Forcepoint – Security Review Magazine https://securityreviewmag.com We bring you the latest from the IT and physical security industry in the Middle East and Africa region. Tue, 11 Mar 2025 08:01:02 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 https://securityreviewmag.com/wp-content/uploads/2024/08/cropped-SRico-32x32.png Forcepoint – Security Review Magazine https://securityreviewmag.com 32 32 Forcepoint to Acquire Getvisibility https://securityreviewmag.com/?p=27887 Tue, 11 Mar 2025 08:01:02 +0000 https://securityreviewmag.com/?p=27887 Forcepoint has announced that it has signed a definitive agreement to acquire Getvisibility, an innovator in AI-powered Data Security Posture Management (DSPM) and Data Detection and Response (DDR). Forcepoint’s Data Security Everywhere platform unifies visibility and control over sensitive data, while Getvisibility enhances the user’s ability to identify and mitigate data risk.

The acquisition tightens the synergy to simplify security management, enhance risk mitigation and speed compliance for enterprise and government customers. The agreement builds on a successful multi-year partnership, further integrating Getvisibility’s AI-driven risk visibility and remediation within Forcepoint’s full-lifecycle data security solutions. By strengthening interoperability between Getvisibility’s DSPM and DDR capabilities and the Data Security Everywhere architecture, Forcepoint enables seamless discovery, classification, prioritization, remediation and protection of sensitive data—including PII, intellectual property and other critical assets—across modern hybrid and AI environments.

For more than two years, Getvisibility’s DSPM and AI-mesh technology—a coordinated network of specialized AI models designed to improve accuracy and speed in data classification and risk detection—has been a core component in Forcepoint’s data security approach. Using Getvisibility technology, customers and partners gain superior visibility and insights into data risks such as redundant and obsolete data, improper access, misplaced files and regulatory exposure.

Getvisibility’s DDR capabilities, with integrated AI, automate classification and enable dynamic remediation to mitigate threats before they escalate. This acquisition expands that integration, delivering comprehensive security that continuously adapts to how users’ access, share and interact with data across devices, cloud applications and GenAI platforms.

“Data is the new currency of business, and every organization is racing to unlock its value while minimizing risk,” said Ryan Windham, CEO of Forcepoint. “By further integrating Getvisibility’s AI-driven DSPM and DDR into our portfolio, Forcepoint is equipping enterprises and governments with the visibility, automation and adaptive controls needed to transform data security from a compliance obligation into a strategic advantage. This acquisition reinforces our commitment to helping organizations protect sensitive data at scale, while turning security into a driver of growth and innovation.”

Managing data risk is critical for every organization’s success. All businesses are dependent on data which is crucial for accurate insights, decision-making, driving innovation and gaining a competitive edge. Loss of proprietary and sensitive data results in more than regulatory fines and remediation costs, today averaging $5 million per data breach. With the fast-rising tide of class action suits, industry insiders predict that breach-related class action costs will exceed regulatory fines by 50 percent in 2025. The stakes for mitigating data vulnerability and risk have never been higher.

“With data surging throughout the cloud, and GenAI systems increasing the risk that sensitive information will get exposed, organizations are struggling to know where their data actually is, how it’s being used, what the sensitivity of the data is, and how to protect it,” said Frank Dickson, Group Vice President for Cybersecurity Products at IDC. “They are tired of cobbling together siloed products and now are looking for new, integrated approaches that unify visibility and control so that they can reduce the complexity, cost, and risk of innovating.”

