or on mobile devices
  • Counter external attackers with defenses that adapt quickly to the changing threat landscape

Features

  • Highly accurate, real-time identification and classification of threats using TRITON ACE
  • Real-time threat intelligence from the Forcepoint ThreatSeeker Intelligence Cloud, which gives visibility into current global cyber threat activity
  • Unified management, reporting and dashboards
  • Expansion and integration options with Threat Protection Cloud, Threat Protection Appliance and SureView Insider Threat

Capabilities:

TRITON APX Capabilities

Most of today’s security solutions can’t address Advanced Threats as they happen. TRITON AP-WEB is advanced, real-time threat defense.

  • Unified Protection Anywhere, Anytime
    Complex, uncoordinated, multi-vendor security deployments increase security risk and IT complexity. TRITON APX provides a single, unified solution for complete Web, Email, Data, and Endpoint protection and threat intelligence across the “Kill Chain,” on-premise, remote and in the Cloud.
  • Protect Against Advanced Threats
    Many of today’s security solutions can’t address Advanced Threats in real time. TRITON APX and its core products are powered by advanced, real-time threat defenses.
  • Stop Data Theft
    Most standalone DLP solutions are too complex to deploy. TRITON APX offers industry-leading DLP technology protection against data loss over Web, Email and Endpoint channels.

TRITON APX Advantages

  • A Unified Solution with Deployment Flexibility
    The beauty of TRITON APX lies in its deployment flexibility. Choose which products or components you want to deploy. Rest assured that when you decide to add an additional product, it will work seamlessly with the already deployed product, thanks to the unified architecture of TRITON. With TRITON APX, you can protect users anywhere, anytime.
  • Real-Time Analysis for Advanced Threat Protection
    TRITON AP-WEB goes beyond antivirus defenses by using eight defense assessment areas in a composite scoring process that uses predictive analysis with the Forcepoint ACE (Advanced Classification Engine). Multiple real-time content engines analyze full web page content, active scripts, web links, contextual profiles, files and executables.
  • Enterprise Class DLP
    Industry-leading data theft defenses detect and intercept data theft attempts and provide regulatory compliance for data loss prevention (DLP). These capabilities can be deployed as a stand-alone solution and can integrate directly with the TRITON AP-WEB and TRITON AP-EMAIL products. Examples of these capabilities include detection of custom encrypted uploads, password file data theft, slow data leaks (drip DLP), optical character recognition OCR (Optical Character Recognition) of text within images and geolocation destination awareness.
  • Triton APX Enterprise Core Bundle
    Secure all attack surfaces, across the “Kill Chain,” with TRITON AP-WEB, AP-EMAIL, AP-DATA, and AP-ENDPOINT defenses. Safely embrace new technologies and solutions to help your organization grow and innovate with confidence.

ACE (Advanced Classification Engine)Power Behind TRITON Solutions:

ACE (Advanced Classification Engine)

Forcepoint ACE provides real-time, inline contextual defenses for Web, Email, Data and Mobile security by using composite risk scoring and predictive analytics to deliver the most effective security available. It also provides containment by analyzing inbound and outbound traffic with data-aware defenses for industry-leading data theft protection. Classifiers for real-time security, data and content analysis — the result of years of research and development — enable ACE to detect more threats than traditional anti-virus engines every day (the proof is updated daily at http://securitylabs.forcepoint.com). ACE is the primary defense behind all Forcepoint TRITON solutions and is supported by the Forcepoint ThreatSeeker Intelligence Cloud.

Integrated set of defense assessment capabilities in 8 key areas.

  • 10,000 analytics available to support deep inspections.
  • Predictive security engine sees several moves ahead.
  • Inline operation not only monitors, but blocks threats.

