APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Gov and Public
    • Forcepoint
    Next

    Forcepoint: Redefined Operational Infrastructure Security

    Follow Forcepoint on :

    Matthew P. Moynahan, CEO, ForcepointMatthew P. Moynahan, CEO
    Organizations that consume high volumes of data and subsequently perform value-enticing analytics are steadily growing in the fast-paced modern day world. However, a question being asked by firms, both, in the government and public sectors is on security protocols utilized to protect sensitive information. One such company that has come forward to answer all queries about the safety of consumer data is Forcepoint. A software development and deployment company, Forcepoint leverages best-in-class cybersecurity products that seamlessly integrate with existing system networks at firms. The software solutions offer web security, next-generation firewalls, prevention of data loss, protection of intellectual property, and more. The team at Forcepoint believes the sheer number of people interacting with data and technology will lead to all-time highs in cyber risk activity, and to mitigate these issues the firm deploys adaptive platforms, and provide seamless shielding of attack surfaces.

    In the present cyberspace, hackers are getting more tech-savvy, and are deploying the same technology that is being used against them, an issue that has demanded cyber protection experts to research and develop platforms and engines that are unbreakable. Forcepoint deploys security solutions that offer clients extended protection to prevent data loss, advanced malware detection, and makes all management-based data available on a dashboard.

    ACE is Forcepoint’s primary cybersecurity solution, and acts as the top layer for all of their solutions


    A unique feature offered by the company is license mobility across various deployment structures, allowing organizations the freedom to upscale business operations by deploying Forcepoint’s solutions that they have procured across all facilities. The web security platforms are provided as both on-premise and cloud solutions.

    The two products that are at the forefront of programs deployed by Forcepoint are ACE and ThreatSeeker Intelligence. The former is capable of providing real-time protection of web, email data, and mobile security by scoring risks to provide the most effective protection available. The solution also protects against theft of intellectual property by checking inward and outward data-traffic and brings in industry-leading information-aware defenses. ACE is Forcepoint’s primary cybersecurity solution and acts as the top layer for all of their solutions. ThreatSeeker Intelligence allows organizations access to all the core security information across all of Forcepoint’s security products. It ties 900 million endpoints from reliable data sources, and with Forcepoint ACE security defenses, analyzes up to five billion requests daily. This extensive knowledge of security attacks enables ThreatSeeker Intelligence to offer real-time security updates that block advanced threats, malware, and phishing attacks. On the cloud services front, it prohibits the use of unsanctioned applications allowing the utilization of only those deemed as industry-safe.

    After winning multiple awards and accolades across various sectors in the online protection realm, Forcepoint remains humble while delivering its solutions to clients. Most recently, the company announced the signing of a five-year blanket purchase agreement with the Federal Bureau of Investigation that will streamline the acquisition and delivery of latest cybersecurity and cross-domain solutions capabilities. Forcepoint’s portfolio will bolster FBI Enterprise and Mission objectives to include increased infrastructure efficiency, adoption of cloud-based cybersecurity, and the ability to plan multi year cyber sequencing plans.
    Next
    Share this Article:
    Tweet

    Forcepoint Info

    Company
    Forcepoint

    Headquarters
    .

    Management
    Matthew P. Moynahan, CEO

    Description
    Creates and supplies industry standard cybersecurity products that offer organizations in the government and public sector have superior visibility and agile resistance against all types of cyber crimes

    2019

    Forcepoint News

    Forcepoint to Expand Cybersecurity and Cross Domain Technology Support with the FBI

    AUSTIN, Texas: Global cybersecurity leader Forcepoint today announced the award of a 5-year Blanket Purchase Agreement (BPA) with the Federal Bureau of Investigation (FBI) which will greatly streamline acquisition and delivery of new Cybersecurity and Cross Domain Solutions capabilities.

    The contract establishes a base, plus four option year agreement with an estimated purchase volume of ...  $23.5 million. Forcepoint's full portfolio of integrated, behavioral-based cybersecurity and cross domain solutions (software, hardware and professional services) is available through the agreement.

    The Forcepoint portfolio supports FBI Enterprise and Mission objectives to include: increased infrastructure efficiency, examination of emerging cyber technologies, adoption of cloud-based cybersecurity, cross domain technologies, and the ability to plan multi-year cyber sequencing plans.