Forcepoint’s Data Security Everywhere approach unifies security policies across AI websites, endpoints, email, SaaS applications and custom environments. With Getvisibility’s DSPM and DDR capabilities even more deeply integrated, organizations will gain:

  1. Proactive risk visibility: Continuous discovery and classification of sensitive data across SaaS, cloud, and on-premises environments
  2. Real-time threat mitigation: Automated enforcement of security policies across CASB, Web Security and Enterprise DLP
  3. Adaptive security controls: Policy enforcement that uses the intelligence of AI to dynamically protect sensitive data across AI platforms (e.g., ChatGPT Enterprise, Copilot, Gemini) and enterprise applications

Ronan Murphy, Co-founder of Getvisibility, added, “From day one, our mission has been to help organizations understand their data risks—because you can’t secure what you don’t see. Real-time risk mitigation is key to preventing breaches before they happen. By joining forces with data security’s original architects, Forcepoint, we’re amplifying our AI-powered insights to help customers and partners pinpoint risk, protecting critical data assets with accuracy and speed that redefine industry standards.”

]]>
Forcepoint Gets New President of Go-to-Market https://securityreviewmag.com/?p=27542 Wed, 11 Dec 2024 06:02:09 +0000 https://securityreviewmag.com/?p=27542 Forcepoint has announced Rick Hanson has joined the company as President of Go-to-Market. In this newly created role reporting directly to CEO Ryan Windham, Hanson unifies the company’s Sales and Customer Success teams, amplifying Forcepoint’s commitment to helping enterprises and governments secure their most critical data with its Data Security Everywhere architecture.

As data continues to spread across hybrid environments and generative AI introduces new risks, organizations face mounting challenges in protecting sensitive information and intellectual property. Forcepoint’s Data Security Everywhere solutions offer unmatched visibility and control across all stages of the data security lifecycle, from discovery and classification to prioritization, monitoring and protection. By unifying security policies and leveraging AI-powered automation, Forcepoint enables customers to secure their data wherever it resides—on the web, in the cloud, or across devices—while simplifying compliance with rapidly evolving regulations.

“Our customers count on Forcepoint to simplify the complexity of securing their most valuable data,” said Ryan Windham, CEO of Forcepoint. “Bringing together Sales and Customer Success under Rick’s leadership will help us deliver even greater value, ensuring that every customer meets their security objectives and gains a strategic edge in their digital and AI transformations. Rick’s extensive expertise and mission-driven focus make him the perfect fit to ensure every customer realizes success as a milestone and a continuous journey.”

As President of Go-to-Market, Hanson will be responsible for scaling global go-to-market teams, driving strategies that align with customer needs and solidifying a customer-first culture focused on world-class service and support, execution agility and continuous improvement.

Hanson brings over 30 years of leadership experience and two decades as a Certified Information Systems Security Professional (CISSP). Most recently, he served as President at Delinea, where he spearheaded global go-to-market strategies across sales, marketing, customer success, and professional services. His previous roles include Chief Revenue Officer at Brightcove with executive positions at CA Technologies, Hewlett-Packard, Symantec, and RSA. Hanson began his career in the U.S. Air Force and later served as IT Director for U.S. Customs and Border Protection, gaining deep expertise in cryptography and secure IT operations.

“Forcepoint has always been ahead of the curve, pioneering data loss prevention (DLP) and redefining how organizations approach data security,” said Hanson. “What excites me most is how Forcepoint’s Data Security Everywhere architecture allows businesses to protect their data comprehensively while empowering their people to work productively anywhere. By unifying policies and automating visibility, classification and protection at scale, we’re transforming data security from a pain point into a business enabler. I’m proud to be joining a team that’s not just leading the market but reshaping what’s possible in cybersecurity.”

]]>
Strategic Implementation of Data Security Automation Can Save Time and Improve Accuracy https://securityreviewmag.com/?p=26951 Sat, 20 Jul 2024 04:39:35 +0000 https://securityreviewmag.com/?p=26951 Samer Diya, the Vice President of META at Forcepoint, says a well-implemented data security solution can provide the necessary visibility, accountability, and protection to safeguard sensitive data, even in the challenging environment of remote work

In your experience, how can companies leverage data governance automation to improve data security for remote workers?
Automating data governance is incredibly powerful for companies looking to enhance data security. By leveraging automation, organisations can streamline workflows, establish clear accountability, and enable efficient data security practices, even for a remote workforce.

The orchestration capabilities of solutions such as Forcepoint DSPM not only streamline workflows and establish clear data ownership but also make the process efficient and convenient. The solution allows organisations to personalise workflows based on data risk severity, ensuring targeted and appropriate responses to data security situations. For example, publicly exposed files can be swiftly relocated to secure internal repositories, and unnecessary files can be deleted to minimise potential risks. Improved communication and a well-oiled machine for data governance are the results of defined responsibilities.

Furthermore, solutions such as Forcepoint DSPM offer a comprehensive view and actionable insights, providing organisations with a deep understanding of their data landscape, including data stored by remote employees. This intuitive dashboard gives organisations a sense of being well-informed, with insights into data risks such as over-exposed files and redundant or outdated data. This centralised approach enables automating data governance workflows and helps businesses make informed decisions, ensuring data security regardless of location.

Solutions such as Forcepoint DSPM empower organisations to bolster data security for their remote workforce. This comprehensive strategy minimises risks, enhances operational efficiency, and ensures consistent compliance with regulations.

What are some key considerations when implementing automated data governance solutions for a remote workforce?
There are several key considerations to keep in mind to ensure effective data security and automation capabilities:

  1. Comprehensive Data Discovery and Classification: Initiate the process by employing automated data discovery and classification tools, such as Forcepoint DSPM. This critical step provides visibility into sensitive data across diverse environments, including cloud, on-premises, and remote work setups. Understanding the data landscape is essential for applying appropriate security controls.
  2. Streamlined Workflows and Clear Accountability: Aim for solutions that facilitate clear ownership and responsibilities for data handling. Well-defined roles ensure accountability and enhance workflow efficiency, even with a dispersed remote workforce.
  3. Customised Alerts and Remediation: Ensure that the ability to create customised workflows is based on risk assessment of data. Set specific criteria for notifications and remediation actions, such as securely relocating exposed files or deleting redundant data. This targeted approach minimises the impact of data security incidents, ensuring the protection of remote workers’ data.
  4. Regular Monitoring and Anomaly Detection: Implement regular monitoring of data access and usage patterns, especially in remote work scenarios. Real-time anomaly detection capabilities help identify and respond to suspicious activities, preventing potential data breaches and ensuring compliance.
  5. Seamless Integration with Existing Security Measures: Ensure that your chosen solution to support automated data governance integrates smoothly with your organisation’s current security tools and infrastructure. This unified approach strengthens your overall data protection strategy and simplifies security management for remote workers.

By addressing these important considerations, organisations can enhance data security, ensure compliance, and empower their remote workforce to operate productively and securely. A well-implemented data security solution can provide the necessary visibility, accountability, and protection to safeguard sensitive data, even in the challenging environment of remote work.

How can automation help address challenges like data access control and data classification in a remote work environment?
While humans continue to play a critical role, strategic implementation of data security automation can save time and improve accuracy, freeing up security teams to focus on high-priority problems and pursue more of a big-picture approach. Leveraging technologies that automate challenges like data access control and data classification can play a pivotal role in the following:

  1. Improved Data Discovery and Visibility: Solutions such as Forcepoint DSPM rapidly scan and identify sensitive data across diverse environments, including cloud, on-premises, and remote work setups. This comprehensive visibility provides a clear understanding of your data landscape, enabling the application of appropriate security controls, even with a dispersed remote workforce.
  2. Automated Remediation and Incident Response: Automation shines in triggering predefined remediation actions, such as securely relocating exposed files or revoking access, in response to data security incidents or policy violations. This rapid and consistent response mitigates the impact of data breaches or compliance issues, providing remote workers with swift and effective solutions.
  3. Continuous Monitoring and Anomaly Detection: Automated solutions continuously monitor data access and usage patterns, identifying anomalies that may indicate security threats or data misuse. This proactive security approach safeguards sensitive information in the remote work setting, ensuring a vigilant eye over data access.

By embracing automation for data discovery, classification, access control, and incident response, organisations can effectively tackle the unique challenges of data security in a remote work environment. The comprehensive approach enhances visibility, streamlines workflows, and fosters an agile and responsive data protection strategy.

