Force Point - Triton Ap Data & Triton Ap Endpoint

Force Point - Triton Ap Data & Triton Ap Endpoint

UNRIVALED VISIBILITY AND CONTROL OVER YOUR CRITICAL DATA WHEREVER IT IS – IN THE OFFICE, ON THE ROAD OR IN THE CLOUD

Your critical data is mobile, stored and accessed in cloud services like Office 365 and Box to encourage collaboration around the world. TRITON® AP-DATA is an industry leading DLP solution with the visibility and control to protect your data, whether it’s stored and accessed on mobile devices such Windows and Apple laptops or shared via email and IM.
Protect your sensitive data wherever it lives – on endpoints, in the Cloud or on-premises with TRITON AP-DATA. Forcepoint DLP Empowers Your Organization
• Quickly address global and industry-specific regulatory compliance requirements with pre-defined policies that are maintained and updated by Forcepoint’s dedicated research team
• Leverage data classification tools to identify and protect your intellectual property no matter where it is stored
• Behavioral policies combine content and context awareness to automatically identify high risk behavior by users, such as forwarding emails to personal accounts or packaging data using encryption for exfiltration purposes
• Easily find and secure files stored on Mac, Windows, and Linux endpoint devices
• Identify and prevent data loss within cloud services like Office 365 and Box
• Implement effective role-based access controls and comprehensive auditing to meet internal and external compliance requirements
• Seamlessly integrate with third party data security solutions from Microsoft, HP, Splunk, IBM, Titus, Boldon James and Citrix
• Incident Risk Ranking uses advanced data analytics to provide your security operations team with a stack ranked report on the top data security risks within your organization
• Integrated OCR identifies sensitive data and IP markers within images such as CAD designs, scanned documents, MRI’s and screen shots
• Drip DLP considers cumulative data transmission activity over time to discover small amounts of data leakage
• Behavioral-based policies combine content and context awareness to automatically identify when sensitive data is being put at risk by users
• Our unique PreciseID Fingerprinting can detect a partial fingerprint of structured (database records) or unstructured data (documents) on Mac and Windows endpoints – whether an employee is working in the office or off the network
• Automatically encrypt data being transferred onto removable storage devices to enable secure data sharing with partners
• Email-based incident workflow makes it easy to distribute an incident for review and remediation to data owners and business stakeholders without having to provide access to the DLP management system
• Detect and prevent sensitive data being sent out of the organization via email, web uploads, IM and cloud service clients
- includes Native SSL decryption for both network traffic and on the endpoint
• Deploy DLP Components in Microsoft to apply DLP policies in Microsoft Office 365
• DLP analytics that use data modeling and statistical analysis to automatically identify user behavior presenting the highest risk of data loss or theft, allowing your security operations team to leverage Forcepoint’s research expertise
• Forcepoint’s TRITON architecture lets you unify your security solutions, coordinate defense policies, shares intelligence along multiple points and enjoy centralized management of your data security