» CYBERSECURITY continuously updated behaviour risk score. 3. Protection and Control: Enterprises will be able to automatically enforce policies and protect against credential miss use and malicious insider acts. This will enable identification of user activities on unmanaged devices accessing unsanctioned cloud applications, which is a hot bed for risk. How is your Continuous Zero Trust security different from a traditional approach to zero trust security? Zero Trust is one of the hottest topics in cybersecurity. Forrester predicts that Zero Trust architectures will grow 200% in 2021. Forcepoint combines the best of both worlds by putting SASE and Zero Trust together to create the Zero Trust Network Access (ZTNA) - a cloud-based architecture for more efficiently and more securely protecting people and data no matter where they are. Delivered as a cloud-based service such as Forcepoint’s Private Access, ZTNA systems tailor each user’s access to just the specific applications they need. Everything else on the internal network remains hidden. This approach makes it possible for networking teams to provide remote access to line-of-business applications while security teams retain the visibility and control, they need to keep the enterprise safe.
Francisco Partners completes acquisition of Forcepoint Francisco Partners, a leading global investment firm that specializes in partnering with technology and technology-enabled businesses, has closed on the previously announced acquisition of Forcepoint from Raytheon Technologies. Forcepoint is a leading provider of cybersecurity solutions that protects the critical data and networks of thousands of customers throughout the world. Coinciding with the transaction close, the company’s board of directors has appointed Manny Rivelo as
Discuss key details of the insider threat management program? Unfortunately, malicious outsiders aren’t the only ones organizations should be on the lookout for. The truth remains that people are the largest threat in any business. According to Varonis, a third of all data breaches in 2018 involved internal actors, and In 2019, on average, every employee had access to 17 million files and 1.21 million folders.
Chief Executive Officer (CEO) effective immediately.
Traditional insider threat solutions were designed for the traditional infrastructure-centric security. A combination of SASE and Zero Trust provides the security team with the ability to respond to insider risks in real time, achieved by feeding further user activity signals from endpoint monitoring and access control systems, along with the signals from the SASE environment, into the insider threat analytics.
quires tight integration of capabilities that cross tradi-
Discuss your focus in the Middle East region and the company’s growth/ performance regionally last year? The Middle East remains an important market for Forcepoint. The region is one of the highest growing regions globally due to its focus on digitalization, even prior to the pandemic. Forcepoint has registered double digits growth in the market and will continue to invest in the region. We are serving customer demand as a trusted adviser for leading cybersecurity solutions in the region. The pandemic meant that customers needed to pivot to remote working and we were privileged to be able to support them with their network security (SD-WAN, VPN, NGFW) as well as data security needs (CASB, DLP) during this difficult time. Looking ahead, we see more positive outlook for customers and prospects as digital transformation continues apace. We expect to see growth in many industries, particularly but not limited to healthcare ,Government, financial services, infrastructure, telecoms, business services.
22
CXO DX / FEBRUARY 2021
As CEO, Rivelo will focus the company’s strategy on accelerating enterprise and government agency adoption of a modern approach to security that embraces the emerging Secure Access Service Edge (SASE) architecture. Forcepoint’s SASE approach recognizes solving today’s most pressing security problems retional product boundaries. It is cloud-native, end-user aware and powered by a converged security platform, and available today through Forcepoint Cloud Security Gateway and Private Access. “Cybersecurity has never been more important for businesses and governments around the world. As we continue to see broad-scale global attacks, the cybersecurity industry needs to evolve to deliver security capabilities to match those of today’s sophisticated threat actors. Likewise, every organization today needs to evolve its security posture to holistically integrate cybersecurity across the entirety of its business operations and culture. It can no longer be viewed as ‘just an IT issue’,” said Rivelo. “I look forward to solidifying Forcepoint’s leadership position as the global cybersecurity partner of choice for enterprises and government agencies.”