Global Government
Cybersecurity

Data-centric protection supporting the mission for over two decades

Blog: Defining Zero Trust in the Wake of the Biden Administration’s Cybersecurity Executive Order
Blog: New Research - Are headlines hype or are U.S. federal cybersecurity threats growing?
Supporting the toughest national security challenges
Remote Worker Security
Safeguard the mission and information no matter where your people are located
Insider Threat Programs
Deep collection and forensics for unrivaled visibility
Cross Domain
Efficiency and security for segmented network environments
Zero Trust Security
Dynamically adapt to risk and improve resilience with integrated solutions
Cloud App Security
Prevent unauthorized data access across the cloud, web and data transfer
Critical Infrastructure
Protect vital operations with battle-tested security
Resiliency
Fortify your boundary across technology, processes and people

Forcepoint has been a trusted mission partner of the U.S. Government for over two decades, relied on not just for products, but to enable the mission.

Major General Joe Brendler
U.S. Army (Retired)
A proven leader in defense-grade security

Forcepoint experts consistently pioneer new standards, develop distinct products and adapt to rapidly changing threats and advances. Our human-centric approach is ideally suited to the complexities of government objectives and culture, helping us earn the trust of national security professionals at every level. Forcepoint technology is built from the ground up to meet four essential needs:

Forcepoint Global Governments
BROCHURE

Forcepoint experts consistently pioneer new standards, develop distinct products and adapt to rapidly changing threats and advances. Our human-centric approach is ideally suited to the complexities of government objectives and culture, helping us earn the trust of national security professionals at every level. Forcepoint technology is built from the ground up to meet four essential needs:

Access anywhere

Securely access mission critical data and business processes in the office, in the field or in the cloud

End-to-end visibility and control

Protect data everywhere it resides and moves across the enterprise, wherever your people work

Advanced analytics

Rapidly transform information from across the network into accurate insights to inform the right actions

Adaptive security

Stay ahead of evolving threats and prevent data loss in high-risk instances with behavioral-driven risk identification and real-time enforcement

The latest in government security, broadcast weekly
Our weekly podcast covers the latest cyber news, threats, and trends impacting the federal government.
Dedicated support across key sectors
Forcepoint serves a wide range of government and civilian organizations.
Defense
Intelligence
Civilian
Federal Systems Integrators
An established partner in mission-critical endeavors
Cross Domain Solutions average a 239% ROI

Products for distinct security needs

Forcepoint security products work seamlessly with one another and integrate within complex existing environments. Our professional services help ensure their value is fully realized.

Compliance with a full range of mandates, programs and accreditations

By staying current on ever-evolving requirements, Forcepoint and our channel partners help reduce procurement and acquisition cycles.

Mandates

  • Continuous Diagnostics and Mitigation (CDM)
  • Raise the Bar (RTB)
  • Cybersecurity Maturity Model Certification (CMMC)
  • FedRAMP
  • Commercial Solutions for Classified (CSfC)
  • General Data Protection Regulation (GDPR)
  • TIC 3.0
  • NIST SP 800-171 Supply Chain Compliance
  • ITAR Compliance
  • Federation Information Security Modernization Act (FISMA)
  • NIST SP 800-53
  • Federal Information Technology Acquisition Reform Act (FITARA)
  • HIPAA Compliance

Programs and Vehicles

  • U.S. General Services Administration (GSA)
  • Solutions for Enterprise-Wide Procurement (SEWP)
  • CIO-CS
  • DHS FirstSource II

Accreditations

Achieved through strict adherence to Common Criteria Evaluation and Validation Scheme (CCEVS) Assessment and Authorization (A&A) processes

Trusted Thin Client

  • Trusted Thin Client Remote
    • RTB & NCDSMO Listed
    • TSABI (JWICS-SIPR) Since 2006, Touch Screen 2012
    • SABI (SIPR-NIPR) Since 2008

Forcepoint On-Premise Security 8.5

  • Common Criteria (CC)

Cloud Access Security Broker

  • FedRAMP in process

Guards

  • Trusted Gateway System
    • RTB & NCDSMO Listed
    • TSABI (JWICS-SIPR) Since 2011
    • SABI (SIPR-NIPR) Target 2018
  • Trusted Print Delivery and Trusted Mail System
    • TSABI (JWICS-SIPR) Since 2016
  • High Speed Guard
    • RTB & NCDSMO Listed
    • TSABI (JWICS-SIPR) Since 2001
    • SABI (SIPR-NIPR) Since 2013
  • SimShield
    • RTB & NCDSMO Listed
    • TSABI (SIPR-NIPR) Since 2009
  • WebShield
    • TSABI (JWICS-SIPR) Since 2011
  • Next Generation Firewall
    • Commercial Solutions for Classified (CSfC)
    • FIPS 140-2
    • Common Criteria (CC)
    • Defense Information Network - (DoDIN) Approved Product List (APL) IPv6 Section 508 Accessibility

Guided by recognized experts

The Executive Advisory Board (EAB) of Forcepoint Global Governments and Critical Infrastructure (G2CI) provides our leadership with objective guidance. Advisors’ expertise spans all facets of the United States government relating to civilian, defense and intelligence agencies.
Marianne Bailey
NSA, DoD
Robert Bigman
CIA
Major General Joseph Brendler (Retired)
USCYBERCOM
Deborah Diaz
NASA, DHS, U.S. PTO, GSA
Rear Admiral William Leigher (Retired)
DoD, U.S. Navy
Richard Schaeffer
NSA, DoD
Barry West
DHS, FDIC, PBGC, DOC, FEMA, NWS, GSA
Chris Williams
DoD

Ready to learn more?