Forcepoint ONE Datasheet
Forcepoint ONE Datasheet
Forcepoint ONE
Forcepoint ONE is an all-in-one cloud service that makes security simple for
distributed businesses and government agencies that need to adapt quickly
to changing remote and hybrid workforces. It gives employees, contractors,
and other users safe, controlled access to business information on the web, in
the cloud (Saas and IaaS), and in private applications, while keeping attackers
out and sensitive data in. As a result, Forcepoint ONE makes users more
productive, whether remote or in the office, and businesses more efficient.
Key Benefits Forcepoint ONE combines Zero Trust and SASE security technologies, including
three secure access gateways and a variety of shared threat protection and data
› 99.99% verified uptime since 2015
security services, all built on a cloud-native platform. This approach enables
› Latency minimized and throughput
organizations to manage one set of policies, in one console, communicating with
maximized with auto-scaling
one endpoint agent.
› Flexible integration with any SAML-
compatible IdP → Secure Web Gateway (SWG). Monitors and controls any interaction with
› Unified administration console any website, including blocking access to websites based on category and
reduces repetitive and redundant risk score, blocking download of malware, blocking upload of sensitive data
configuration management to personal file sharing accounts, and detecting and controlling shadow IT.
› Unified managed device agent Currently available as agent software for Windows and MacOS.
for CASB, SWG, and ZTNA
→ Cloud Access Security Broker (CASB). Agent-based or agentless solution
simplifies deployment
that enforces granular access to company SaaS based on identity, location,
› Active Directory sync agent device, and group. Blocks download of sensitive data and blocks upload of
accelerates user on-boarding malware in real time. Scans data at rest in popular SaaS and IaaS for malware
› Reverse proxy with AJAX-VM allows and sensitive data and remediates as needed. Agentless option facilitates
protection of any managed web BYOD and contractor access.
application without an on-device agent
→ Zero Trust Network Access (ZTNA). Agent-based or agentless solution
› Data-in-motion scanning blocks
that allows granular access to private applications without the use of a VPN.
malware and data exfiltration between
Agent based solution required for non-HTTP/S applications.
users and any web application
› Data-at-rest scanning quarantines
malware and controls risky data
sharing for many popular SaaS and
IaaS storage offerings
› Encryption of structured and
unstructured data in SaaS and IaaS
ensures data privacy
› Field Programmable SASE Logic
can block specific HTTP/S request
methods, resulting in granular control
of user interactions with any SaaS, web
page, or private web application forcepoint.com
Common features for all three gateways include: Forcepoint ONE also includes these
add-on capabilities:
→ Contextual access control. Access to web, cloud,
or private applications is controlled based on user → Cloud Security Posture Management (CSPM).
location, device type, device posture, user behavior, Scans AWS, Azure, and GCP tenant settings for risky
and user group. configurations and provides manual and
automated remediation.
→ Data loss prevention (DLP). Files and text are scanned
upon upload and download for sensitive data and → SaaS Security Posture Management (SSPM). Scans
blocked, tracked, encrypted, or redacted as appropriate. Salesforce, ServiceNow, and Office 365 tenant settings
for risky configurations and provides manual and
→ Malware scanning. Files are scanned upon upload and
automated remediation.
download for malware and blocked when detected.
→ Remote Browser Isolation (RBI). A user is protected
→ Unified management console for configuration,
from web-borne malware on their local device by
monitoring, and reporting.
running a browser in a cloud-hosted VM.
→ Unified on-device agent for Windows and macOS.
→ Content Disarm and Reconstruction (CDR). A
→ 99.99% service uptime. document is stripped of embedded malware and
reconstructed before being opened by a user.
→ Advanced Malware Detection (AMD). Suspected
malware is detonated in a sophisticated sandbox
environment that evades usual malware checks for
sandbox execution.
2
Forcepoint ONE Features and Benefits
→ 99.99% uptime.
→ Minimal latency: often even faster than direct
Auto-scaling, distributed architecture on AWS with over 300
application access.
POPs worldwide.
→ Faster scanning of data at rest: hours vs days to
scan an entire application tenant’s content.
→ Flexible deployment.
Integration with any SAML compatible IdP. SAML relay or ACS
proxy mode. Optional built-in IdP using Microsoft ADFS. → Denial of service protection when using SAML
relay mode.
→ Leverage your existing Microsoft AD instance to
Active Directory Sync Agent. Synchronizes your current AD
quickly onboard users and manage the groups
users and groups with Forcepoint ONE users and groups.
they are in.
Platform-wide Contextual access control. Grants user access to Forcepoint → Detecting and blocking suspicious login
ONE based on user group, device type, location, or time of day. attempts reduces risks associated with
Optional escalation to Multi-factor Authentication based on stolen passwords.
“impossible travel,” unauthorized location, or unknown device.
Additional layer of access control for individual websites or → Granular access control allows segmentation of
applications based on user group, device type, or location. users based on risk and need to access.
3
SCOPE FEATURE BENEFIT
Shadow IT discovery and control → Block users from using any shadow IT
application while providing a coaching
message recommending a company
sanctioned alternative.
forcepoint.com/contact
© 2022 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.
All other trademarks used in this document are the property of their respective owners.
[FP-Forcepoint ONE-Datasheet-US-EN] 17Feb2022
4