Forcepoint’s “Dynamic User Protection” a real-time threat detection cloud-native approach

0
805

Forcepoint, an American multinational corporation software company, is a part of Raytheon Technologies that develops computer security software and data protection, cloud access security broker, firewall, and cross-domain solutions. They deliver modern cybersecurity by proactively safeguarding critical data and IP. Their Mission is to foster safe and trusting environments through a joined platform that understands digital identities and their cyber behaviors to protect employees and critical data everywhere.

Forcepoint unveiled the industry’s first cloud-native user activity and insider threat monitoring solution that is delivered as a service. Forcepoint’s new software-as-a-service (SaaS) solution, Dynamic User Protection, is the outcome of ensuring user activity monitoring (UAM) and inside threat detection to the cloud without any policy configuration required, security teams can gain real-time visibility to malicious users in hybrid cloud environments.

With Dynamic User Protection, Forcepoint is fluctuating the rules of the cybersecurity by providing global enterprises with the ability to automatically apply security the policy across all control points where there is a risk.

Dynamic User Protection offers easy user activity monitoring and also allows enterprise access in continuous risk assessment across security control points along with ‘risk scores’ to assist with risk assessment. The new innovation is fast and easy to deploy with a small 30MB footprint on the endpoint that installs in under 30 seconds with no reboot required.

Key  Features of Dynamic User Protection :

Autopilot: It offers a  pre-configured user risk assessment that continuously collects, enriches and correlates events on the endpoint in order to detect anomalous behavior

Variance Detection:  With sets of observed data it establishes an entity’s baseline activity for specific applications and actions and, identify observed data with the anomaly detection engine.

De-centralized Analytics: Compare a centralized approach with traditional UAM/Insider Threat solutions

 Risk Calculation: Observe continuous entity activity and risk assessment  impact generates a dynamic risk score that goes up and down based on the level of risk

Enforce Risk-Adaptive Policy: Based on the risk score, risk-adaptive DLP policies automate security response based on the level of risk.

Therefore, Forcepoint’s new approach is the next phase of cybersecurity requirements in risk management across the cloud, network, and ensure an error-free environment for employees and organizations.