Key Findings. Websense Triton Security Gateway Anywhere
|
|
|
- Charity McKenzie
- 10 years ago
- Views:
Transcription
1 Websense Triton Security Gateway Anywhere A Usability Study and Performance Evaluation Executive Summary In today s global economy the ways in which businesses use the Internet have changed dramatically with cloud computing, social networking and burgeoning mobile workforces prime examples of this explosive growth. In turn, these have brought a host of new and highly sophisticated threats to data security which businesses must address if they are to adhere to ever stricter data protection regulations. Many security vendors are also struggling to keep up with the rapid evolution of malware. This has resulted in more complex and costly solutions that are often little more than assortments of third-party products with limited integration. Websense s latest Triton Security Gateway Anywhere (TSGA) has been developed to address these emerging markets. The company claims this as the first unified content security solution for web, mail and data security that doesn t rely on any third-party content analysis. Binary Testing was commissioned by Websense to evaluate the TSGA appliance solution in its lab based in Newhaven, Sussex. Its engineers deployed the appliance in a dedicated test network and looked at ease of use of its unified web interface, integration between the web, mail and data security components, inbound and outbound security policy management and data leakage protection features. The engineers ran tests using large samples of active web sites harbouring malicious content with a diverse range of attack vectors. Further samples were used of active web sites containing dynamic Web 2.0 content considered to be objectionable. Traffic throughput tests were also performed using a Spirent Avalanche 290 appliance Key Findings Websense TruHybrid is the industry s only security solution to include onpremises scanning and SaaS cloud services All security and reporting features are seamlessly integrated into a single unified management console Offers extensive web, mail and data security measures with sophisticated data leakage prevention Delivers a sustained throughput of 2,000 HTTP transactions per second with all security features enabled Real time categorisation and unified threat analysis deals effectively with dynamic web content and social networking sites Malware detection accuracy Sample size - 2,975 malicious web sites Spirent Analysis of HTTP TPS 1
2 Websense s Unified Web Management Interface The entire TSGA solution is managed from the Unified Security Center (USC) console and the Binary Testing engineers found initial deployment and ongoing administration particularly easy due to its simplified, intuitive design. Websense has avoided any complexity by grouping the main modules under three separate tabs for web, data and security. The TSGA Dashboards Consistency is maintained across each component thus simplifying ongoing configuration and the web and security tabs both open with customisable dashboards. The dashboards provide clear visibility into all security activities and can be customised easily to show areas of interest such as the current day s detected threats, security risks and policy actions for each module. The data security component is included as standard and this tab also opens with a dashboard showing a health summary for the day, data loss prevention (DLP) incidents and the most active policies. Further performance and security activity is immediately available from all three tabs. You can quickly bring up historical displays, view alerts or audit logs and, for the web security module, see all activity relevant to the Websense hybrid service. Policy Creation Operational consistency has been maintained for policy creation making this a simple process for all three components. The process has been streamlined as existing policies can be used as templates and modified to suit. Each web policy can contain multiple filters and Websense includes one of the most comprehensive URL category lists the Binary Testing engineers have yet seen. TSGA security policies were found to be simple to create and far more versatile than typical rule based systems. For example, many web security solutions can only enforce URL and protocol filtering as separate, unrelated entities whereas TSGA allows you to combine the two in the same policy. Websense goes further as bandwidth restrictions can not only be incorporated into the same policy but can have specific values set for individual web categories and protocols. Policy creation for inbound and outbound mail was found to be just as intuitive and DLP policies are even easier to deploy as Websense includes over 1,100 predefined rules as standard. 2 Multi-Role Management Management tasks can be delegated by creating various TSGA users each with assigned roles. At the top level, are global security administrators which have super user access to all TSGA modules. Beneath this you can create custom roles where users can be granted monitoring only or full access to any of the web, data or security modules. TSGA security policies were found to be simple to create and far more versatile than typical rule based systems. Reporting Facilities The Binary testing engineers found TSGA s reporting facilities to be extensive and capable of providing high levels of information. Furthermore, Websense provides sets of predefined reports for each module but allows them to be easily edited to suit requirements. This is an area many competing solutions fall down on as they often only provide a base set of predefined reports that cannot be modified and rely on customers providing their own third party reporting tools. TSGA reports for all three security modules can be used as templates, saved as new reports, customised extensively and scheduled to run at regular intervals.