What are some potential challenges associated with relying on AI for data security automation, and how can these be mitigated?
When relying on AI for data security automation, several potential challenges may arise, each requiring careful consideration and strategic mitigation. The dependence of AI systems on data quality is a critical factor. Inaccurate, incomplete, or biased data can undermine the accuracy and effectiveness of AI-driven security measures. Ensuring data quality is maintained through robust data governance practices, including data cleansing, validation, and enrichment, is essential. By investing in data quality management, organisations can improve the reliability and performance of AI-driven security solutions.

Cybersecurity risks targeting AI systems are a prominent challenge. AI systems are vulnerable to cyberattacks, such as data poisoning or model theft, which can compromise system integrity. Many tools can collect, store and process large amounts of data from various sources – including user prompts. If an employee inadvertently discloses sensitive information through a seemingly innocuous prompt, the AI tools could leak that data while answering the prompts of users outside the organisation – not only exposing the organisation to third-party risks but also amplifying the potential for data leaks.

To address this, robust cybersecurity measures specifically designed to protect AI systems are crucial. These measures include secure development practices, strong authentication, access control, and data protection capabilities like leveraging cloud-native DLP solutions. Additionally, regular security assessments help identify vulnerabilities and strengthen the overall security posture of AI systems, where ethical and legal considerations also come into play.

The use of AI in data security raises concerns about privacy invasion, the potential for malicious use, and the need to comply with regulatory frameworks. Developing comprehensive ethical and legal frameworks is essential to guide the responsible development and deployment of AI-driven security solutions. Organisations should actively engage in regulatory compliance and foster a culture prioritising ethical standards and privacy protection. While AI can reduce human error, excessive reliance on automation may lead to a lack of human involvement. Continuous training and awareness programs help operators understand AI’s limitations and foster vigilant human-AI collaboration.

]]>
Forcepoint Partners with AWS to Launch New Data Center in Dubai https://securityreviewmag.com/?p=25791 Tue, 25 Jul 2023 07:29:55 +0000 https://securityreviewmag.com/?p=25791 Forcepoint has announced it has formed an alliance with Amazon Web Services (AWS) to open a new data center in Dubai as part of the continued expansion of its Data-first SASE platform services in the Middle East. Forcepoint’s Data-first SASE approach to cloud-delivered security and connectivity focuses on protecting data everywhere. Organisations worldwide can simplify their transition from legacy point security products to cloud-delivered security by embracing SASE platforms such as Forcepoint ONE.

The new Forcepoint UAE data center will play a pivotal role in providing access to scalable, highly available, and resilient cloud services to accelerate the region’s digital transformation and advance intelligent cloud adoption of businesses. The expansion reinforces Forcepoint’s commitment to helping advance digital transformation and security in the region, in line with the UAE’s National Cybersecurity Strategy.

As AWS launched in the UAE last year, the team is committed to deploying the most advanced cloud technologies and achieving the highest level of security, in line with the ‘UAE Digital Economy Strategy’ which seeks to double the contribution of the digital economy to the UAE’s gross domestic product (GDP) from 9.7 percent as of April 2022 to 19.4 percent within 10 years. It also seeks to enhance the position of the UAE as a hub for the digital economy in the region and globally. AWS uses advanced technology infrastructure, which enhances cloud capabilities and continues to propel businesses such as Forcepoint to enhance digital transformation in the region, continuing to contribute to sustainable economic diversification and development.

“We are fully committed to providing industry-leading cloud security solutions to the most demanding enterprise and government customers and partners in the UAE and wider region, providing a superior, high performance, low latency, end-user experience which will enable our clients to securely drive growth and scale,” said Samer Diya, Vice President of Sales Emerging Markets, Forcepoint. “Our customers and partners can now start their journey to Zero Trust by securing access to the web, cloud and private apps with continuous control over data with the company’s Data-first SASE platform, Forcepoint ONE.”

