by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : January and February 2016
T oday’s threat landscape is quite different from yesteryear. The adversaries are sophisticated, the sources have expanded to include both insiders and outsiders and the promise of the enterprise perimeter has not materialized. Experts agree compromise is inevitable—it is not a question of if, but when. In this cat-and-mouse game, the adversaries seem to be one step ahead and dictate our priorities. While efforts have been in earnest, security teams find their strategies outdated, as they are awash with alerts from various point products. This, combined with a lack of resources and skills, makes it challenging for enterprises to function safely where business and operational advantages depend on new technological innovations. It is time to rethink security so we can forge our way forward without fear. It’s time to change the game so we are playing offense, rather than defense. It is time for a strategy that will help us confidently navigate the various risks new technologies and innovations pose to enterprises and agencies so that we can go about achieving our missions and operational objectives. Built on the successful integration of Websense®, Raytheon Cyber Products and the recently-acquired Stonesoft next-generation firewall (NGFW) business, Forcepoint brings a fresh approach to address the constantly evolving cybersecurity challenges and regulatory requirements facing businesses and government agencies. With an integrated portfolio of solutions based an innovative yet pragmatic approach that helps you confidently navigate the risks of operating in a dynamic IT landscape, Forcepoint was created to empower organizations, including federal agencies, to drive their business forward by safely embracing transformative technologies—cloud, mobility, Internet of Things (IoT), and others—through a unified, cloud- centric platform that safeguards users, networks and data while eliminating the inefficiencies involved in managing a collection of point security products. The Forcepoint platform will protect against threats from insiders and outsiders, provide data loss prevention (DLP), rapidly detect breaches, minimize “dwell time”— the period between compromise and remediation—and stop theft. DIGITAL INNOVATION IS JOB ONE Digital innovation is the key to helping government agencies achieve their mission and operational objectives. Some of the most important innovation enablers in use throughout government agencies today are mobile devices, the Internet of Things (IoT) and the cloud. Yet despite the promise of these innovative technologies, the cybersecurity tools and processes most agencies use today are not integrated and only serve to contribute to the tool and alert overload already being experienced. Agencies need an integrated platform that provides the strength and flexibility to secure legacy systems, as well as tomorrow’s innovations. Mobile Devices: Mobility—which lets employees use a variety of endpoints like phones, tablets and wearable computers to perform their jobs—is the basis of much of the innovation going on in government agencies today. There has been tremendous progress in the Bring Your Own Device (BYOD) movement. Teleworking is at an all- time high. Yet government agencies could achieve so much more if ensuring data security was more readily achievable. “There are two problems with mobile device security today,” says Ed Hammersla, President of Forcepoint Federal and Chief Strategy Officer at Forcepoint. “The first is that it is virtually impossible to build a device that is secure enough to protect all data that resides on it. The second is that the number of devices is so large and the operating systems are upgraded so frequently, that agencies find it very difficult to keep up with it all.” The Forcepoint platform provides a single reference point for solutions that will not only work with solutions you may already have in place, such as Mobile Device Management (MDM), but also provides new ways of approaching endpoint security – regardless of how widely your perimeter spans. Solutions that leverage virtualization and secure redisplay with those that provides user and usage monitoring can enhance security. Internet of Things: The IoT also has the potential to be a game- changer for government agencies, Attack on all Fronts: Defend, Detect, Decide and Defeat Yesterday’s cybersecurity tools and processes limit the benefits government can get from innovative technologies. Sponsored Content SPECIAL REPORT CYBERSECURITY SOLUTIONS AND STRATEGIES EOD-Raytheon-GCN-22898.indd 1 1/27/16 12:29 PM
March and April 2016