3 Websense TruHybrid Technology Websense TruHybrid Websense s TruHybrid technology is unique as it unifies on-premises scanning and SaaS cloud services. It can be deployed for both web and security and the complete solution managed entirely from a single console. A key concept is the ability to deploy on-premises web and mail security at the company headquarters and use the SaaS component to extend the same security to branch offices and remote workers. Competing solutions that offer both services do not have the facilities to manage them from one console. Furthermore, they rely on third party cloud service providers and do not offer any integration between these and the on-premises services. By unifying these services, TruHybrid allows a single policy to cover both on-site and off-site security. IT support overheads are reduced and all SaaS activity can be reported on using the same TSGA module as for on-site reporting. How TruHybrid Works For the web component you can decide precisely which locations and users are to be filtered using the hybrid service. Locations can be defined by IP addresses, ranges or subnets and must be visible on the Internet for the hybrid service to work. As TruHybrid synchronises the appliances with the cloud services it allows policies created on-site to be applied to remote workers. Consequently, they will have the same levels of security applied to them as their head office co-workers. TruHybrid is highly flexible as user locations can be easily identified by TSGA allowing different web filtering policies to be applied based on whether a user is off-site or on-site. The component of TruHybrid works in precisely the same manner. The on-premises appliances work directly with the cloud services and determines the most appropriate mail filtering method. Users will then be protected from spam and threats regardless of their location. TruHybrid Configuration The Binary Testing engineers found configuration of the TruHybrid components very simple. The web component has a separate section for TruHybrid configuration where you specify filtered locations along with unfiltered destinations such as company webmail sites that users access directly without going over the Internet. 3 User connections to the hybrid service can be controlled using PAC (proxy auto-configuration) files or with Group Policies. Either way you can enforce proxy authentication and deliver a custom web blocking page specifically for TruHybrid users. The Websense Directory Agent may also be used to provide the hybrid service with user and group information. Websense s TruHybrid technology is unique as it unifies on-premises scanning and SaaS cloud services. A Sync Service on the appliances communicates with the TruHybrid cloud service and sends it policy configurations and user information gathered by the Directory Agent. It also receives reporting information from the cloud which is amalgamated into the local report databases. Registering for the TruHybrid service is equally simple as you decide which traffic will use the cloud service by defining mail domains and adding DNS details and MX records. On-site and off-site mail security policies are all created from the same user interface. An important feature of the TruHybrid mail service is its ability to scan mail for viruses, spam, phishing and malware in the cloud. This means that threats are identified and neutralised before they even reach the on-premises appliance so reducing network bandwidth usage and message quarantine storage usage.