]]>
Forcepoint Launches Global Managed Security Service Provider Program for Forcepoint ONE SSE https://securityreviewmag.com/?p=25603 Wed, 19 Apr 2023 12:28:41 +0000 https://securityreviewmag.com/?p=25603 Forcepoint has introduced its Managed Security Service Provider (MSSP) program for service providers, distribution partners, and other resellers. With managed services based on the Forcepoint ONE Security Service Edge (SSE) platform, Forcepoint partners can simplify Zero Trust security and gain predictable, repeatable revenue streams through cloud-first, hybrid-ready security.

Forcepoint ONE also allows partners to quickly differentiate their security offerings with Data-first SASE, integrating SSE with connectivity through FlexEdge Secure SD-WAN solutions. Forcepoint MSSP partners can help enterprises and government agencies turn security into a competitive advantage by increasing productivity, streamlining costs, and simplifying regulatory compliance.

“As more and more organizations look to MSSPs for their cybersecurity solutions, the opportunity for partners is absolutely massive with market growth to $53.22B expected in the next several years. And every customer we speak to is on a path to SASE, with many looking to

MSSPs for pay-as-you-go solutions that stop threats and data loss while letting users access information and apps securely on any device,” said Myles Bray, Chief Revenue Officer at Forcepoint. “Forcepoint ONE allows MSSP partners to fast forward their journey to Data-first SASE through the delivery of security convergence, subscription model, and business tools that enable partners to reduce complexity for mutual customers, drive recurring revenue, and quickly scale their service offerings.”

“Forcepoint’s data-centric focus on security aligns with our vision for proactive protection, detection, and remediation,” said Raluca Saceanu, CEO of Smarttech247, a Forcepoint partner. “Smarttech247’s hosted and managed services centered on Forcepoint ONE SSE cloud-native and Forcepoint enterprise data security solutions allow today’s enterprises to manage risk holistically and simplify security operations. This is a game-changer when adversaries are constantly finding new ways to steal confidential data.”

As a channel-first company, Forcepoint will help partners quickly incorporate SASE into their services through its MSSP program. Using the Forcepoint management portal, partners can update customer configurations and offer multi-tenant services with a few clicks. Subscriptions with simple billing help providers scale their profitability when end-user licensing needs change. With no significant up-front expenses, partners can offer Forcepoint ONE and Secure SD-WAN solutions quickly over the Internet and customers can add more services anytime.

Forcepoint also provides enablement and training support, including channel managers dedicated to building business plans with MSSPs and distribution partners. Additional Forcepoint MSSP benefits to partners include:

  • Unified Management: The Forcepoint ONE all-in-one console offers a single set of policies for securing remote, hybrid, and office workers.
  • Modern: Strong Zero Trust data security delivered with a cloud-native SASE architecture.
  • Global: Available everywhere, with 300+ points of presence for managed devices and agentless support for BYOD.
  • Reliable: 99.99% uptime since 2015.
  • Profitable: Cost-competitive, higher margin services.
]]>
Zero Trust is What Security Should Have Been From the Beginning https://securityreviewmag.com/?p=24462 Mon, 04 Jul 2022 12:13:19 +0000 https://securityreviewmag.com/?p=24462 In this exclusive interview, Petko Stoyanov, the Global CTO at Forcepoint, speaks about their new Forcepoint One offering, the evolving security threat landscape, the skills gap in the industry, and more

You recently conducted the Forcepoint One event. What was it all about?
We announced Forcepoint One way back in February 2022, globally, as a marketing event. And then on, we started focussing on regional events. At the UAE event, we had over a hundred people attending the event and we’ve definitely had a lot of interest in Forcepoint One. We spent some time with our customers at the event, understanding their challenges and explaining how Forcepoint One is a better way to access the internet securely – not just the Internet or cloud, but also private applications.

During the pandemic, many people were working from home and though they wanted to be productive in a new working environment, they lacked the tools. So, the users started using tools they weren’t supposed to. However, if we had visibility into that and gave the users control over the data they could use, it would have been amazing. That’s what is unique with Forcepoint One – we have centralised the management.

