Forcepoint Web Filter & Security
Deploy Proxy-Free Threat Protection with Near Real-Time Updates
- Pricing per user for quantities 25-100
Get a Quote!
- Pricing per user for quantities 101-250
Get a Quote!
- Pricing per user for quantities 251-500
Get a Quote!
Click here to jump to more pricing!
Overview:
Environment Options
Endpoint
Equip your organization with superior classification of traffic and blocking of threats with a filtering solution that is easy to deploy.
Your organization needs straightforward protection from cyberattacks with a solution that stays abreast of the latest threats — without extra overhead or operating costs.
Forcepoint Web Filter & Security blocks Web threats to reduce malware infections, decrease help-desk incidents and free up valuable IT resources. With more than 120 security and filtering categories, hundreds of Web application and protocol controls, and 60-plus reports with customization and role-based access, Web Filter & Security is an easy-to-deploy, transparent filter and security solution that avoids the complexity of a proxy gateway.
Why is Forcepoint the best choice?
Forcepoint Web Filter and Security blocks web threats to reduce malware infections, decrease help desk incidents and free up valuable IT resources. With more than 120 security and filtering categories, hundreds of web application and protocol controls, and 60-plus reports with customization and role-based access, Web Filter and Security is an easy to deploy and transparent filter and security solution that avoids the complexity of a proxy gateway.
Real-time security updates and granular policy controls
- Receives near real-time security updates from the ThreatSeeker Intelligence Cloud. It’s one of the world’s largest threat analysis networks, and includes input from Facebook.
- Includes industry-leading web security policy controls, more than 120 web security and content categories, and time quotas with multiple authentication options for users and groups.
- Custom allow/deny filters can be timed or permanent, and can accept security intelligence from third-party sources. • Has controls addressing viral, entertainment and surveillance videos, plus support for YouTube educational videos.
- Provides hundreds of controls for applications and protocols, and full port monitoring outside of proxy analysis.
Unified Management and Reporting
- The unified Forcepoint TRITON user interface simplifies provisioning and enables role-based reporting.
- Includes more than 60 pre-defined reports, many easily customizable reports and administrative alerts.
- TRITON architecture supports expansion to Email, Data or Mobile security products, or an upgrade to TRITON AP-WEB.
Threatseeker Intelligence Cloud
The ThreatSeeker Intelligence Cloud, managed by Forcepoint Security Labs, provides the core collective security intelligence for all Forcepoint security products. It unites more than 900 million endpoints, and in conjunction with the Forcepoint ACE security defense, analyzes up to 5 billion requests per day. This expansive awareness of security threats enables ThreatSeeker Intelligence Cloud to offer real-time security updates that block advanced threats, malware, phishing attacks, lures and scams, plus provide the latest web ratings.
The ThreatSeeker Network uses ACE security defenses to analyze 3-5 billion requests per day using security lab expertise you can trust.
Features and Benefits:
Benefits
- Receives near real-time threat intelligence from the Forcepoint ThreatSeeker Intelligence Cloud, which gives visibility into current global cyber threat activity
- Provides hundreds of controls for applications and protocols
- Offers full port monitoring outside of proxy analysis
- Includes controls addressing viral, entertainment and surveillance videos, plus support for YouTube educational videos
Features
- Custom allow/deny filters can be timed or permanent, and can accept security intelligence from third-party sources
- Industry-leading Web security policy controls
- More than 120 Web security and content categories
- Time quotas with multiple authentication options for users and groups
Best Protection Without a Proxy
- Security intelligence from the ThreatSeeker Intelligence Cloud
- Real-time security updates for the latest protection and ratings
Reduce Complexity
- Transparent deployment using existing network infrastructure
- Appliance or software deployment
- One user interface to manage Web Security and any additional Forcepoint email, data or mobile security product
Improve Protection
- Reduce malware infections and the risks of data theft and damage to reputation
- Reduce help desk incidents and time spent re-imaging systems
- Free up IT resources to enable new business operations
INcrease Productivity
- • Industry-leading policy controls, including time quotas
- Over 120 web categories, including videos, productivity and bandwidth
Intuitive Management and Reporting
- Set of four customizable dashboards for a comprehensive view into network activity and threat levels
- More than 60 pre-defined reports for display of business and technical information
- Easy customization, generation and distribution of reports
Solutions:
You Need | Forcepoint Solutions |
---|---|
Easy installation and management | Web Security offers transparent proxy-free deployment, and is easily integrated into your existing network infrastructure. |
Real-time security updates for threat protection | Web Security receives real-time security updates from ThreatSeeker Intelligence Cloud to help protect against the latest advanced threats, malware, phishing and scams. |
Analyze, manage and monitor threat levels and network activity | Web Filter and Security includes an intuitive, web-based console and dashboards that provide complete visibility into current threat levels, network activity and security policy enforcement. Reporting is easy and intuitive. |
Video controls to protect network resources, plus custom allow/deny filters | Web Filter and Security allows the viewing of YouTube educational videos, and provides control over viral, entertainment and surveillance videos. Custom allow/deny filters can be timed to expire for special events, and they support exceptions to remediate help desk incidents. |
Network port monitoring with application and protocol controls | The integrated Network Agent provides full port monitoring that includes monitoring of traffic outside of proxy analysis, and has controls for hundreds of applications and protocols. |
Remote and Cloud user protection | An optional remote filter Module and/or a Web Filter Security Cloud Module provides web access to remote users for protection against threats and enforcement of policies. |
Real Time Advanced Threat Defense | Upgrade to TRITON AP-WEB to get social media controls, SSL inspection, inline ACE real-time security and data loss prevention (DLP), and an advanced threat dashboard for forensic reporting and data theft capture during security incidents. |
Documentation:
Download the Forcepoint Web Filter & Security Datasheet (.PDF)
- Pricing per user for quantities 25-100
Get a Quote!
- Pricing per user for quantities 101-250
Get a Quote!
- Pricing per user for quantities 251-500
Get a Quote!
- Pricing per user for quantities 501-1,000
Get a Quote!
- Pricing per user for quantities 25-100
Get a Quote!
- Pricing per user for quantities 101-250
Get a Quote!
- Pricing per user for quantities 251-500
Get a Quote!
- Pricing per user for quantities 501-1,000
Get a Quote!
- Pricing per user for quantities 25-100
Get a Quote!
- Pricing per user for quantities 101-250
Get a Quote!
- Pricing per user for quantities 251-500
Get a Quote!
- Pricing per user for quantities 501-1,000
Get a Quote!