4 Websense Threatseeker Network and ACE Threatseeker and ACE The threat landscape has changed dramatically over recent years making signature based security systems ineffective as they can always only ever be reactive. The sheer volume and dynamic nature of threats has increased and include targeted attacks with specific missions which traditional security systems cannot catch. Websense s ACE (advanced classifications engine) is unique as it provides unified real time deep content analysis for inbound and outbound web, and data security channels. Included across all Websense products, ACE works with the Websense Threatseeker network to provide high performance analysis of content as it is being viewed. From a network administrator s perspective, the Binary Testing engineers found that ACE requires no additional configuration after TSGA deployment. Content categorization is enabled by default along with analysis of links embedded within web pages. Scanning sensitivity is set to the optimum level although this can be modified using a slider bar if required. Outbound traffic will be scanned for bot and spyware phone home activities whilst database updates for the onpremises scanning services are updated at scheduled intervals which can be as often as every 15 minutes. Binary Testing engineers performed inbound threat tests using samples supplied with the Websense URL test kits. These contain web sites harbouring threats such as malicious iframe redirection, command and control of bot networks and obfuscation using dynamic scripting languages which require real time classification The test samples provided contain web sites gathered from the Threatseeker database and Websense has no control over them. Dynamic Categorisation - default web policy Sample size -1,724 URLs Dynamic Categorisation Spread of blocked sites Since the sample was taken, many of the listed web sites may have changed, been taken offline or had malicious content removed or modified to circumvent signature based scanners This reflects the dynamic nature of the web today and the requirement for the real-time classification capabilities of ACE. In the test results, sites that have been taken offline or cleaned up show as sites with errors or as allowed through. 4
5 Social network policy enforcement In order to protect data and adhere to regulatory guidelines, businesses must enforce workplace AUPs (acceptable use policies). By providing a unified solution for web, and data, TSGA simplifies this process as all AUPs can be created, deployed and reported on from a single console. Social networking is also now a major issue as it is fast becoming integral with the way business is conducted. Dynamic Facebook page categorisation Sample size - 2,269 URLs Policy Enforcement and Data Loss Prevention for the Social Web Sites such as Facebook can be a great business enabler but many also harbour undesirable or unproductive content. Websense s ACE overcomes these issues by examining each page s content so allowing social networking access but in a secure manner. Binary Testing engineers examined these features by using further web site samples from the URL test kit. These contained social networking pages where some were acceptable for business use and others contained undesirable content. Assuming their URL database was sufficiently up to date, less sophisticated security products would have simply blocked access to every site in the list. As shown in the graphs, TSGA permitted or denied access based on individual page contents. Facebook Categorisation Spread of blocked sites Data Leakage Prevention Websense s data security module provides the facilities to enforce DLP (data loss prevention) policies. For it can search for patterns and phrases in messages or within attachment content and TSGA includes predefined dictionaries of terms unacceptable for business use. Regulatory compliancy is very easy to implement as from the console you select which ones you want to apply and choose the country of operation. TSGA determines which regulations are most applicable for your locale and applies them for you. Fingerprints of sensitive files can be created and even if only a partial match is found the file can be blocked from being sent. Websense s PreciseID identifies content based on a huge dictionary of patterns such as credit card numbers and it can apply image analysis to mail. The Binary Testing engineers were impressed with the ease with which web and DLP policies could be created and deployed. Web policies can include size limits on postings, predefined PII, PHI and PCI-DSS regional rules and restrictions on the web sites where sensitive data may be sent. 5 Mail DLP policies were tested by sending messages across the two mail domains. Some attachments were Word documents with banned content and these were all successfully blocked. Analysis was also tested with a range of images and TSGA was found to be very proficient at quarantining those that were unacceptable. DLP activity can be monitored closely using a catalogue of predefined reports and views. For blocked mail, the engineers could see these in the incident reports and a forensics window provides views of the entire message content, attachment, recipient and sender.
6 Websense Application Controls Application Controls It s a well known fact that IM and P2P applications represent significant security risks and yet many vendors pay scant attention to these potential nuisances. Binary Testing has seen many security products that either offer blocking facilities only for a very small range of applications or no controls whatsoever. Up until now, the only answer to effectively control these applications was to implement costly point solutions. However, TSGA includes protocol filters as standard which provide granular controls for a wide range of applications. A huge list of predefined applications is provided and includes P2P file sharing and transfer apps, Instant Messaging, media streaming, proxy avoidance sites and many popular remote control tools. During web policy creation you can block or allow each individual application and request that protocol data be logged. Where certain applications are permitted, you can restrict their impact on the network by applying bandwidth optimisation. This will block further use if utilisation goes above a certain percentage of total network traffic or for this protocol only. Using protocol analysis allows TSGA to block selected applications regardless of the port being used and whilst Websense s application list should cover most requirements it is possible to add entries for those using non-standard ports. We found this a simple process where you add port numbers or ranges and apply IP addresses, ranges or subnets. During this phase it is also possible to activate blocking or allowing actions, data logging and bandwidth optimisation. The Triton Security Gateway Anywhere unified management console The TSGA web console simplifies management immensely by providing full access to all security components from a single, centralised console. In the picture above, we can see the policy creation process and the facilities for blocking web site content and applications. 6