ThreatSeeker Intelligence Cloud

The ThreatSeeker Intelligence Cloud, managed by Forcepoint Security Labs, provides the core collective security intelligence for all Forcepoint security products. It unites more than 900 million endpoints, including inputs from Facebook, and, with Forcepoint ACE security defenses, analyzes up to 5 billion requests per day. This expansive awareness of security threats enables the ThreatSeeker Intelligence Cloud to offer real-time security updates that block Advanced Threats, malware, phishing attacks, lures and scams, plus provides the latest web ratings. The ThreatSeeker Intelligence Cloud is unmatched in size and in its use of ACE real-time defenses to analyze collective inputs. (When you upgrade to Web Security, the ThreatSeeker Intelligence Cloud helps reduce your exposure to web threats and data theft.)

TRITON Architecture

With best-in-class security and a unified architecture, Forcepoint TRITON offers point-of-click protection with real-time, inline defenses from Forcepoint ACE. The unmatched real-time defenses of ACE are backed by Forcepoint ThreatSeeker Intelligence Cloud and the expertise of Forcepoint Security Labs researchers. The powerful result is a single, unified architecture with one unified user interface and unified security intelligence.

A unified, cloud-centric security platform to safeguard users, data and networks

Forcepoint’s unified, cloud-centric security platform integrates with your existing infrastructure to help you safeguard your users, data and networks. Powered by our TRITON 4D Platform, our ACE shared security services work closely with our global ThreatSeeker Intelligence Cloud to provide up-to-the-moment knowledge of the latest advanced threats that is shared across our products.

While our products are modular, integrating through our platform means our solutions can share a common security context, helping to detect suspicious activity and content sooner. The platform also provides better insights throughout the network so you take the best actions to fix breaches and reduce dwell time.

Integrated 4D

Protect your data throughout the threat lifecycle

Protect your data throughout the threat lifecycle

Solutions backed by the TRITON 4D Platform

  • Content Security
    Forcepoint enables your employees to safely communicate and read content received over email, the web and other channels without being attacked by advanced threats. In addition, sophisticated Data Loss Prevention, integrated directly into our security gateways, helps prevent information from being accidentally or maliciously transmitted to places it doesn’t belong.
  • Insider Threat Data Protection
    Every moment, your employees accidentally or intentionally create opportunities for breaches. Forcepoint lets you monitor user activity to identify the early warning signs of risky behavior, then detect and block attempts to move sensitive data in and out of your organization. Our solutions can automatically identify the riskiest users within an organization, based on their behaviors and on how they use data. This unique approach gathers rich context, including recording and playback of user activities before, during and after risky behaviors, giving you the data to take the right actions to protect your business.
  • Security for Cloud
    Forcepoint’s comprehensive products enable organizations to safely move their business to the Cloud, taking advantage of the latest technologies for mobile users and distributed organizations. We enable your mobile and distributed workforces to take full advantage of Office 365, web applications and email without sacrificing the controls and security you need. Forcepoint enables you to discover confidential data stored in sanctioned business apps like Box and Salesforce, and to identify risky unsanctioned apps that users access. We even give you the ability to protect the Linux server farms running your applications by detecting potential threats without compromising the performance of your line-of-business systems.
  • Network Security
    In today’s world, organizations are more decentralized than ever. From a single console, our next-generation firewall lets you reliably enforce security policies across your headquarters, corporate locations, divisions, branches, remote offices and even home offices. It integrates application control, sophisticated evasion prevention and an intrusion prevention system (IPS) into a single, easy-to-deploy solution.

TRITON APX

TRITON APX provides many key benefits to organizations interested in deploying the best possible protection against Advanced Threats across the “7-Stage Kill Chain.” They can be summarized in these three statements:

  • Deploy Adaptive Security - Deploy adaptive security solutions for rapidly changing technology and threat landscapes.
  • Protect Everywhere - The perimeter is the data. Protect critical information from theft whether on-premise, in the cloud or on mobile devices.
  • Raise the Security IQ - Combat the cyber security skills shortage by providing predictive actionable intelligence across the entire threat lifecycle.

7-Stage Kill Chain

Documentation:

Download the Forcepoint TRITON APX Datasheet (.PDF)

Price Note: