Forcepoint ONE CASB Datasheet
Forcepoint ONE CASB Datasheet
Forcepoint ONE
The Forcepoint ONE Cloud Access Security Broker (CASB) is one of the three
foundational gateways of the Forcepoint ONE all-in-one cloud platform. It
controls access to managed SaaS applications and shadow IT applications
while providing Data Loss Prevention (DLP) and malware protection.
forcepoint.com
Proxy Policies Within a single proxy policy, the download DLP policies let you
Access control options and associated DLP and malware control download of both sensitive data and malware, while
scanning options for data in motion to and from managed the upload DLP policies let you control upload of sensitive data
SaaS applications are set in proxy policies. These let and malware. Simply use dropdown menus to specify a data
administrators set access to managed SaaS app as direct app pattern to match, a file action, and watermark/tracking control,
access, deny, or secure app access (all traffic passes through and click the checkbox if you want people to be notified about
the reverse proxy with the option of enforcing DLP and the match.
malware scanning). Criteria for policy enforcement include
user group, access method (browser, non-browser client app, Forcepoint ONE includes over 100 predefined data patterns
or any), device OS, device profile, and location. that help you enforce regional and industry standards
regarding PII, PHI, and personal financial data. There are
also two reserved data patterns for invoking malware
scanning powered by CrowdStrike or Bitdefender. You can
also create custom data patterns that use simple regular
expression up through complex Boolean expressions, and
special data patterns for identifying records. The special match
patterns include database matching (using exact match),
similarity to a standard form (using file fingerprinting), and any
HTTP/S request method (using Field Programmable SASE
Figure 2: List of proxy policies for a managed SaaS app
Logic – FPSL).
A single app can have a list of multiple proxy policies that are For download proxy policies, file actions are encrypt, block
evaluated sequentially until a policy is found where all of the (replace contents with block message), deny (do not transfer),
match criteria in the policy match the connection request. apply DRM, and watermark and track.
Then the appropriate enforcement action is applied.
For upload proxy policies, file actions are encrypt (for Office
When secure app access is specified, a single proxy policy 365, Google Workspace, and Salesforce), block (replace
may include a list of DLP and malware scanning polices for contents with block message), deny (do not transfer), mask
upload to the SaaS app, and another list for download from the data (Salesforce Chatter, O365 Teams, and Slack), and
SaaS app. In addition, if a managed SaaS app has field level watermark and track.
encryption enabled, the proxy policy lets you specify whether
a field is displayed unencrypted based on the field security Field-Level Encryption
level or whether the user location matches the data creation Agentless reverse proxy mode lets you encrypt structured data
location. This supports data privacy and data sovereignty. in many popular SaaS apps with support for full AES 256-bit
encryption or tokenization, a built-in keystore or your own
Key Management Interoperability Protocol (KMIP) keystore,
and vaultless encryption and tokenization. You can also
specify security levels for each field to control when the field is
decrypted for the user.
2
Shadow IT Reports The proxy dashboard includes statistics on sensitive data
The agentless reverse proxy mode supports shadow IT movement, malware events, and top upload and download
reporting. Shadow IT usage is collected from the log data DLP match patterns.
from corporate firewalls and proxy servers, either by manual
import or through a Forcepoint ONE syslog collector. Reports
show application distribution by trust rating, as calculated by
Forcepoint ONE, and top accessed applications with drill
down to individual applications and individual source IP
addresses, helping you understand your organizations, risk
posture relative to web traffic. The Forcepoint ONE CASB can
also let you control shadow IT traffic in forward proxy mode
(see below).
3
Forward Proxy Mode API Policies
Forward proxy mode uses the Forcepoint ONE unified agent API policies control scanning data rest in IaaS and SaaS. Like
for Windows or MacOS. All managed SaaS traffic still passes proxy policies, several API policies can be applied to a single
through the Forcepoint ONE reverse proxy but without the SaaS app and are evaluated sequentially
need for URL rewriting to connect with the user device.
Forward proxy mode supports all of the features of the
agentless reverse proxy mode, including enforcing DLP and
malware scanning through proxy policies, but it also supports
use of non-browser clients, such as the Microsoft Outlook
client and the Slack client. In addition, forward proxy mode
supports shadow IT control.
Shadow IT Control
Figure 10: List of API policies.
Shadow IT control lets you control access to any shadow IT
app using proxy policies which are evaluated in sequence
like managed SaaS proxy policies. However, proxy policies for Within a policy, you can specify match criteria based on user
shadow IT apps do not enforce DLP and malware scanning for group, DLP data pattern, file path, file name, sharing status
upload and download. Instead, they are limited to the following (external, internal, public, or any), file size, owner, shared with
connection control options: render the app in read-only mode, username, create date, and modified date. The data match
coach (display a recommendation for a company sanctioned patterns used in an API policy can be any of the custom or
alternative app and either allow or deny access to the original predefined match patterns shared across the proxy policies
shadow IT app), or deny access without a coaching message. and SWG content policies, letting you have unified control of
sensitive data and malware.
4
CASB Third-Party Integrations Forcepoint ONE Platform Features
The Forcepoint ONE CASB additionally can be configured to The Forcepoint ONE CASB additionally supports these
integrate with various other data security systems as outlined features built into to the Forcepoint ONE platform:
below.
→ Platform-level contextual access control.
→ Security Information and Event Management (SIEM). Users cannot be granted access to any of the three
Forcepoint ONE integrates with any system that supports foundational gateways unless they are authenticated
syslog. This allows third party apps to upload logs from according Forcepoint ONE login policies that factor in
Forcepoint ONE for visualization and analysis. user location, device type, device posture, user behavior,
and user group. When user login through a new device is
→ On-premises DLP Systems. Forcepoint ONE integrates
detected, or “impossible travel” travel based on client IP
with any on-premises DLP system that supports the
address is detected, the user can be presented a muti-
Internet Content Adaptation Protocol (ICAP). This
function authentication (MFA) challenge to prevent use of
provides customers the ability to send files at rest in
stolen credentials.
managed SaaS or IaaS cloud storage, that are flagged
by Forcepoint ONE as having sensitive data, to the on- → Unified management console for configuration,
premises DLP system using TLS encryption. The files are monitoring, and reporting for SWG, CASB, and ZTNA. Lets
enriched with data such as source and destination IP and administrators reuse DLP match patterns across SWG,
the email address of the file owner. CASB, and ZTNA for private web applications, and see a
→ Security Orchestration and Response (SOAR). consolidated view of all traffic and anomalies.
Forcepoint ONE supports two-way integration between → Unified on-device agent for Windows or macOS with
Forcepoint ONE and the selected SOAR platforms. In unique auto-generated and auto-rotated certificates.
these cases, the SOAR platform is used to automate
→ Active Directory Sync Agent synchronizes your
activities within Forcepoint ONE and another tool.
current AD users and groups with Forcepoint ONE
→ Data Classification. Forcepoint ONE can use users and groups.
classification metadata from any data classifier in a DLP
→ Auto-scaling, distributed architecture on AWS with
match pattern.
over 300 points of presence resulting in 99.99% verified
→ Endpoint Management. As part of the SAML login service uptime since 2014.
process, Forcepoint ONE can validate a client certificate
stored on a Windows, Mac, Android, or IOS device to
confirm it is managed by an endpoint management
system. This knowledge lets the administrator apply
different access policies for users logging in via managed
vs. unmanaged devices.
5
Forcepoint ONE CASB Features and Benefits
FEATURE BENEFIT
→ 99.99% uptime.
→ Minimal latency: often even faster than
Auto-scaling, distributed architecture on AWS with over 300 POPs worldwide. direct application access.
→ Allows in-line proxying of Slack traffic without
timeouts.
→ Flexible deployment.
Integration with any SAML compatible IdP in SAML relay or ACS proxy mode.
Optional built-in IdP using Microsoft ADFS. → Denial of service protection when using
SAML relay mode.
Contextual access control based on user group, device type, location, or time
→ Detects and blocks suspicious login attempts.
of day, with escalation to Multi-Factor Authentication based on “impossible
travel,” unauthorized location, or unknown device. Additional layer of access → Reduces risks associated with stolen passwords.
control for individual websites or applications based on user group, device type,
→ Segments users based on risk and need to access.
or location..
Single administrator console for managing all system capabilities across all → Reduces complexity and time to value.
applications, users, and devices. → Increases visibility and control.
DLP and malware scanning for data in motion. Scans file attachments
→ Stops data leakage and spread of malware in transit
downloaded from or uploaded to any web-based app or website for malware or
between users and any corporate SaaS application.
sensitive data and logs and blocks the transfer as appropriate.
forcepoint.com/contact
© 2022 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.
All other trademarks used in this document are the property of their respective owners.
[FP-Forcepoint ONE CASB-Datasheet-US-EN] 18Feb2022
6