






Forcepoint has been a trusted mission partner of the U.S. Government for over two decades, relied on not just for products, but to enable the mission.

Forcepoint experts consistently pioneer new standards, develop distinct products and adapt to rapidly changing threats and advances. Our human-centric approach is ideally suited to the complexities of government objectives and culture, helping us earn the trust of national security professionals at every level. Forcepoint technology is built from the ground up to meet four essential needs:

Forcepoint experts consistently pioneer new standards, develop distinct products and adapt to rapidly changing threats and advances. Our human-centric approach is ideally suited to the complexities of government objectives and culture, helping us earn the trust of national security professionals at every level. Forcepoint technology is built from the ground up to meet four essential needs:



Products for distinct security needs
Forcepoint security products work seamlessly with one another and integrate within complex existing environments. Our professional services help ensure their value is fully realized.
Cross-Domain Solutions Access
Cross-Domain Solutions Transfer
Trusted Gateway System
Multi-network solution that enables safe, multi-directional unstructured file movement between physically separate networks.
High Speed Guard
Ensures secure automated data transfer between multiple networks with the industry’s fastest transfer rates.
Data Diode
Rapid, uni-directional, and automated transfer of highly complex data to segment and protect networks and devices.
Resources
Dive deeper into Forcepoint in action

Read the eBook

Read the Whitepaper

Read the Report

Compliance with a full range of mandates, programs and accreditations
By staying current on ever-evolving requirements, Forcepoint and our channel partners help reduce procurement and acquisition cycles.
Mandates
- Continuous Diagnostics and Mitigation (CDM)
- Raise the Bar (RTB)
- Cybersecurity Maturity Model Certification (CMMC)
- FedRAMP
- Commercial Solutions for Classified (CSfC)
- General Data Protection Regulation (GDPR)
- TIC 3.0
- NIST SP 800-171 Supply Chain Compliance
- ITAR Compliance
- Federation Information Security Modernization Act (FISMA)
- NIST SP 800-53
- Federal Information Technology Acquisition Reform Act (FITARA)
- HIPAA Compliance
Programs and Vehicles
- U.S. General Services Administration (GSA)
- Solutions for Enterprise-Wide Procurement (SEWP)
- CIO-CS
- DHS FirstSource II
Accreditations
Achieved through strict adherence to Common Criteria Evaluation and Validation Scheme (CCEVS) Assessment and Authorization (A&A) processes
Trusted Thin Client
- Trusted Thin Client Remote
- RTB & NCDSMO Listed
- TSABI (JWICS-SIPR) Since 2006, Touch Screen 2012
- SABI (SIPR-NIPR) Since 2008
Forcepoint On-Premise Security 8.5
- Common Criteria (CC)
Cloud Access Security Broker
- FedRAMP in process
Guards
- Trusted Gateway System
- RTB & NCDSMO Listed
- TSABI (JWICS-SIPR) Since 2011
- SABI (SIPR-NIPR) Target 2018
- Trusted Print Delivery and Trusted Mail System
- TSABI (JWICS-SIPR) Since 2016
- High Speed Guard
- RTB & NCDSMO Listed
- TSABI (JWICS-SIPR) Since 2001
- SABI (SIPR-NIPR) Since 2013
- SimShield
- RTB & NCDSMO Listed
- TSABI (SIPR-NIPR) Since 2009
- WebShield
- TSABI (JWICS-SIPR) Since 2011
- Next Generation Firewall
- Commercial Solutions for Classified (CSfC)
- FIPS 140-2
- Common Criteria (CC)
- Defense Information Network - (DoDIN) Approved Product List (APL) IPv6 Section 508 Accessibility
Guided by recognized experts









