Sign in to see all reviews and comparisons. It's Free!
By clicking Sign In with Social Media, you agree to let PAT RESEARCH store, use and/or disclose your Social Media profile and email address in accordance with the PAT RESEARCH Privacy Policy and agree to the Terms of Use.
Forcepoint’s APX Suite provides flexible deployment and management of unified Web, email, and DLP to stop increasingly advanced threats in hybrid environments spanning an enterprise network, mobile workers, and cloud services.
Category
User and Entity Behavior Analytics
Features
Detect threat at all lifecycle stages Identify threat across network and cloud services Allow risk scoring Allows risk visibility Enable adaption to advanced risks.
License
Proprietary Software
Price
Contact for Pricing
Pricing
Subscription
Free Trial
Available
Users Size
Small (<50 employees), Medium (50 to 1000 Enterprise (>1001 employees)
Company
TRITON APX Suite
PAT Rating™
Editor Rating
Aggregated User Rating
Rate Here
Ease of use
7.4
6.5
Features & Functionality
7.5
9.0
Advanced Features
7.5
8.9
Integration
7.6
8.8
Performance
7.4
9.2
Training
0.0
Customer Support
7.6
0.0
Implementation
—
Renew & Recommend
—
Bottom Line
TRITON APX products share a common architecture based on the TRITON ACE and ThreatSeeker Intelligence Cloud, which work together in real time to accurately identify and classify network traffic, apply policies and detect threats. TRITON APX’s unified management and reporting functions streamline work for your security team, giving them the context and insights they need to make better decisions, minimize the dwell time of attacks and prevent the exfiltration of your sensitive data.
7.5
Editor Rating
6.1
Aggregated User Rating
3 ratings
You have rated this
Forcepoint’s APX Suite provides flexible deployment and management of unified Web, email, and DLP to stop increasingly advanced threats in hybrid environments spanning an enterprise network, mobile workers, and cloud services.
TRITON APX products share a common architecture based on the TRITON ACE and ThreatSeeker Intelligence Cloud, which work together in real time to accurately identify and classify network traffic, apply policies and detect threats.
TRITON APX’s unified management and reporting functions streamline work for your security team, giving them the context and insights they need to make better decisions, minimize the dwell time of attacks and prevent the exfiltration of your sensitive data. Triton APX suite is a threat detection and prevention software. The software allows threats to be identified. The software is capable of detecting risks no matter how advanced they are. The software looks for threats in networks, mobile network and cloud services.
The software provides an advanced deployment of unified web, email and DLP security in order to identify risks. Structure of businesses are changing. Companies are becoming more vulnerable to threats, as there is a constant flow of information from one point to another. Mobile workers have increased, and with the use of cloud technology, systems of organization are more prone to clever and advanced attacks. In order to combat it, this software provides security across web and emails so as to protect the flow of information to and from the organization.
The software has the capability to identify threats across all lifecycle stages of a threat. The software makes use of advanced analysis feature and option to identify threats and stop them. The software is adaptive to changing technology and nature of risks. The software makes use of behavioral analytics to identify threats. The software scores threat and provide visibility so that one can see what’s going on and to determine actions accordingly. DLP module of the software prevents data loss, exposure of confidential and private information, theft of data and promotes security of inbound and outbound data. The software has the capability to protect data in cloud networks. The software allows easy threat detection and a quick risk management. The software with its powerful analysis techniques, threat detection across network is a quick and a straight forward job.
By clicking Sign In with Social Media, you agree to let PAT RESEARCH store, use and/or disclose your Social Media profile and email address in accordance with the PAT RESEARCH Privacy Policy and agree to the Terms of Use.