New Forcepoint X-Labs Delivers World’s First Security Lab Dedicated to Behavioural-Intelligence Innovations

Forcepoint

Stand:
  • C120
  • Product Information
  • Images
  • Document
  • Social Media
  • Video
Forcepoint is the human-centric cybersecurity company that understands people’s behaviour as they interact with critical data and systems. Forcepoint’s behaviour-based, risk-adaptive cybersecurity sys...Forcepoint is the human-centric cybersecurity company that understands people’s behaviour as they interact with critical data and systems. Forcepoint’s behaviour-based, risk-adaptive cybersecurity systems deliver converged solutions that enable organisations to empower their employees to innovate, while protecting intellectual property and simplifying compliance.More

View Company Profile

New Forcepoint X-Labs Delivers World’s First Security Lab Dedicated to Behavioural-Intelligence Innovations

20 Mar 2019

Forcepoint's X-Labs division combines deep security expertise with behavioural science research. The new X-Labs team will use data insights from the entire Forcepoint portfolio to drive innovation in modern, risk-adaptive security solutions. This will deliver more flexible and effective cybersecurity solutions appropriate for today’s cloud-first threat landscape.

Product Categories

  1. Product Categories
    Anti-Malware
    • Anti-Spam
    • Anti-Virus
    Application Security
    • Mobile Application Security
    • Patch Management
    • Secure Coding
    • Web Application Security
    Automation
    • AI/Machine Learning
    Business Continuity / Incident Response
    • Business Continuity
    • Data Breach Incident Management
    • Disaster Recovery
    • Incident Response
    • Security Information and Event Management (SIEM)
    Compliance
    • Audit
    • Governance
    • Legal Risk
    • Legislation and Standards
    • PCI-DSS
    • Security Policy
    Cyber Physical
    • Internet of Things
    • SCADA Security
    • Smart Grid Security
    Data Protection
    • Data Breaches
    • Data Loss Prevention
    • Database Security
    • Information Management
    • Information Risk Management
    • Privacy
    • Secure Disposal
    • Secure Storage
    Digital Forensics
    • Data Breach Incident Management
    • Fraud Detection
    • IT Forensics
    • Log Management
    Encryption
    • Digital Signatures
    • PKI
    • SSH
    • SSL
    Human Factors
    • Insider Threat
    • Recruitment
    • Security Training, Education & Awareness
    • Social Engineering
    Identity Access Management
    • Authentication Tokens
    • Biometrics
    • Digital Rights Management
    • Single Sign On
    • Two-factor Authentication
    • Virtual Authentication
    Internet Security
    • Email Security
    • IM Security
    • Social Media Security
    • Web Security/Web Filtering
    Managed Services
    • Cloud Security
    • Consulting & Professional Services
    • Managed Security Services
    • Outsourcing
    • Security-as-a-Service (SaaS)
    Mobile Security
    • BYOD
    • Mobile Access Management
    • Mobile Device Management
    • Tablet Security
    Network Security
    • Access Rights Management
    • End Point Security
    • Firewalls
    • Incident/Intrusion Detection
    • Intrusion Prevention/Detection
    • Network Access Control
    • Penetration Testing
    • Security Monitoring
    • Unified Threat Management
    • Virtualization Security
    • Wireless Security
    Payment Security
    • Ecommerce
    • Secure Transactions
    Risk Management
    • Big Data Analytics
    • Cyber Insurance
    • Risk & Vulnerability Assessment
    • Security Analytics
    • Threat Intelligence
    • Vulnerability Management

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.