TRITON AP-EMAIL STOP ADVANCED TARGETED ATTACKS, IDENTIFYHIGH RISK USERS AND CONTROL INSIDER THREATSFrom socially engineered lures to targeted phishing, most largecyberattacks begin with email. As these advanced, multi-stagethreats blend web and email elements throughout attacks, theypresent a “Kill Chain” of opportunities to stop them before thebreach occurs.Maximize your use and safety of emailTRITON AP-EMAIL identifies targeted attacks, high-risk users andInsider Threats while empowering mobile workers and the safeadoption of new technologies like Office 365 and Box Enterprise.From inbound attack activity to outbound data theft or botnetcommunication attempts, Forcepoint TRITON Email Securityprotects email communications as part of a complete TRITON APXdefense against APTs and other Advanced Threats.www.forcepoint.comEmail security challenges APTs commonly use email for early stages in theiradvanced attacks. Email must do more to address data theft and InsiderThreats. Businesses need to adopt Office 365 and other servicesto expand and compete. Risky user habits can easily lead to security breachesand data loss.

“Ultimately, we are very happy withthe Forcepoint products. ForcepointTRITON Email Security is doing its joband stopping any problems before theyreach our server.”Forcepoint TRITON AP-EMAIL— Ray Finck, Manager of Information Systems, Lowe LippmannTRITON AP-EMAIL capabilitiesSTOP APT AND OTHER ADVANCED TARGETED THREATSThe Forcepoint ACE (Advanced Classification Engine) is at theheart of all TRITON solutions and identifies malicious lures,exploit kits, emerging threats, botnet communications and otheradvanced threat activity across the Kill Chain. This enablesTRITON AP-EMAIL to identify the early stages of an attack. Withits powerful malware assessment capabilities that include afully-integrated, file behavioral sandboxing, it can even identifyZero-day malware threats.SECURE SENSITIVE DATA AGAINST EXTERNAL ATTACKS ANDINSIDER THREATSTo prepare for a malicious Insider Threat or the potentiallysuccessful cyberattack, it’s vital that outbound communicationsbe monitored. This is also necessary both for data theftcompliance needs as well as for business requirements. OnlyForcepoint provides the technology to stop data infiltration andexfiltration with capabilities such as: OCR (Optical Character Recognition scanning to identifysensitive data hidden in images such as scanned documents orscreen shots. Encrypted file detection to recognize custom encrypted filesdesigned to defy identification. Drip DLP monitoring to identify where sensitive data is leakedin small quantities over time.SAFELY ADOPT NEW TECHNOLOGIES LIKE OFFICE 365AND BOX ENTERPRISE WHILE SUPPORTING YOUR ROAMINGWORKFORCEIT departments are strained to maintain current systems whilesupporting an increasingly mobile workforce and the demandsto adopt new technologies like Office 365. TRITON AP-EMAILprovides industry-leading capabilities that leverage systems andother information to control communications, such as preventingtotal access to sensitive email attachments on vulnerable mobiledevices, while permitting full access on fully-secured laptops.These inbound and outbound defenses are all supported onOffice 365.IDENTIFY ‘HIGH-RISK’ USER BEHAVIOR AND EDUCATEUSERS TO IMPROVE AWARENESSThe rich data collections in TRITON AP-EMAIL are used by anumber of policies to report and identify systems that mayrequire special IT attention. They generate a report on a numberof Indicators of Compromise to identify infected systemsand more proactive reports on suspicious behavior, or even“disgruntled employee” activity as potential Insider Threats. Userfeedback capabilities help educate employees as mistakes aremade, helping them to better learn and understand safe emailbest practices.3

Enhanced Protection ModulesEMAIL CLOUD OREMAIL HYBRID MODULELeverage cloud services for performance and scalabilityCombine on-premise threat defenses with cloud-based prefiltering services to preserve bandwidth withindustry-leading anti-spam SLA’s. Or choose a 100% Cloud deployment of all TRITON AP-EMAIL services.EMAIL DLP MODULEBlock data theft with enterprise-class content-aware DLPPrepare for the Insider Threat and malware data theft, achieve compliance goals and further mitigatethe risk to personal information or IP. Advanced capabilities detect data theft concealed in images orcustom-encrypted files, or even transmitted in small amounts over time to evade detection.EMAIL SANDBOX MODULEIntegrate behavioral sandboxing for additional malware assessmentSupplement Forcepoint ACE analytics with an integrated file sandbox for additional deep inspection, andtake advantage of behavioral analysis in a virtual environment to uncover the malicious behaviour of Zeroday and other advanced malware. Test files automatically or manually to generate detailed forensics.EMAIL ENCRYPTIONMODULEEnsure the confidentiality of sensitive communicationsThe Forcepoint Email Encryption Module is a policy-driven technology that enables secure delivery ofemail communications. It eliminates the traditional barriers of cost and complexity by offering easyadministration, without complex key management or additional hardware.IMAGE ANALYSISMODULEIdentify explicit images to enforce acceptable use and complianceThe Forcepoint Image Analysis Module allows employers to take proactive measures to monitor,educate and enforce the company email policy in regard to explicit or pornographic image attachments.TRITON APXThe Forcepoint recommended solution for complete protectionExtend your protection from TRITON AP-EMAIL to TRITON AP-WEB, TRITON AP-DATA or TRITONAP-ENDPOINT for powerful, unified protection across all channels of

