0% found this document useful (0 votes)
77 views4 pages

Datasheet Forcepoint Intrusion Prevention System en

Uploaded by

vuyani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views4 pages

Datasheet Forcepoint Intrusion Prevention System en

Uploaded by

vuyani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Datasheet

FORCEPOINT
Intrusion Prevention System
Forcepoint offers the industry’s highest security* intrustion prevention system (ips) for protecting
distributed enterprise networks – across data centers, offices, branches, and the cloud.
*NSS Labs NGIPS Test 2017

Forcepoint’s network security solutions offer the Continual Updates To Keep Ahead Of Attackers
industry’s most secure Intrusion Prevention System.
Forcepoint’s global research team is constantly
Top-rated in independent tests, Forcepoint’s IPS can be
examining threat intelligence feeds, vulnerability
deployed as a standalone Layer 2 IPS device or as part of
reports from different sources, and a variety of test
a full-featured Layer 3 next-generation firewall (NGFW)
systems to analyze exploits and vulnerabilities. New
in physical, virtual and cloud environments. It defeats
fingerprints are published as needed through our cloud
evasions, exploits and malware that attackers use to
service and are automatically downloaded by Forcepoint
penetrate and spread within enterprise networks.
network security systems. This proactive approach gives
IT teams time to analyze newly published patches and
Unique Architecture For Efficacy And Speed
implement remediation efforts without fear of
Forcepoint uses a dynamic stream-based approach to immediate compromise.
inspection that goes beyond simple packet inspection. It
reconstructs and examines the actual payloads, defeating Stopping Zero-Days And Unwanted Content
evasion techniques that camouflage exploits and malware.
Forcepoint’s network security products also provide
multiple layers of defense against previously unknown
In addition, high-speed, granular decryption unmasks
attacks and undesirable content. Transmitted files go
attacks that attempt to hide within SSL/TLS traffic.
through rigorous reputation and malware scanning, and
Forcepoint analyzes each payload stream, decoding
new threats like zero-day attacks can be uncovered with
the various layers of protocols to look for abnormal or
our advanced sandboxing technology. Forcepoint is one
malformed protocol setup, metadata, and headers.
of the pioneers in categorizing and filtering websites and
content; with our IPS devices and firewalls, organizations
Forcepoint then applies advanced techniques to
can more easily comply with workplace regulations, limit
examine transmission contents for signs of exploits
exposure to personal data, and prevent users from going
against vulnerabilities in many types of systems.
to websites with dangerous content in the first place.
Unlike verbose pattern-based signature mechanisms,
Forcepoint’s more-sophisticated approach enables such
Fail-Open Resilience
attacks to be identified with a single, concise fingerprint.
Fingerprints are matched using high-speed deterministic Forcepoint’s appliances support a range of modular
finite automata (DFA) tailored to each protocol context, network cards, including fail-open interfaces that keep
enabling new fingerprints to be incorporated with traffic running even if the IPS or NGFW loses power.
almost no impact on CPU resources.

www.forcepoint.com 1
Forcepoint Intrusion Prevention System (IPS)

FORCEPOINT COMBINES FULL-STREAM RECONSTRUCTION WITH HIGH-SPEED EXPLOIT FINGERPRINTING

Protection To Keep Your Business Running Business Outcomes


Every day, attackers get better at penetrating enterprise
 Fewer breaches
networks, applications, data centers, and endpoints. Once
inside, they can steal intellectual property, customer  Greater security without disruption
information, and other sensitive data, causing irreparable
damage to businesses and reputations.  Less exposure to new vulnerabilities while IT teams
prepare to deploy new patches
Internet attacks are moving beyond simply transmitting  Safer rollout of branches, clouds or datacenters
exploits of vulnerabilities. Increasingly, new techniques
are being used to evade detection by traditional security  Lower TCO for security and network infrastructure
network devices, including many name-brand firewalls.
Key Features
These evasions work at multiple levels to camouflage
exploits and malware, making them invisible to traditional  Deployment as a Layer 2 IPS or as part of a Layer 3 NGFW
signature-based packet inspection. With evasions, even
old attacks that have been blocked for years can suddenly  Stream inspection that examines actual payloads
be used to compromise internal systems.  Pioneer in anti-evasion defenses

Forcepoint takes a different approach. Our industry-  High-speed decryption with granular privacy controls
leading IPS engine is designed for all three stages of  Protocol abnormality and misuse detection
network defense: to defeat evasions, detect exploits of
vulnerabilities, and stop malware. It can be deployed  Exploit and malware detection via high-speed DFA
transparently behind existing firewalls to add protection  Denial of Service (DoS) detection
without disruption or as part of our full-featured NGFW
for all-in-one security.  Anti-bot defenses
 Zero-day sandboxing via cloud or on-premises appliance
All Forcepoint network security products are continually
updated, centrally managed, and can seamlessly share  Industry-leading URL Filtering
security policies and dashboards throughout your
 Modular fail-open network interfaces for appliances
network. With Forcepoint, you can keep your business
safe – reliably, consistently and efficiently – throughout  Unified capabilities and performance across deployments
your data centers, office networks, branch locations, or
cloud environments.  Policy-based centralized management
 Rapid updates without downtime

www.forcepoint.com 2
Forcepoint Intrusion Prevention System (IPS)

