Forcepoint was created in 2016 to commercialize defense-grade cybersecurity technologies for large enterprises. It is one of the largest private cybersecurity companies with over 13,000 customers in more than 150 countries. Trillions of dollars have been spent on cybersecurity over the past 7 years, but attackers still have a 95% success rate. Digital transformation unlocks value but also introduces new cybersecurity challenges. Forcepoint takes a human-centric approach to security focused on users and data to address these challenges in the new digital era.
Thank you for investing your valuable time with us, we know you have choices in terms of where you spend it.
I am certain you will find our paradigm changing approach both refreshing and valuable.
[OPTIONAL SLIDE FOR THOSE PROSPECTS NOT FAMILIAR WITH FORCEPOINT]
Forcepoint’s creation was led by Raytheon with its acqusition of Websense in 2016 and its merge with Raytheon’s Cyber Products business. In January 2016, Raytheon also acquired the Stonesoft NGFW. These three companies formed the initial backbone of Forcepoint. Forcepoint has made subsequent acquistions of a CASB company (Skyfence) and a UEBA company (RedOwl).
Forcepoint is actually one of the largest private cybersecurity companies in the world with more than $600M in revenue, more than 10K customers, and offices throughout the globe.
It has been and continues to be a close partner to the global intelligence community and organizations with high assurance cyber missions – its has enterprise technologies at its core.
It has one of the most comprehensive product portfolios in the industry, across key control points that include Data Protection, NGFW, Web Security, Email Security, CASB, Insider Threat, UEBA, and Sandboxing.
In the last 7 years one trillion dollars has been spent on cyber security, but every CISO I speak to feels no safer. More aware of risk perhaps, but no safer.
When we spent the next trillion, …… are we expecting a different result?
Half of security organization can’t stop an attack on their networks
Attackers will get in by tricking employees using phishing to compromise their accounts
# of incidents are growing 2.5X faster than budgets
Something has got to change
……..Meanwhile – you and other business leaders are under pressure in the race to digitally transform, and both take advantage of the potential $100 trillion in value realization AND defend against new agile disruptors
This is why companies are so aggressively pursuing DX: …..BUT ….. The #1 hurdle is still security.
Companies that can transform and overcome this hurdle, are the ones that will win.
I am here today to help you get over that hurdle as fast and cost effectively as possible.
So……..Let’s break down DX into its four key elements and understand how to address the security issues raised by each of them.
The 4 KEY ELEMENTS of DX are CLOUD, DATA, CONNECTIVITY, AND PEOPLE.
1. Companies are moving to cloud as rapidly as possible, and the result can be blind spots, fragmented security and a lack of accountability
2. Data is the new oil, and it needs to be able to flow freely, and be protected everywhere, all the time. This remains a massive challenge for organizations
3.As workloads move to the cloud , Network architectures are evolving, providing opportunities which can be maximized when your networking teams integrate their strategy with security.
4. Lastly – ensuring trusted interactions with employees, partners and vendors in this evolution remains a growing priority and challenge for CxOs
At Forcepoint we believe that Organizations need to place users and data at the center of their design thinking……… let me explain
Our journey into a complex world of DX is already happening . Our ecosystems are already beginning to look the one on the top right.
Complexity and risk is already HIGH. This is a multi-dimensional world based, on user and data connections.
· 73% of enterprises will run almost entirely on SaaS by 2020
· 87% of companies rely on their employees using personal devices to access business apps
· 2.5 quintillion bytes of data are created each day
Organizations need to place users and data at the center of their design thinking.
HOWEVER - The reality is that most security organizations are still operating in the middle or to the left of this diagram, in an infrastructure-centric world.
If you take a look at how security is applied in an infrastructure-centric paradigm, Policies are applied from the infrastructure to groups, or departments or to the whole company.
The result ……… friction for genuine users and an opportunity for malicious users that may find loop holes in the policy or the rights that are applied. Due to the generic nature of these policies, the noise of events and log files makes finding the bad amongst the good extremely difficult
Human-centric cyber security flips that paradigm on its head and changes everything. By making humans, and not events, the units of analysis, you can now use events as data input to understand what each individual is trying to do by their behavior.
Based on that understanding of each user’s behavior and intent, you can then apply different policies depending on the riskiness of that behavior. You can now get aggressive with automation to stop threats without breaking the environment. The result is ONE to ONE security that provides more user freedom and appropriate security enforcement based on a risk adaptive profile
……………………So there is a simple question you need to answer in this new world.
