Surendra Singh Country Director Forcepoint India


Forcepoint immunises organisations—both government and private—not just from external threats but also against the internal threats, and that’s why it has a predominant presence in areas like e-governance, manufacturing, banking and IT/ ITeS, to name just a few, says Surendra Singh, Country Director, Forcepoint India, in an interview with Elets News Network (ENN)

What portfolio of security solutions you offer?

Forcepoint solution helps enterprises and government organisations protect against internal and external threats through a security portfolio and ecosystem approach that operationalises threat lifecycle management.


The Forcepoint approach is to safeguard users, networks and data by providing a unified platform that eliminates inefficiencies involved in managing a collection of point products.

The unified solutions help organisations and government departments to:


Defend: Capabilities that dynamically adapt to the changing needs of the perimeter-less enterprise by leveraging real time intelligence and comprehensive analytics coupled with pervasive protection across the threat kill chain;
Detect: Capabilities that help determine if a breach has occurred and minimised the cyber dwell time;
Decide: Targeted decision making capabilities that provide predictive intent warning paired with unprecedented visibility, rich data content and contextual analysis of malicious behavior; and
Defeat: Capabilities that take aggressive action toward stopping adversaries from achieving their attack objectives.

Its portfolio of solutions consists of:

Content security solution: Helps guard against emerging threats, including most advanced zero-day attacks and APTs, while improving productivity and compliance through strong outbound content visibility and containment controls through a unified web, email and DLP security solution.

TRITON AP-Web, TRITON AP-EMAIL, TRITON APDATA and TRITON APENDPOINT can be deployed in any combination to protect organisations by accurately identifying and classifying network traffic, applying policies and detecting threats in real time. TRITON APX’s unified management and reporting functions streamline work for organisation’s security team, giving them the context and insights they need to make better decisions, minimize the dwell time of attacks and prevent the exfiltration of sensitive data.

Insider Threat Data Protection: Forcepoint TRITON AP-DATA and AP-ENDPOINT help organisations provide the visibility and control to keep the sensitive data secure whether in the office, on road or in the cloud. It helps address regulatory compliance requirements, leverage data classification tools to identify and protect intellectual property, no matter where it is stored.

Forcepoint is the first vendor to integrate its advanced DLP solution with Forcepoint SureView® Insider Threat to provide context around data policy violations and to document users’ intent. This industry leading combination provides organisations with context around user attempts to transfer sensitive data. An “over-the-shoulder” view with DVR capture and playback provides the needed context into user activity and organisation’s sensitive data, identifying the early warning signs of a system being hijacked, stolen credentials, a rogue user, or one just making mistakes.

Network Security:Forcepoint™ Stonesoft Next Generation Firewall integrates application control, sophisticated evasion prevention and an intrusion prevention system (IPS) into a single solution that is cost-effective and easy to deploy. It has a proven capability to identify advanced evasion techniques (AETs) that evade other devices, and delivers exfiltration protection using both application and endpoint intelligence.

Security for Cloud: Forcepoint’s TRITON security solutions enforce consistent policy across the cloud, on premises and at endpoints, providing a unified, hybrid defence for distributed, highly-mobile organisations. Secondly, with the move of enterprise applications to the cloud, data must be protected everywhere. The Forcepoint TRITON platform is now natively hosted in Microsoft Azure™, enforcing data loss prevention (DLP) for Microsoft Exchange Online in Office 365, directly from Microsoft’s own cloud, and protecting data everywhere.

IT Security is going to play an important role in success of ‘Make in India’ and ‘Digital India’ programmes. The Government is aware of the challenges and taking steps to strengthen the policy and legal structures. But more work is required around it

What are the challenges India currently faces on the security front?

Today, a broad range of services are delivered through ICT infrastructure – e-governance, e-commerce, banking, communication and so on. Many core utility services like electricity, railways, airlines and water distribution are connected by the Internet. At the enterprise level, organisations are adopting the digital infrastructure as core component of business operations.

However, the adoption of technology is also making cyber security a big challenge. Protection of critical infrastructure, information and smooth operation of services becomes crucial from security perspective. Protection of employee information, IP, business intelligence, customer data becomes important in commercial enterprises. In defense, protection of sensitive information related to personnel, defence research, military exercises, military and naval platforms, submarine communication systems, etc. becomes decisive. These are some of challenges from security perspective. Both government and private sector have to work towards security involving people, process and technology aspect.

How much has your company covered the Indian security market so far?

Forcepoint enjoys undisputed leadership position in the Indian market. Large number of enterprises in BFSI, Telecom, IT/ITeS, Pharma, Manufacturing and Government sectors are using Forcepoint solutions to protect its users, data and network.

Private as well as government departments rely on Forcepoint to protect it from zero-day attacks and advanced persistent threats coming from web and email channels. Organisations are deploying Forcepoint data security solutions to have visibility into its sensitive data where ever it may be within the network or end-points and stop leakage and theft of critical data.

Forcepoint has expanded its portfolio to include Next Generation Firewall and Insider Threat solution. Insider Threat is an emerging area of cyber security where today a large number of cyber incidents being reported are happening due to involvement of an insider.

What should be the roadmap for India in terms of consolidating the security infrastructure?

IT Security is going to play an important role in success of ‘Make in India’ and ‘Digital India’ programmes. The Government is aware of the challenges around IT security and taking steps to strengthen the policy and legal structures, but more work is required around it. There is a big gap between the security investments currently made and the additional ones that is required. One reason for this is probably lack of proper knowledge in government departments and among managements and boards in private sector around implication of security incidents. There is requirement of well-defined policies, regular training to employees, monitoring of network by use of technology solutions and operational processes and auditing.

There should be a holistic approach to security strategy unlike today where majority of investments are towards fending off external threats but not as much on insider threats, whereas statistics suggest increasing cyber incidences happening due to insiders. Security has to become part of risk management approach. Cyber insurance is going to play an important role in helping organisations adopt comprehensive IT security policies and practices and will become important criteria for customers to look at companies in future.

 

Be a part of Elets Collaborative Initiatives. Join Us for Upcoming Events and explore business opportunities. Like us on Facebook , connect with us on LinkedIn and follow us on Twitter, Instagram.

Related Interview


whatsapp--v1