ForcepointForcepoint TRITONTRITON AP-EMAILAP-Email“TRITON Email Security wasattractive because it took awaythe overhead of managing ouremail security and deliveredmore than we expectedin terms of resilience andease-of-use. Overall, TRITONEmail Security has enabledus to deliver a more resilient,professional and cost-effectiveservice to our users.”—Martin Law, Head of IT, NCP5

The power behind TRITON solutionsACE (Advanced Classification Engine)Forcepoint ACE provides real-time, inline contextual defenses forWeb, Email, Data and Mobile security by using composite risk scoringand predictive analytics to deliver the most effective security available.It also provides containment by analyzing inbound and outboundtraffic with data-aware defenses for industry-leading data theftprotection. Classifiers for real-time security, data and content analysis— the result of years of research and development — enable ACE todetect more threats than traditional anti-virus engines every day (theproof is updated daily at ACE isthe primary defense behind all Forcepoint TRITON solutions and issupported by the Forcepoint ThreatSeeker Intelligence Cloud. 10,000 analytics available tosupport deep inspections.AntiMalware Predictive security enginesees several moves ahead. EMAIL ATTACKSReputationAnalysisBehavioralSandboxing Inline operation not onlymonitors, but blocks nti-Spam/PhishingReal-time DataClassificationTADAwww.forcepoint.comETHFTE M AIL A TAC K STWEBINTEGRATED SET OF DEFENSE ASSESSMENTCAPABILITIES IN 8 KEY AREAS.

Forcepoint TRITON AP-EMAILThreatSeeker Intelligence CloudThe ThreatSeeker Intelligence Cloud, managed by ForcepointSecurity Labs , provides the core collective security intelligencefor all Forcepoint security products. It unites more than 900 millionendpoints, including inputs from Facebook, and, with ForcepointACE security defenses, analyzes up to 5 billion requests per day. Thisexpansive awareness of security threats enables the ThreatSeekerIntelligence Cloud to offer real-time security updates that blockAdvanced Threats, malware, phishing attacks, lures and scams,plus provides the latest web ratings. The ThreatSeeker IntelligenceCloud is unmatched in size and in its use of ACE real-time defensesto analyze collective inputs. (When you upgrade to Web Security, theThreatSeeker Intelligence Cloud helps reduce your exposure to webthreats and data theft.)TRITON APXTRITON APX provides many key benefits to organizations interestedin deploying the best possible protection against Advanced Threatsacross the 7-Stage Kill Chain. They can be summarized in thesethree statements: Deploy Adaptive Security - Deploy adaptive security solutions forrapidly changing technology and threat landscapes. Protect Everywhere - The perimeter is the data. Protect criticalinformation from theft whether on-premise, in the cloud or onmobile devices. Raise the Security IQ - Combat the cyber security skills shortageby providing predictive actionable intelligence across the entirethreat lifecycle.TRITON ArchitectureWith best-in-class security and a unified architecture, ForcepointTRITON offers point-of-click protection with real-time, inline defensesfrom Forcepoint ACE. The unmatched real-time defenses of ACEare backed by Forcepoint ThreatSeeker Intelligence Cloud and theexpertise of Forcepoint Security Labs researchers. The powerfulresult is a single, unified architecture with one unified user interfaceand unified security intelligence.7 is a trademark of Forcepoint, LLC. SureView ,ThreatSeeker and TRITON are registered trademarksof Forcepoint, LLC. Raytheon is a registered trademark ofRaytheon Company. All other trademarks and registeredtrademarks are property of their respective owners.[BROCHURE TRITON AP EMAIL EN] 400003.030316

Forcepoint TRITON AP-EMAIL 5 Forcepoint TRITON AP-Email "TRITON Email Security was attractive because it took away the overhead of managing our email security and delivered more than we expected