by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : January and February 2016
by making processes and functions more efficient and cost-effective. A report from IDC Government predicts government IoT will grow at a compound annual growth rate of 17.1 percent through 2018, with local government projected to lead in overall IoT implementation. From a security perspective, though, the problem with the IoT is information is potentially being shared across multiple security levels and widens the attack surface. The Forcepoint platform can offer safeguards to data held and transmitted by these devices, and the networks to which they are connected, to avert compromise and minimize any potential damage. Cloud: The cloud is slowly but surely gaining converts throughout government agencies. However, the majority of government cloud implementations today are for low- and medium-security processes. These include development and collaboration, file sharing and content sharing on non-secure projects. When it comes to sharing sensitive data in the cloud, however, agencies are much more reticent, even when they use private, FedRAMP-approved clouds. The most secure approach requires treating the cloud like another network and deploying network segmentation and compartmentalization techniques used to separate classified and sensitive networks. Together with robust network and user monitoring that covers all potential attack surfaces whether they originate on the inside (data loss and leakage) or from the outside (breaches and theft), the Forcepoint platform provides the right mix of integrated security controls to ensure a higher degree of trust in a cloud environment. CONSIDER THE 4 D’S Making the most of innovative technologies like mobility, the cloud and IoT requires integrated, next- generation security technologies that can defend organizations and their data against insider threats and external attacks, detect suspicious activity and potential breaches, give the context needed to decide what actions to take to defeat attacks and threats before they can do harm. Only by taking all these steps in a holistic way can agencies defeat cyber-threats. Forcepoint calls these combined forces 4D Security: Defend, Detect, Decide and Defeat. Defend: Defending against threats—from insiders and outsiders—is critical to reducing the amount of cyber-events that require additional work to address. With today’s most determined adversaries and the growing risks posed by people who are already Sponsored Content SPECIAL REPORT CYBERSECURITY SOLUTIONS AND STRATEGIES A Unified Security Platform Safeguard users, data and networks with the unified, cloud-centric platform from Forcepoint. Forcepoint’s security platform integrates with your existing infrastructure to help safeguard users, data and networks. The 4D platform delivers modular security solutions that can share a common security context, making them more effective in detecting suspicious activity and content sooner. Content Security: Forcepoint enables secure communication and content sharing over e-mail, the Web and other channels without being attacked by advanced threats. In addition, with sophisticated Data Loss Prevention integrated directly into the security gateways, organizations can prevent information from being accidentally or maliciously transmitted. In addition, Forcepoint offers data compartmentalization and network segmentation solutions that provide a higher level of information assurance and safeguards from data thefts, leaks and spills. Insider Threat Data Protection: Monitor user behaviors to identify the early warning signs that might lead to breaches and to detect and block attempts to move sensitive data in and out of your agency. The Forcepoint solutions can automatically identify the riskiest users, based on their behaviors. This unique approach gathers and provides rich context around user behaviors, including record and playback of user activities before, during and after risky behaviors so that you take the actions necessary to protect your mission. Security for Cloud: Forcepoint’s comprehensive platform lets agencies safely move to the cloud, taking advantage of the latest technologies for mobile users and distributed organizations. Helping you take full advantage of Office 365, Web applications and email without sacrificing the controls and security you’ve come to depend upon in the government workplace. In addition, you have the ability to discover what sensitive data is stored in sanctioned apps and to identify any risky unsanctioned apps that might be in use. You can even protect your Linux app server farms by detecting potential threats without compromising the performance of your mission-critical systems. Network security: Agencies and global forces are more decentralized than ever before. Forcepoint delivers the latest in resilient, distributed next-generation firewalls to reliably enforce a consistent set of security policies across your headquarters, field locations, home offices, or in theater—all from a single console. It integrates application control, sophisticated evasion prevention and an intrusion prevention system (IPS) into a single, easy-to-deploy solution. EOD-Raytheon-GCN-22898.indd 2 1/27/16 12:29 PM
March and April 2016