Best IT Security Software for Forcepoint ONE

Compare the Top IT Security Software that integrates with Forcepoint ONE as of November 2024

This a list of IT Security software that integrates with Forcepoint ONE. Use the filters on the left to add additional filters for products that have integrations with Forcepoint ONE. View the products that work with Forcepoint ONE in the table below.

What is IT Security Software for Forcepoint ONE?

IT security software helps protect networks, systems, and data from malicious attacks and other cyber threats. It can be used to monitor and detect suspicious activities, as well as to prevent unauthorized access to data and resources. IT security software can also be used to detect and respond to security incidents in a timely manner. Compare and read user reviews of the best IT Security software for Forcepoint ONE currently available using the table below. This list is updated regularly.

  • 1
    Forcepoint NGFW
    The Forcepoint Next Generation Firewall has multiple layers of defenses that protect your network, your endpoints, and your users against modern, advanced threats. Ability to manage large quantities of firewalls and fleets of firewalls at scale without compromising performance. Ease of management, the granularity of controls, and scalability of management capabilities. Assessed block rate, IP Packet Fragmentation/TCP Segmentation, false-positive testing, stability, and reliability. Assessed ability to protect against evasions, HTTP evasions, and a combination of evasion techniques. Designed like software, rather than hardware, NGFW gives you the flexibility to deploy on hardware, virtually or in the cloud. Open API's let you customize automation and orchestrations to your own specifications. Our products routinely undergo rigorous certification testing to meet the most stringent needs of sensitive and critical industries, agencies, organizations and governments around the world.
  • 2
    Axonius

    Axonius

    Axonius

    Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action.
  • 3
    Forcepoint Secure Web Gateway
    Proactively secure the web with advanced, real-time threat defenses—full content inspection and in-line security scanning help mitigate risk and protect against malware. The convenience of securing your global workforce with a single endpoint for Web Security, DLP, CASB, and NGFW with flexible connectivity and traffic redirection options. Deploy how, when and where you want. On-premises, hybrid and cloud deployment architectures so you can go to the cloud at your own pace. Behavioral analytics and inline capabilities secure your policies and data across the world. Consistent policies with robust access control for all your sites, cloud apps, and users both on and off the corporate network. Keep users safe from malicious threats, including zero-day threats. Protect against zero-day threats with real-time threat intelligence and remote browser isolation, and provide deep content inspection for encrypted and unencrypted traffic to detect evolving threats across the entire kill chain.
  • 4
    GigaSECURE

    GigaSECURE

    Gigamon

    The GigaSECURE® Security Delivery Platform is a next-generation network packet broker focused on threat prevention, detection, prediction and containment. The right tools get the right traffic at the right time, every time. Enable network security tools to keep up with increasing network speed. Gain insight into network traffic. Optimize and deliver relevant data for tool consumption. Reduce tool sprawl and lower costs. Efficient prevention coupled with rapid detection and containment improves your overall security posture. Threats don't stand a chance. GigaSECURE enables security teams to obtain broad access to and control of network data, no matter where it resides. It can be customized to extract specific application sessions, metadata and decrypted traffic. In this architecture, security tools can operate inline or out-of-band at peak performance without compromising network resiliency or speed.
  • 5
    PC Matic

    PC Matic

    PC Matic

    PC Matic Pro's application whitelisting is a critical preventative layer of cyber-protection that resides on top of other endpoint security solutions. zero trust whitelisting solutions prevent hacking and cyber-attacks. Block all malware, ransomware, and malicious scripts from executing. Protect your business data, users, and network with our whitelist cybersecurity solution. PC Matic Pro represents a long overdue shift in the cybersecurity industry to absolute prevention. Today's threats to critical infrastructure, industry, and all levels of government demand nothing less. PC Matic Pro provides a patented default-deny security layer at the device that blocks all unknown executions without introducing headaches for IT. Unlike traditional security solutions, customer infections aren’t required to strengthen the whitelist architecture. Local overrides can be added after prevention with a focus on accuracy and without concern for responding to an already active infection.
    Starting Price: $50 per year
  • 6
    Forcepoint DLP

    Forcepoint DLP

    Forcepoint

    Data protection does not have to get in the way of business productivity. Forcepoint’s focus on unified policies, user risk, and automation makes data security frictionless and intuitive. View and control all of your data with the industry's largest pre-defined policy library. Ensure regulatory compliance across 80+ countries for GDPR, CCPA and more. Deploy data classification with Boldon James and Azure Information Protection. Replace broad, sweeping rules with individualized, adaptive data security that doesn’t slow down your employees. Block actions only where you need to, and drive productivity. Protect PII and PHI, company financials, trade secrets, credit card data, and other pieces of sensitive customer data-even in images. Follow intellectual property (IP) in both structured and unstructured forms, and stop low & slow data theft even when user devices are off-network.
  • 7
    Forcepoint CASB
    Give your company the full potential of the cloud. But don't let it cost you the control of your data. Now a Cloud Access Security Broker solution can support any cloud app, managed or unmanaged, securely. Forcepoint CASB works with IdP like Ping and Okta. Segments you’ve already built can be re-used with CASB. Don’t have IdP yet? CASB works like an IdP allowing your team to easily add apps and control individual access to apps. The simple interface is easy for employees to use too. Shadow IT puts data outside of your control. Quickly identify managed and unmanaged cloud apps in real-time using your web proxy and firewall logs. Detect stolen credentials sooner with a patent-pending Zero Trust Impossible Travel which shows individual device method, location, and time of day. Data moves up to the cloud, down from it, and from cloud to cloud. Protect data in motion or at rest. Block data in transit, encrypt or mask it, redact it, or watermark it to track sensitive data.
  • 8
    Forcepoint URL Filtering
    Forcepoint URL Filtering is the industry’s most effective, continually up-to-date web filtering solution. Powered by our ThreatSeeker Intelligence, Forcepoint URL Filtering collects and analyzes up to 5 billion incidents every day (from over 155 countries), producing updated threat analytics for Forcepoint solutions at up to 3.2 updates per second. Forcepoint URL Filtering blocks web threats to reduce malware infections, decrease help desk incidents and provide relief to valuable IT resources. Forcepoint URL Filtering is an easy-to-deploy, transparent filter and security solution that avoids the complexity of a proxy gateway. It’s equipped with more than 120 security and web filtering categories, hundreds of web application and protocol controls, and 60-plus reports with customization and role-based access. Identify threats with over 10,000 analytics, machine learning and other advanced techniques maintained through real-time global threat intelligence with Forcepoint Web Security.
  • 9
    ConnectProtect Managed Detection and Response
    Choosing to outsource SIEM and SOC services to ConnectProtect® MDR enables your organisation to take advantage of SIEM and an experienced SOC to quickly provide your organisation with the knowledge and skills to reduce risk and effectively combat cyber threats. Through a combination of state-of-the-art technology and genuine human insight, you can get skilled security expertise at the turn of a key. Our simple and rapid onboarding process enables you to start realising value with minimal impact on your internal IT/Security teams. 24x7x365 monitoring of your secure access layers to help address the gap between automation and user awareness and alert you when something does slip through. We'll give you the management information (MI) to give you the confidence that things are working and improving. Let us help you embrace the benefits of ConnectProtect® Managed Detection and Response.
  • 10
    The Respond Analyst
    Accelerate investigations and improve analyst productivity with a XDR Cybersecurity Solution. The Respond Analyst™, an XDR Engine, automates the discovery of security incidents by turning resource-intensive monitoring and initial analysis into thorough and consistent investigations. Unlike other XDR solutions, the Respond Analyst connects disparate evidence using probabilistic mathematics and integrated reasoning to determine the likelihood that events are malicious and actionable. The Respond Analyst augments security operations teams by significantly reducing the need to chase false positives resulting in more time for threat hunting. The Respond Analyst allows you to choose best-of-breed controls to modernize your sensor grid. The Respond Analyst integrates with the leading security vendor offerings across important categories such as EDR, IPS, Web Filtering, EPP, Vulnerability Scanning, Authentication, and more.
  • 11
    Securonix Security Operations and Analytics
    The Securonix Security Operations and Analytics Platform combines log management; user and entity behavior analytics (UEBA); next-generation security information and event management (SIEM); network detection and response (NDR); and security orchestration, automation and response (SOAR) into a complete, end-to-end security operations platform. The Securonix platform delivers unlimited scale, powered by advanced analytics, behavior detection, threat modeling, and machine learning. It increases your security through improved visibility, actionability, and security posture, while reducing management and analyst burden. With native support for thousands of third-party vendors and technology solutions, the Securonix platform simplifies security operations, events, escalations, and remediations. It easily scales from startups to global enterprises while providing the same fast security ROI and ongoing transparent and predictable cost.
  • 12
    Forcepoint Behavioral Analytics
    Visibility, analytics, and automated control - converged into a single solution. Eliminate complexity for security analysts with UEBA's automated policy enforcement and comprehensive user risk scoring. Combine DLP with behavioral analytics to gain a 360 degree view of intent and user actions across the enterprise. Leverage out-of-the-box analytics or customize risk models to fit your unique organizational needs. Quickly uncover risk trends in your organization with an at-a-glance view of users ranked by risk. Leverage entire IT ecosystem, including unstructured data sources like chat, for a complete view of users interacting across the enterprise. Understand user intent through deep context driven by big data analytics and machine learning. Unlike traditional UEBA, you can take action on insights to stop breaches ahead of loss. Safeguard your people and your data from insider threats with fast detection and mitigation.
  • 13
    Forcepoint SimShield
    Secure data transfer for training and testing environments. Included on the U.S. NCDSMO Baseline for SABI environments (since 2009) with native support for DIS, HLA, TENA, RTP and MPEG2-TS, and meets NSA Raise the Bar and NIST guidelines. Evaluated by the High Performance Computing Modernization Program Office (HPCMPO) for connection to Defense Research & Engineering Network (DREN) and Secure Defense Research & Engineering Network (SDREN). SimShield enables fully automated, predictable, controlled, and audited two-way communication and sanitization of events across segmented, air-gapped security domains. Always have the latest features without additional cost, vs. Government-Off-The-Shelf (GOTS) solutions. Train multiple national agencies or coalition forces at the same time in a single, real-world environment. Sanitized information sharing for faster detection and correction of issues and errors during Research, Development, Test & Evaluation (RDT&E).
  • 14
    Cysiv

