4 minute read

SECURING

Next Article
TOTAL SECURITY

TOTAL SECURITY

SECURING ORGANIZATIONS

Forcepoint is a global cybersecurity leader for user and data protection. Solutions. Jawad Toukna, who has been heading sales and operations as the Director of Regional Sales for the MENA region at Forcepoint for over 10 years, elaborates on Forcepoint’s behavior-based solutions that adapt to risk in real-time and are delivered through a converged security platform

Advertisement

Please discuss how a SASE approach towards cybersecurity is quite critical and unique to ensure better security in the multi-cloud era?

The Coronavirus pandemics forced a mass shift toward supporting large groups of remote workers, creating a scenario where organizations need to focus on protecting data and users in a hybrid IT ecosystem. Since users can now access data from anywhere and from any device, it has given rise to a new category, an age our Chief Product Officer – Nico Popp calls as ‘the unbound enterprise’. Securing the unbound enterprise is about protecting users and data in a distributed and diverse environment, one that bridges traditional on-premises infrastructures, including the home office, to multi-cloud and multi-SaaS ones. At Forcepoint, we understand the transformation our customers currently face. And, we are committed to helping our customers meet their mass telework security needs. What enterprises’ require is a tight inte-

Jawad Toukna

Regional Sales Director, MENA, Forcepoint

gration of capabilities that cross traditional product boundaries to solve today’s pressing security problems, such as delivered through a Gartner’s Secure Access Service Edge (SASE) architecture approach.

Do your solutions cover both on-premise as well as cloudbased applications?

Yes, gone are the days when work was confined within the four walls of any organization. Even before the pandemic, enterprises moved towards employing a hybrid IT architecture that split IT functions between on-premise and cloud platforms. Forcepoint’s on-premise appliances provide high-capacity throughput for large offices while the cloud secures smaller satellite offices, mobile users and lately remote workers.

Your three pivots of cloud security seem to be around data protection, insider threat and network security – please elaborate regarding this?

Enterprises should focus more on detecting and preventing potential breaches rather than cleaning up after a breach has already occurred. Forcepoint’s range of cybersecurity solutions helps in securing organizations from cyber threats by identifying and preventing breaches before they occur. Traditional security tends to take an outside-in approach, starting with the perimeter and building layers of security toward the data, all to keep the bad guys out. As many companies started to realize during the Sunburst attack—that’s an approach that falls short. So why not take an inside-out approach instead? Attempts to rein in users and data tend to be counterproductive because they usually cost organizations dearly, both in terms of production and overall efficiency. A user and data-centric security approach no longer starts with where they reside. No longer tethered to a fixed network, unbound employees become liberated from hardware infrastructure limitations of the past. When it comes to network security, nowadays it’s all about protecting the distributed network. We need to look at enterprise-class SD-WAN, advanced intrusion prevention, and seamless integration with the cloud-based SASE security we discuss above. No matter how robust security strategies are, data breaches will continue to happen. As users continue to work remotely, they’ll continue to introduce new security risks. The cybersecurity path forward requires a deeper analysis of behaviors. The first step is establishing a behavior baseline at the individual level. What constitutes normal behavior? What behavior is unusual? Bad actors impersonate our employees to access and steal our data. Taking a closer look at how users interact with data no matter where it resides will help move the unbound enterprise left of breach. The deep understanding of behavior and risk creates a shift in security strategy—one where policies no longer have to be binary but instead, automatically personalized to the user.

How is SASE redefining security as we know it, and how does your approach stand out?

Gartner’s SASE (Secure Access Service Edge) architecture can help organizations safely connect their users to the data, applications, and resources they need to be productive in a rapidly changing world. SASE brings the network and its security back to where applications and data really are: the cloud. It is geared towards platform-based solutions that unify web, network, and app security. Gartner has recognized Forcepoint as a representative vendor within the emerging SASE market. Forcepoint’s network

and data protection solutions implement the SASE model, weaving together advanced security capabilities such as firewalling, intrusion prevention, web content inspection, malware scanning, URL filtering, application access, and more into a single, unified cloud service. This converged approach eliminates gaps and redundancies to stop attackers from breaking into an enterprise from the internet, web content, or cloud apps—consistently, no matter where people work.

Discuss some key features of your CASB solution?

In past years, control over data was tight, but with the introduction of the cloud and mobile workers, that’s no longer the case. You need visibility into cloud usage, including who uses which apps, their departments, locations, and devices used. Our CASB solution provides the visibility and control needed to keep data safe as it moves into the cloud, and it does this in three ways: 1. Dis-

"The cybersecurity path forward requires a deeper analysis of behaviors. The first step is establishing a behavior baseline at the individual level."

This article is from: