Vai al contenuto principale

Forcepoint
ThreatSeeker

Automate your Security Intelligence Network to Stay Ahead of Evolving Threats

Every second of the day...

Forcepoint ThreatSeeker scours the vast expanse of online content for potential threats. It receives global input from over 155 countries and analyzes up to 5 billion requests per day. Forcepoint ThreatSeeker also serves to distribute threat intelligence to Forcepoint solutions around the world, which last year generated an average rate of 3.2 pieces of threat intelligence every second.

Continuous Threat Collection

Forcepoint ThreatSeeker collects content in all its online forms, including web pages, documents, executables, scripts, streaming media, emails, mobile apps, and other internet traffic. It processes billions of pieces of email and web intelligence daily, to reveal evolving threat trends and identify new types of content to gather. As it operates, Forcepoint ThreatSeeker:

focal_point_graphic-247.png

Monitors popular websites

to see if they’ve been compromised or hijacked

Tracks geographical hot spots

new URL listings and other potentially revealing Internet activity

Follows breaking news

trending topics and viral social media to identify additional content to assess

Multi-Engine Threat Identification

To identify threats, Forcepoint ThreatSeeker uses multiple scanning engines working in parallel with a series of out-of-band analyses, all performed under the constant supervision of Forcepoint Security Labs™ researchers. Forcepoint ThreatSeeker actively identifies zero-day and other unknown threats, safeguarding organizations from breaches. This protection is made even stronger by ThreatSeeker's other capabilities, including:

  • Big Data Analysis

    Big Data Analysis

    Proprietary big data analysis tools enable automated assessment of key trends and indicators. Security Labs researchers then investigate anomalous activity to gain deeper understanding of emerging threats and improve defenses.

  • Sandboxing

    Threat Sandboxing

    New and suspicious executables uncovered by Forcepoint ThreatSeeker Intelligence are scrutinized in context for Indicators of Risk (IoR), but also detonated in a sandbox and interrogated for potentially malicious behavior.

  • Mobile App Proofing

    Mobile App Profiling

    This special sandbox performs malware tests and monitors the permission-related activities of mobile apps to detect indications of malicious intent. Results are used to maintain the “Mobile Malware” and “Unauthorized Mobile Marketplaces” security categories within Forcepoint security products.

Talk to an Expert

Forcepoint ThreatSeeker works non-stop to help organizations deal with the unknown — and only Forcepoint has it.