    Cysiv

    Cysiv

    Cysiv’s next-gen, co-managed SIEM addresses the limitations and frustrations associated with traditional SIEMs and other products used in a SOC. Our cloud-native platform automates and improves critical processes for truly effective threat detection, hunting, investigation and response. Cysiv Command combines essential technologies for a modern SOC into a comprehensive, unified, cloud-native platform and is the foundation for SOC-as-a-Service. Most telemetry can be pulled from APIs or sent securely to Cysiv Command over the internet. For older sources, such as logs over Syslog UDP, Cysiv Connector provides an encrypted conduit for passing all required telemetry from your environment to the Cysiv platform. Cysiv’s threat detection engine applies a blend of detection techniques that leverage signatures, threat intelligence, user behavior, statistics, and machine learning to automatically identify potential threats and ensures analysts focus on the most critical detections first.
  • 15
    Proofpoint Intelligent Classification and Protection
    Augment your cross-channel DLP with AI-powered classification. Proofpoint Intelligent Classification and Protection is an AI-powered approach to classifying your business-critical data. It recommends actions based on risk accelerating your enterprise DLP program. Our Intelligent Classification and Protection solution helps you understand your unstructured data in a fraction of the time required by legacy approaches. It categorizes a sample of your files using a pre-trained AI-model. And it does this across file repositories both in the cloud and on-premises. With our two-dimensional classification, you get the business context and confidentiality level you need to better protect your data in today’s hybrid world.
  • 16
    SecBI XDR
    Your cyber defense is filled with disparate point solutions covering single vectors making easy targets for hackers. But that can end today. Add the glue to connect and integrate your security tools with the SecBI XDR Platform. SecBI XDR applies behavioral analytics on all data sources: security gateways, end points and cloud under a single pane of glass for continuous, automated and smarter threat detection, investigation and response. Work across the network, endpoints and the cloud to head off the stealthy, low & slow cyberattacks with SecBI’s XDR platform. Benefit from rapidly deployed, orchestrated integration of your siloed cyber solutions (mail and web gateways, EDRs, SIEM, SOAR) by responding and blocking the threats faster across a wider range of vectors. Gain full network visibility, automated threat hunting, and multi-source detection uncovering malware such as file-less and BIOS-level viruses.
  • Previous
  • You're on page 1
  • Next