Forcepoint, previously known as Websense and Raytheon/Websense, is an Austin-based company owned by US defense contractor Raytheon specializing in computer security software.

Enterprise SD-WAN connectivity and NGFW security for distributed enterprises


- Modular appliances for every environment

Our broad range of appliances provide the right price-performance and form factor for each location; pluggable interface cards let you change networks with ease.

- High availability, mixed clustering

Active-active clustering lets you mix up to 16 different models of appliances for unrivaled scalability, longer lifecycles, and seamless updates without dropping packets.

- Multi-link connectivity for SD-WAN

Broadband, wireless, and dedicated lines at each location can be centrally deployed and managed, providing full control over what traffic goes over each link with automated failover.

- Automated, zero-downtime updates

Policy changes and software updates can be deployed to hundreds of firewalls and IPS devices around the world in minutes, not hours, without the need for service windows.

- Policy-driven centralized management

Smart Policies describe your business processes in familiar terms and are automatically implemented throughout the network, managed in-house or via MSSP.

- Actionable, interactive 360° visibility

Graphical dashboards and visualizations of network activity go beyond simple reporting, enabling admins to drill into events and respond to incidents faster.

- Built-in NGFW, VPN, proxies, and more

Unparalleled security comes standard, from top-ranked Next Generation Firewall and IPS to rapid-setup VPNs and granular decryption, as well as our unique Sidewinder proxy technology.

- Top-ranked anti-evasion defense

Multi-layer stream inspection defeats advanced attacks that traditional packet inspection can't detect—see for yourself in our Evader video series.

-Human-centric endpoint context

Access policies can whitelist or blacklist specific endpoint apps, patch levels or AV status. Users' behaviors are consolidated into actionable dashboards.

- Unified virtual and physical security

Native support for AWS, Azure, and VMware has the same capabilities, management, and high performance of our physical appliances.

- CASB and web security

Our reknowned URL filtering and industry-leading cloud services work together to protect your data and people as they use apps and web content.

- Anti-malware sandboxing

Forcepoint Advanced Malware Detection blocks previously undetected ransomware, zero-days, and other attacks before they steal sensitive data or damage your systems.

- APIs

Rich application programming interfaces enable SD-WAN and NGFWs to be integrated with orchestration, management, and third-party analysis infrastructure.

- Certifications

Forcepoint Next Gen Firewalls are rigourously tested to comply with major industry and government certification requirements.

Safeguard against data breaches

Follow your data across networks and devices—both at rest and in use. Create and enforce policies that provision the access and movement of data to prevent data breaches and help ensure compliance with Forcepoint Data Loss Prevention (DLP).


- Data fingerprinting

Follow data with automatic application of controls, even when user devices are not on the network.

- Predefined policy library

Get started quickly with an extensive Policy Library that addresses common regulatory and IP protection use cases, including GDPR.

- Optical character recognition

Enables textual data, including PII and PHI, to be detected and extracted from images—such as source code, engineering drawings, M&A docs, and trade secrets.

- Automated protection

Use file and email encryption with Forcepoint's DLP solution to automatically apply protection controls to sensitive or confidential files.

- Advanced incident workflow

Secure workflow notifications for data owners, providing users role-based access and data privacy on their mobile devices with DLP.

- Single console control

Set data loss prevention policies across your network and endpoints once, from a single console for your environment.

- Gain visibility into Microsoft Rights Management

Enable Microsoft Protection RMS to securely share information with partners. Automatically encrypt and decrypt using Microsoft Information Protection.

- Achieve risk-adaptive protection

Leverage DLP within the Dynamic Data Protection solution to achieve automatic policy enforcement in a matter of seconds.

- Educate data owners to protect data

Dynamic in-action coaching to educate end-users on appropriate data use while using Forcepoint's DLP tool.

- Data leakage prevention

Detect and protect against low and slow data exfiltration and data leakage via print, email, cloud applications, and removable media.

Empower users and protect data—without sacrificing productivity

Forcepoint has the most complete and secure application controls in the web security space


- Integrated CASB functionality

Easily extend visibility and control to cloud applications, from shadow ITreporting to full control via inline (proxy) mode.

- Not just URL filtering

Don’t need your traffic forwarded to the cloud? Enable URL filtering in our leading Next Generation Firewall (NGFW), allowing for granular controls based on users and applications.

- Streamline compliance

Meet the highest certification standards across data privacy laws and residency requirements in different jurisdictions—while allowing users to keep doing good things.

- Expand internet access for roaming users

Apply different policies when an employee connects from corporate and non-corporate locations with Forcepoint Web Security.

- Security and protection beyond the endpoint

Extend your existing policies to mobile devices and protect them from Advanced Threats, mobile malware, phishing attacks, spoofing, and more with Web Security.

- ThreatSeeker Intelligence

Unite over 900 million endpoints (including inputs from Facebook), and with Forcepoint ACE security defenses, analyze up to five billion requests per day. This is the core collective intelligence for all Forcepoint products—managed by Forcepoint Security Labs.

- Enterprise-grade DLP protection

Forcepoint’s 9x Magic Quadrant leading DLP and integrated Incident Risk Ranking (IRR) can protect your data from people-based security incidents, including risk caused by accidental, compromised, and malicious insiders.

- Eliminate crippling false malware with AMD

Cloud sandboxing allows you to optimize remediation efforts for incident response teams with comprehensive and actionable intelligence—providing 100% efficacy in malware detection.

Optimum value comes from effective, holistic email security


- Real-time threat protection

Real-time threat protection uses a unique blend of detection technologies, including machine learning, sandboxing, and predictive analytics to effectively stop advanced threats such as ransomware.

- Protection against highly evasive zero-day threats

Get advanced malware detection (sandboxing) with our full system emulation sandbox. Deep content inspection reveals highly evasive zero-day threat with no false positives.

- Powerful encryption for additional protection

Encrypt sensitive email conversations and enhance mobile security by controlling sensitive attachments access by device.

- Incident risk ranking to find the greatest risks

Incidents are correlated across multiple events to identify true cumulative risk trends and activity. A risk score is included to help security teams identify the greatest risks based on real-time activity.

- Integrated data loss prevention

Integrated industry-leading data loss prevention stops data infiltration and exfiltration capabilities.

- Unique phishing education feature

Use Forcepoint Email Security’s unique phishing education features to help users adopt best practices and identify those who need additional training to improve their security awareness.

- Complete out-of-the-box solution

Forcepoint Email Security includes DLP, URL wrapping, and other capabilities that are considered premium "add-ons" or upgrades by many competitors, delivering the most comprehensive inbound and outbound defenses out of the box.

- Deployment flexibility

How you deploy our email security solution is up to you. Choose from a range of physical and virtual appliances to leverage existing hardware, cloud deployment, or hybrid environments.