Forcepoint has launched Dynamic User Protection to advance modern user activity monitoring (UAM) and insider threat protection, leveraging a cloud-native solution to deliver out-of-the-box functionality with no policy configuration, providing real-time visibility into true risk behaviors of compromised users within hybrid cloud environments.
"In this next phase of cybersecurity, managing risk across the cloud, network and endpoint will drive everything. With Dynamic User Protection, Forcepoint is changing the rules of the cybersecurity game by delivering global enterprises the ability to automatically enforce security policy across all control points tailored to a specific end-user based on the risk they represent," said Nico Popp, chief product officer at Forcepoint.
With the shift to remote work due to COVID-19, user security threats increased with critical data and intellectual property in unmanaged home environments. There has been a 400 percent increase in cyberattacks in 2020, according to an FBI report.
Forcepoint’s Dynamic User Protection, organizations will be able to monitor user activity monitoring with mainstream enterprise access to continuous risk assessment across security control points.
Dynamic User Protection's risk scores transform the traditional audit-only mode Data Loss Prevention (DLP) deployment to become intelligent DLP by automating policy response based on level of risk while significantly reducing false positives.
Dynamic User Protection utilizes Indicators of Behavior (IoB) as the real-time analytics engine to determine the overall risk of an entity. These IoBs deliver security teams context around behaviors and by combining multiple behaviors determines true risk scores that assess overall risk of an entity as good or bad.
"Digital transformation initiatives have been accelerated by a surge in remote work… Leveraging User Activity Monitoring-as-a-Service allows enterprises to take advantage of what could best be called a 'data scientist in the cloud' to proactively manage user risk and protect critical data from being breached," said Doug Cahill, vice president and group director at Enterprise Strategy Group.