    "The BPA between the FBI and Forcepoint will foster even greater collaboration between the government and industry," said Sean Berg, senior vice president and general manager for Global Governments and Critical Infrastructure at Forcepoint. "This collaboration will greatly increase delivery and deployment timelines to ensure the high-security posture of the FBI."
      Read more

    Forcepoint introduces Converged Cybersecurity Solutions, Partner Ecosystem

    Forcepoint has launched Forcepoint Converged Security Platform which accelerates enterprise and government agencies’ digital transformation journey by enabling secure migration of data, applications, and business operations to the cloud. Through the new converged security platform, Forcepoint is addressing CISOs business-critical need today for consolidated, cloud-based security solutions in a de... eployment agnostic delivery model.

    The first solution available on the new platform, Forcepoint Dynamic Edge Protection, will enable enterprises to transform their network and security architectures with seamless connectivity to take full advantage of the cloud across distributed application and network environments. Leveraging the converged security platform’s integration capabilities, Forcepoint also announced strategic investments in a new technology partner ecosystem. These partnerships will deliver customers integrated solutions that extend Forcepoint’s risk-adaptive protection across existing security infrastructure, including cloud, identity, network, and endpoint.

    Today’s announcement is the next phase in the company’s commitment to transform the fundamental approach to cybersecurity by understanding the behavior of users as they interact with critical data and intellectual property across global IT systems. This enables customers to take advantage of dynamic one-to-one security controls applied to individuals based on the risk their digital activity presents to the organization. This ensures security operations are more effective and more efficient. And, with the new converged security platform, CISOs can now define, enforce and monitor policies consistently across the security stack in one place—eliminating the gaps and redundancies of managing point products.

    “Behavior-based cybersecurity is tailor-made for the era of mobility and cloud because it enables enterprises to detect and respond faster to risk than legacy paradigms that focus only on protecting infrastructure,” said Matt Moynahan, CEO, Forcepoint. “Forcepoint’s human-centric approach to security enables our customers to protect their people and critical data against the most sophisticated attackers, while freeing them to conduct their business or mission in the most efficient and agile way possible.”

    Forcepoint is strategically investing in the creation of a human-centric technology partner ecosystem that enables customers to achieve their digital transformation outcomes. Forcepoint’s global technology and strategic alliances span areas including public cloud, data classification, identity and access management. As well as identity-as-a-service tools, collaboration, HR, IT service management, workflows, incident response and other mission-critical business applications.

    Through its partner ecosystem, Forcepoint enables customers to simplify collaboration between vendors to create an integrated security stack. The ecosystem enriches and expands the Forcepoint Converged Security Platform’s understanding of the behavior of digital identities, and also extends risk-adaptive protection to existing security infrastructure. Inaugural technology alliances include AWS, IBM Security, Microsoft, Citrix, Boldon James, Ping Identity, Seclore and more.
      Read more

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    CIO Speaks

    Previous Next
    Cloud Computing: Pharma Takes the Plunge

    Andy Newsom, SVP & CIO, CSL Behring

    WiFi 6, 5G and the Internet of Things (IoT)

    Mark Badal, CIO, IT&E

    In Augmented Reality, Size Matters

    Jason Blackman, CIO, Carsales.Com

    Enhancing Customers

    Marc A. Hamer, VP & CIO, Babcock & Wilcox Enterprises, Inc.

    Cloud or On-Premise? When Would The Question End?

    Kevin Soh, CIO and Director, e-Strategies, BH Global Corporation

    Responsible AI: The Human-Machine Symbiosis

    Sal Cucchiara, CIO & Head Of Wealth Management Technology, Morgan Stanley

    Asian Development Bank: Using Emerging Digital Technologies for the Common Good

    Shirin Hamid, CIO, & CTO, Asian Development Bank

    Diversity and Inclusion can Drive Better Solutions for Clients and Employee Engagement

    Linda K. Lannen, CIO & Sr. VP, Kleinfelder

    Cyber Security - Integrated enterprise approach required to address the multifaceted challenges

    Sumit Puri, CIO, Max Healthcare

    The Great Tech Arms Race: How Changing Consumer Behaviour and Expectation is Driving Ecommerce Transformation

    Brett Raven, CIO, Big Red Group

    Relying On Technologies To Transform Data Into Information

    Mark Ohlund, CIO & Sr. V.P., Armada Supply Chain Solution

    3D Printing Requires Wildly Different Thinking

    James MacLennan, SVP & CIO, IDEX Corporation

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://www.apacciooutlook.com/forcepoint