In doing so, we don’t need all your data. Your data stays with you and we want to give you control over the data that matters to you. So, the beauty of our solution is centralised management, distributed enforcement of security, and data loss prevention, and just visibly at the same time.

Another pain point customers are facing is hiring the right talent. For managing cybersecurity products and solutions, one needs to be a CSSP. However, the number of certified professionals in this region is far lower than the demand. There is a precise skill gap in this industry that needs to be tackled. We need to change how we approach cybersecurity and hiring.

How has the security threat landscape changed over the past couple of years?
Well, it has changed even in the last two months. We are seeing lots of geo-political tensions everywhere and these instances are being used as a reason to attack government installations, utility services, oil and gas installations, banking systems, telecoms, and so on.

The safety we feel here in the UAE is because of the regulation we have in place, which is a lot of ways, applies to cybersecurity. Regulations also drive other things globally. At Forcepoint, we offer many tailor-made solutions for such industry verticals. Our data loss prevention solutions are used by some of the largest organisations in the world and our threat prevention capabilities are used to protect some of the most sensitive networks in the world.

In terms of the skills gap you mentioned, what do companies need to do to solve this?
I think there are two problems with this. One is the demand issue, where we don’t have enough people to fill up the specialised jobs available. So we’ve got to train more and more professionals so they are qualified to take up such critical jobs. Another problem is that most companies are hiring the wrong set of talents for job openings. We need to list out the job criteria that make sense.

Do not hire someone who is a jack of all trades – he/she will always be a master of none. Companies need to ask these questions. Why do I need that certification? Why do I need 20 years of experience in cybersecurity? Why do I need expertise in a 10-year-old language that is going to be non-existent in the next couple of years? So I would say, companies need to start asking questions about their hiring rates, making sure they have the right talent for the right job.

I think there are multiple things we’ve got to do as an industry. We’ve got to educate more customers so they make sure they have the right people for the job. They need to understand that you do not require a Ph.D. to go configure a router or configure something on the network. You shouldn’t be spending months deploying software. It should be done in days not months. And that is exactly what Forcepoint One is tackling.

What is your take on the Zero Trust Framework?
So, I’ve been working on the Zero Trust concept for the past three years. The US government’s been using it extensively. And the way they started is, they started actually started using Zero Trust almost 10 years ago. Zero Trust is what security should have been from the beginning. Because you’re applying security and controls only to the data – so users need to only access what they need to. But there are multiple layers of security in Zero Trust.

There’s Zero Trust where we need user data. There’s Zero Trust where you need the device. And then there are applications. You want to make sure that the user, the device, and the application have access to data, but also ensure at the same time that any data that goes to those users and devices are authorised. So it’s in many ways, applying the concept of what’s known as least privilege to the data element, the device element, the application layer, and the user.

Do you offer certification programs for your channel partners?
Yes, we do offer certification programs to make sure channel partners are at the forefront of everything we do. We are also investing a lot to make sure this happens – in the last 18 to 24 months, we’ve doubled the size of our team here. We keep our training and certification programs simple, so when our certified partners go to a customer, they know what they are talking about in order to suggest solutions to solve their issues.

What were your learnings from last year and how are you using those to better your strategies for this year?
So, in January 2016, Forcepoint spun out of Raytheon. Even though we are now an independent company, Raytheon still uses our software and hence they are our customers. So, as soon as we went on our own, we got into an acquisition mode – buying technologies and companies that complemented our ecosystem of solutions.

Our strategy has always been to invest in new solutions that complement our existing set of solutions and offer a complete end-to-end solution. So today we are capable of integrating additional solutions such as RBI, CDR and ZT, and so on. So all of these are being offered as a bouquet of services through our management platform.

]]>
GITEX 2021: Forcepoint to Focus on Network Security, Data Protection, and Cloud Security https://securityreviewmag.com/?p=23177 Wed, 13 Oct 2021 13:54:50 +0000 https://securityreviewmag.com/?p=23177 Jawad Toukna, the Director for Regional Sales at the Middle East and North Africa at Forcepoint, speaks about his company’s participation at GITEX 2021

Are you participating in GITEX 2021? If yes, which products and solutions will you be showcasing at GITEX Technology Week?
Forcepoint is participating in GITEX 2021 with two of our key distributor partners, Mindware and Starlink. Throughout GITEX, we will be running demos of all our key solutions. The highlight will be on Forcepoint’s Data-First SASE platform – our unique approach to securing hybrid and rapidly evolving computing environments.

Providing secure network access is only half the battle. Progressive organizations must also address the protection of precious information assets in perimeter-less networking environments. Forcepoint is revolutionizing data security by enabling users to safely access and use data anywhere they work.

Forcepoint’s SASE goes beyond just securing access to the web, cloud, and private applications. We put our industry-leading data protection at the centre of our SASE platform, giving customers unique control over how their data is used even after it is downloaded. We help customers make their people more productive and their business safer.

All products including network security (NGFW and SD-WAN), data protection (DLP, CASB) and cloud security (Secure Web Gateway and Cloud Security Gateway) will be on show.

What are your expectations from the event this year?
It’s good to get back to meeting with customers in person, and we are excited to share Forcepoint’s forthcoming refreshed channel partner strategy as well as demonstrate Data-first SASE. Gartner rightly identifies SASE as a philosophy rather than a single product. Adoption of SASE happens incrementally—addressing immediate business needs first, then expanding to solve other problems over time. During GITEX we’ll be working with enterprises to listen to their needs and requirements and offer consultancy on securing their cloud migration.

What will be your theme of participation at GITEX?
Companies have had to evolve rapidly over the last eighteen months, and the disruption caused by the pandemic has accelerated digital transformation timelines. The shift to a remote workforce essentially changed how employees interact with data, and Forcepoint will be working with customers and prospects at GITEX to address these challenges.

While some workers are returning to offices, hybrid working is a reality that’s here to stay. It’s imperative that companies maintain control of data and ensure that sensitive information is protected: organisations are rethinking their security policies to avoid a potential leak or breach. The industry needs a modern approach to cybersecurity. Forcepoint’s data-first SASE is based on a converged data protection platform, bringing together data protection and secure access to provide a user and data-aware risk/trust model.

How have your regional strategies changed in recent months?
Regardless of their location, enterprises need to react to rapidly evolving hybrid workforces and ever-expanding SaaS applications. The digital transformation the region has gone through in the last year is extraordinary. Prior to COVID-19, only ten percent of workers in the UAE reported working from home one to two days per week, compared to a global average of 62 percent, according to a 2019 survey by International Workplace Group. This means that the trend to transition to the cloud was accelerated, and the network perimeter has truly dissolved.

Recently the head of UAE Government Cyber Security told CNBC that the UAE had seen a 250% increase in cyberattacks in 2020, while data breaches in Middle Eastern countries cost an average of $6M per incident, according to an independent report commissioned by IBM Security. Data is the building block of today’s digitized economy and the opportunities for innovation and malice around it are incalculable.

We see Forcepoint’s data-first SASE strategy as the way forward for organizations in the Middle East and we are investing in the solutions and offerings to support this. Forcepoint recently acquired Cyberinc and Deep Secure – and this is just the beginning of the many investments in the months and years ahead as Forcepoint executes our mission to strategically build, partner, and acquire technologies to innovate the industry’s best-in-class SASE architecture that helps secure and enable our customers’ business.

Forcepoint is providing security for hybrid and rapidly evolving computing environments, with converged security offerings delivering secure network access, protection of precious information assets, and delivery of unified secure access and data protection that spans on-premises, hybrid, and cloud.

Data-first SASE ensures customers can secure data access and usage, by closing down attacks and opening up data use. Today’s reality is that people are working from everywhere, and progressive organizations must address the protection of precious information assets in perimeter-less networking environments.

]]>