Contact Us

1 (800) 723-1166 |

All Blogs

When it comes to cross-platform backdoors, Adwind is arguably the most popular and documented remote access tool (RAT) out there. However in the last two years, an underground group calling themselves ‘QUA R&D’ have been busy developing and improving a similar Malware-as-a-Service (MaaS) platform to the point that they have now become a major competitor to Adwind. In fact, QUA R&D's RAT – sold under the name ‘Qrypter’ – is often mistaken by the security community as... Read More

How can we get better at identifying digital breadcrumbs that can be tracked and used predictively to protect workplaces in particular? And what are the implications for employees and employers as we navigate this new world? These were some of the questions that yesterday's panel, "Breadcrumbs & Badges: Hacking Workplace Violence" attempted to tackle.

Sharing the podium at Austin's SXSW conference were Forcepoint CEO Matt Moynahan, privacy and data security legal... Read More

We are delighted to announce that Forcepoint has received an AICPA SOC Type 2 report to add further depth to its Cloud Trust Program. AICPA (The Association of International Certified Professional Accountants) SOC standards establish the framework for examining controls at a service organization: SOC 1 reports focus on financial reporting, while SOC 2 and 3 reports focus on nonfinancial reporting controls relating to security, availability, processing integrity, confidentially, and privacy... Read More

The year 2018 will go down in history as when legislators got serious about data protection – worldwide.

We’re now just three months out from the EU’s General Data Protection Regulation (GDPR) coming into effect. It’s safe to say that this law will have global impact. No matter where a business is located, if it collects or processes EU resident records, it will need to comply with GDPR.

As the capacity to collect, store and analyse data for commercial purposes continue... Read More

Increased calls for IT modernization, cloud and mobility have driven information technology to an inflection point and security architectures to a breaking point. Today, this is top-of-mind within the US Federal Government as Government Agencies work to transform and modernize their infrastructure, technology, approaches, and methods.

The Continuous Diagnostics and Mitigation (CDM) program was established by the Department of Homeland Security (DHS) to assist Agencies with this... Read More

Network firewalls play a critical role in today’s enterprise. They are the linchpins that enable people to connect – safely – from corporate networks to websites and applications anywhere on the Internet. “Next generation” firewalls (or NGFWs) were initially created to provide more visibility into this most fundamental action, but most have only scratched the service.

All enterprise-grade firewalls emit raw data about what’s happening and provide a little bit of information about... Read More

The art of managing risk today is about making the invisible, visible. Today, Forcepoint announced fortifications to our Human Point System capabilities with deeper control and visibility into user identity, activity and intent across cloud deployments, cloud apps, remote locations and complex distributed networks. Visibility is especially important as more organizations rely more on cloud applications to power their productivity. It is estimated that the average enterprise today has over... Read More

It’s no accident that Forcepoint has chosen Austin, Texas as its headquarters. Consistently ranked as one of the best cities to live in in the United States, Austin is infused with a thriving startup tech scene, cross-pollinated with celebrated fine arts, restaurants and music, and has been made famous in part by festivals like Austin City Limits and South by Southwest (SXSW). In short, we’re proud to call this city our home.

Once primarily a music festival, the... Read More

Digital transformation has driven unprecedented connectivity throughout government agencies. Users want to work in dynamic applications that might reside on premises, in the cloud or in a hybrid environment. They also expect to access data, including Controlled Unclassified Information (CUI), from anywhere – and from any type of device.

These trends have presented many challenges in securing and protecting information. Perhaps nowhere is this more evident than within the US... Read More

It’s been a while since we carved out some time to talk about DLP. At Forcepoint, we couldn’t be more excited about this product category and given how our growth has far outpaced analyst forecasts, we believe that you are too! Forcepoint DLP has evolved over time to provide our customers protection across the multiples channels where data exists – whether that’s happening at the endpoint or over the network across web and email channels.  Organizations can only protect their data if they... Read More