Categories
Problems that solves
No control over data access
Unauthorized access to corporate IT systems and data
Risk or Leaks of confidential information
Risk of attacks by hackers
Risk of data loss or damage
High costs
Values
Reduce Costs
Ensure Security and Business Continuity
Manage Risks
Forcepoint Data Guard
Forcepoint Data Guard - Secure data and file transfer between physically separated networks
About Product
Description
The need for secure collaboration and information sharing continues to increase between and within government agencies. To protect this sensitive data from the persistent threat of a cyber-attack, penetration and data loss, only the most secure methods should be utilized.
The sharing and movement of data are essential to the rapid, accurate and precise execution of our customers’ missions. Forcepoint Data Guard enables the bi-directional, automated transfer of highly complex data — including real-time streaming video — between multiple domains, and targets specific high assurance security requirements found in government environments.
Forcepoint Data Guard is the ideal choice for customers that require the highest degree of sensitive data protection for national and mission security.
The Forcepoint Advantage
Forcepoint Data Guard is the ideal choice for customers that require the highest degree of sensitive data protection for national and mission security.
The Forcepoint Advantage
- Eliminates costly and time-consuming manual data transfers
- Delivers byte-level deep content inspection, data validation and filtering that can be tailored to customer-specific security policies, requirements and risks
- Enables real-time video streaming (MPEG2-TS)
- Supports TCP and UDP over IP and adaptability for custom interfaces
- Provides highly customizable data validation rules for maximum flexibility
- Streamlines the SIEM alert and monitoring process with rapid data transfer from lower-level networks to a single higher-level network
- Derived from the Common Criteria-evaluated, Red Hat Enterprise Linux 7 secure operating system with Security Enhanced Linux (SELinux) modules
Scheme of work
Competitive products
User features
Roles of Interested Employees
Chief Executive Officer
Chief Information Officer
Chief IT Security Officer
Organizational Features
IT Security Department in company
Internet access is available for employees
GDPR Compliance
Personal data operation