Forcepoint Intrusion Prevention System (IPS) Specifications

SUPPORTED PLATFORMS

Appliances Multiple series of modular appliances for deployment in data centers, at network edges, and in branches

Cloud Infrastructure Amazon Web Services, Microsoft Azure

Virtual Appliance x86 64-bit based systems; VMware ESXi, VMware NSX, Microsoft Hyper-V, and KVM virtualized environment

Deployment Modes Standalone IPS (layer 2, with optional fail-open network interface modules), part of NGFW (layer 3)

Virtual Context Virtualization to separate logical contexts with separate interfaces and policies

INSPECTION

Multi-Layer Traffic Normalization • Reconstructs and analyzes actual payloads to assure integrity of data streams
/ Full-Steam Deep Inspection • Discards duplicate lower-level segments that could lead to ambiguities when reassembled

Anti-Evasion Defense Stops out-of-order fragments, overlapping segments, protocol manipulation, obfuscation, encoding tricks

Dynamic Context Detection Protocol, application, file type

Ethernet, H.323, GRE, IPv4, IPv6, ICMP, IP-in-IP, IPv6 encapsulation, UDP, TCP, DNS, FTP, HTTP, HTTPS,
Protocol-Specific Traffic IMAP, IMAPS, MGCP, MSRPC, NetBIOS Datagram, OPC Classic, OPC UA, Oracle SQL Net ,POP3, POP3S,
Handling / Inspection RSH, RSTP, SIP, SMTP, SSH, SunRPC, NBT, SCCP, SMB, SMB2, SIP, TCP Proxy, TFTP, Integrated inspection
with Sidewinder Security Proxies

• High-performance decryption of HTTPS client and server streams


Granular Decryption of SSL/TLS
• Policy-driven controls to protect users’ privacy and limit organizations’ exposure to personal data
Traffic
• TLS certificate validity checks and certificate domain name-based exemption list

• Protocol-independent, any TCP/UDP protocol with evasion and anomaly logging


• Virtual patching for both client and server CVE vulnerabilities
Vulnerability Exploit Detection • Sophisticated fingerprint approach eliminates need for many signatures
• High-speed deterministic finite automata (DFA) matching engine handles new fingerprints quickly
• Continual update of fingerprints from Forcepoint

• Protocol-independent fingerprint matching


Custom Fingerprinting
• Regular expression-based fingerprint language with support for custom applications

Reconnaissance TCP/UDP/ICMP scan, stealth, and slow scan detection in IPv4 and IPv6

• Decryption-based detection and message length sequence analysis


Anti-Botnet
• Automatically updated URL categorization to block or warn users away from botnet sites

Correlation Local correlation, log server correlation

• SYN/UDP flood detection with concurrent connection limiting, interface-based log compression
DoS/DDoS Protection • Protection against slow HTTP request methods, half-open connection limit.
• Separation of Control Plane and Data Plane

Blocking Methods Direct blocking, connection reset, blacklisting (local and distributed), HTML response, HTTP redirect

Traffic Recording Automatic traffic recordings/excerpts from misuse situations

• Continual dynamic updates through Forcepoint Security Management Center (SMC)


Automatic Updates
• Updates virtual patching and provides detection and prevention for emerging threats

www.forcepoint.com 3
Forcepoint Intrusion Prevention System (IPS)

Forcepoint Intrusion Prevention System (Ips) Specifications continued

ADVANCED MALWARE DETECTION AND FILE CONTROL

Protocols FTP, HTTP, HTTPS, POP3, IMAP, SMTP

Policy-based file filtering with efficient down-selection process. Over 200 supported file types in 19
File Filtering
file categories

File Reputation High speed cloud-based malware reputation checking and blocking.

File Anti-Virus Scanning Local anti-virus scan engine*

Forcepoint Advanced Malware Detection available both as cloud and on-premise service, same as used by
Zero-Day Sandboxing
Forcepoint Web Security, Forcepoint Email Security and Forcepoint CASB

URL FILTERING

Powered by Forcepoint ThreatSeeker Intelligence, same as used by Forcepoint Web Security and Forcepoint
URL Categorization
Email Security

Automatic Updates Continually updated as new sites are analyzed

Enforcement of Forcepoint NGFW URL Filtering available as an add-on subscription


Category-based Access Policies

MANAGEMENT & MONITORING

Enterprise-level centralized management system with log analysis, monitoring and reporting capabilities
Management Interfaces
(see Forcepoint Security Management Center datasheet for details)

SNMP Monitoring SNMPv1, SNMPv2c, and SNMPv3

Traffic Capturing Console tcpdump, remote capture through Forcepoint Security Management Center

High Security Management 256-bit security strength in engine-management communication


Communication

Common Criteria Network Devices Protection Profile with Extended Package Stateful Traffic Filter Firewall,
Security Certifications
FIPS 140-2 crypto certificate, CSPN by ANSSI, (First Level Security Certification USGv6)

*Local anti-malware scan is not available with 110/115 appliances.

CONTACT © 2017 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of
Forcepoint. Raytheon is a registered trademark of Raytheon Company. All other
www.forcepoint.com/contact trademarks used in this document are the property of their respective owners.

[DATASHEET_FORCEPOINT_TEMPLATE_EN] XXXXXX.062817

www.forcepoint.com 4

You might also like