What is the best way to reduce risk and secure an environment you increasingly don’t own or manage?
Remember every icon around that person will potentially be outsourced …..People need to be at the center of the new network, and the 2 constants that are of value are HUMANS AND DATA . That is what need to be managed.
This means making your hybrid infrastructure USER and DATA aware
[this slide is tool to explore a customer’s maturity level and the key areas of interest that they have; use it to have a conversation with a customer]
[the Gartner reference is to the data points of customers in each digital transformation stage; the maturity curve itself is a Forcepoint point-of-view]
So let’s talk about where you are on your DX journey.
Remember the 4 ELEMENTS? CLOUD , DATA , CONNECTIVITY and PEOPLE? .
Every customer we talk to is in a different place on this journey. The key is being careful to avoid a mis-match to the technology you buy and the given need that the business has for that point in time. There unfortunately is no silver bullet.
(talk about one specific example with the maturity curve. For example, Office 365 adoption. Depending of the exact need, that may lead to a NGFW, DLP, and CASB discussion or all of these)
What is important is HOW YOU INVEST AS THIS SHOULD BE ALIGNED TO YOUR FUTURE STATE which we propose should ultimately be BEHAVIOR CENTRIC
At Forcepoint we are uniquely positioned to help you along this journey, and to help focus on YOUR NEEDS, we have organized our business into 3 key categories:-
When we talk to CISOs, Forcepoint sees their problems falling into three categories:
Having a path to the cloud
Protecting data
And stopping insider threats
First, as customers transition to cloud-based IT, they want new networking and security architectures
What they have today doesn’t work.
It’s slowing down the business
They want to accelerate their digital transformation and secure their path to the cloud.
They need to fund that transition while maintaining legacy systems
Right now, the choice is between on-premises or pure public cloud solutions
Neither satisfies their enterprise-wide need.
Second, the top 5 most valuable publicly traded companies get value from data
Microsoft, Apple, Alphabet, Amazon and Tencent
They can't secure their data with traditional methods - need automated and intelligent protection
Also there's an imbalance between the value of data and investment made to protect it.
And most customers know it.
So the second category we're tackling is protection of critical data and intellectual property
Third, and increasingly important, companies are struggling to protect against insider threats, sabotage, and corporate espionage
They need to protect their workforce
Just think about the headlines you’ve been reading about Apple, Tesla, and GE.
These threats extend to their broader business ecosystem and supply chain
This is one of the hardest problems they have to tackle
We’re old hands at solving these kinds of problems for large companies and the US government with Raytheon tech
Each one of these categories have different function leaders who are responsible for solving problems and implementing the solutions, sometimes overlapping. Part of my role is to understand the needs of all of these roles and help bridge the gaps and overlaps.
Under each one of these categories are different security and IT initiatives that many of our customers have on their roadmap of projects for the year. Our approach is to identify which ones matter most to you and understand what you need within each one.
[talk through a couple example initiatives]
(Transition: -) ……..of course we are a technology company, and this now shows you how our products map to the outcomes we are looking to solve
As you can see, integration of solutions will be the key to unlocking true value, and we have invested heavily in this.
There is overlap between outcomes and initiatives with the technology which means interdepartmental cooperation and multiple use cases will improve your risk posture and TCO
ALL of these technologies are available to support your journey TODAY……………
Later this year, Forcepoint will be introducing our Converged Security Platform.
Our platform will simplify how you can consume our capabilities in a way that can satisfy your needs across all three categories.
For example, we are deploying our capabilities on this platform in a way that you will be able to easily compose solutions. This allows you to start with a simple use case and the add additional capabilities to solve more complex use cases without having to re-deploy the platform.
Another example is the bottom layer. Our platform will have an integration layer to an ecosystem of other products, including some that you have already made investment in. Our platform will allow you to make your current infrastructure risk-adaptive.
Transition: ………….Let me wrap by sharing with you why Forcepoint…
We are the experts in Human Centric Cyber Security
Risk-adaptive protection powered by behavioral intelligence research delivers automation
Compelling TCO through a breadth of converged capabilities
We are 100% committed to our customers success
(Transition :- ) I would like to leave you with 3 things ……
We’re going to leave you with three things….
How can we progress our discussions that best fits your need?