Every second of the day...
Forcepoint ThreatSeeker scours the vast expanse of online content for potential threats. It receives global input from over 155 countries and analyzes up to 5 billion requests per day. Forcepoint ThreatSeeker also serves to distribute threat intelligence to Forcepoint solutions around the world, which last year generated an average rate of 3.2 pieces of threat intelligence every second.
Continuous Threat Collection
Forcepoint ThreatSeeker collects content in all its online forms, including web pages, documents, executables, scripts, streaming media, emails, mobile apps, and other internet traffic. It processes billions of pieces of email and web intelligence daily, to reveal evolving threat trends and identify new types of content to gather. As it operates, Forcepoint ThreatSeeker:
Monitors popular websites
to see if they’ve been compromised or hijacked
Tracks geographical hot spots
new URL listings and other potentially revealing Internet activity
Follows breaking news
trending topics and viral social media to identify additional content to assess
Multi-Engine Threat Identification
To identify threats, Forcepoint ThreatSeeker uses multiple scanning engines working in parallel with a series of out-of-band analyses, all performed under the constant supervision of Forcepoint Security Labs™ researchers. Forcepoint ThreatSeeker actively identifies zero-day and other unknown threats, safeguarding organizations from breaches. This protection is made even stronger by ThreatSeeker's other capabilities, including:
Big Data Analysis
Proprietary big data analysis tools enable automated assessment of key trends and indicators. Security Labs researchers then investigate anomalous activity to gain deeper understanding of emerging threats and improve defenses.
Threat Sandboxing
New and suspicious executables uncovered by Forcepoint ThreatSeeker Intelligence are scrutinized in context for Indicators of Risk (IoR), but also detonated in a sandbox and interrogated for potentially malicious behavior.
Mobile App Profiling
This special sandbox performs malware tests and monitors the permission-related activities of mobile apps to detect indications of malicious intent. Results are used to maintain the “Mobile Malware” and “Unauthorized Mobile Marketplaces” security categories within Forcepoint security products.