decrypting myths
Attackers can earn tens of thousands of dollars a month from cryptocoin miners . The journey starts with realising what ’ s possible .
Mike Schuricht , VP of Product Management , Security Service Edge ( SSE ), Forcepoint
We have a number of OEMs that we combine with internal technology , as well as things like signature identification . If a file is malicious , for example , it can be blocked , or if you see behaviour that ’ s atypical you can block and control it . We also have the ability to add on capabilities like Machine Learning-based zero-day threat prevention .
Beyond that , there are also malicious URLs , whether sent via phishing or via someone attempting to access a site using an anonymous proxy , or a spam host . Being able to control and block those are key .
We also have a remote browser isolation – RBI – capability where perhaps a site doesn ’ t classify as malware but is unknown . In that scenario , you can push it through an isolation container and control what happens .
You could allow downloads , for example , but scan any files that come from an unknown site . Or perhaps use content disarm and reconstruction ( CDR ) technology to permit the download but strip out things that might be malicious on the fly .
One key thing is the association with the channels or paths of data that are important to protect . We need to not only consider the threats , but also what can happen from a data leakage perspective if , for example , someone accidentally dragged a file onto a personal OneDrive or email account .
This is another area that can be controlled in Forcepoint ONE , so there is a lot of flexibility offered .
Can you provide an example of how Forcepoint one has helped to transform a customer ’ s security posture and the benefits they have received ?
It ’ s really the combination of the hybrid work , SaaS application enablement and
68 www . intelligentciso . com