7 The V10000 Appliance and Performance Tests The V10000 Appliance Many security vendors try to cut costs with their appliances and frequently provide hardware platforms that are underspecified for the task at hand. They may quote a high firewall throughput but this always drops substantially when all UTM features are enabled. The TSGA V10000 appliance in this evaluation is deployed as a high quality Dell PowerEdge R610 1U rack server. It uses the latest quad-core Xeon processors along with plenty of fast server grade DDR3 memory and includes RAID protected SAS hard disks plus dual redundant power supplies. The V10000 appliance when deployed with TSGA is aimed at headquarters and large branch office deployments and is designed to run all Security Gateway Anywhere components simultaneously on a single platform. Deployment time is reduced as the appliance is preconfigured and tested prior to being shipped. Websense also offers the V5000 appliances which target deployment at branch offices or for medium sized businesses. These are lower cost alternatives to the V10000 and are capable of running any one security component but do not support web and security together. Performance Tests To test performance of the V10000 appliance, the Binary Testing engineers used a Spirent Avalanche 290 appliance. It was connected in one-arm mode to the V10000 appliance over Gigabit Ethernet and tests were conducted with all TSGA security features enabled. Performance metrics gathered were the maximum sustained HTTP TPS (transactions per second) and maximum inbound and outbound TCP throughput. The Binary Testing engineers also recorded the average TCP response times and successful transactions during these tests. Incoming and outgoing traffic Spirent Avalanche throughput tests with all security scanning enabled Average throughput in Kbps Incoming Outgoing Average TCP response times Successful TCP transactions 7
8 Conclusion and Lab Testing Scenario The Binary Testing engineers were impressed with the range of web, mail and data security functions Websense has incorporated into the Triton platform. Management using the Unified Security Center (USC) web console is straightforward and all features have been seamlessly integrated into it. The USC interface was found to be very intuitive and by grouping the main modules under three separate tabs for web, data and security, Websense has neatly avoided any complexity. The dashboards for each module provide detailed views of all business activity giving a clear insight into all security issues and detected threats. Live Outside Network WWW Live Web Sites with malicious or dynamic content, Web-mail, Facebook Policy creation is a swift process and the web security module provides one of the most comprehensive URL category and application lists on the market. DLP (data leakage prevention) policies are very sophisticated and regulatory compliancy can be implemented simply by choose the country of operation from the USC interface. TSGA when deployed on the V10000 appliance targets organisations up to 2,500 users and performance tests confirmed the appliance is quite capable of handling their demands. With all security features enabled, the Avalanche reported a sustained throughout of 2,000 HTTP TPS at loads up to 440Mbps. Binary Testing Labs Websense Test Setup The Avalanche reported no transmission errors whilst TCP responses were also very low. For larger user bases, multiple Triton appliances running different security modules can be deployed to spread the load. As organisations embrace the Internet, their network frontiers have changed so much that perimeter security is no longer enough. Websense s Triton Security Gateway Anywhere represents the next generation of business security solutions and along with a remarkable range of features, succeeds in seamlessly integrating both on-premises and SaaS cloud services into a single unified platform. Inside Network Origination Client Workstation Sends outbound Web requests for dynamic classification, malware and DLP testing Simulated Outside Network Origination & Destination Server Onsite test server receives outbound e- mail samples for DLP Testing. Triton Security Gateway V10000 Appliance Origination & Destination Server Sends outbound samples to Outside server. Receives inbound samples for malicious detection testing. Copyright 2011 Binary Testing Limited. All rights reserved. No part of this publication may be reproduced in any form without permission in writing from Binary Testing Limited. Binary Testing Limited believes the information in this publication to be accurate as of its publication date and retains the right to make changes to this publication at any time without notification. Binary Testing Limited makes no warranty with respect to the information that appears in this publication, assumes no responsibility for any errors that may appear and does not make a commitment to update the information contained therein. All trademarks referenced in this publication belong to their respective companies. 8
Email + web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.
Page 1 of 9 Overview Email + web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all. Security risks for email, web, and data are no secret. Most people
WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW
WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property
Web Security Gateway Solutions
Web Security Gateway Solutions Websense Web Security Gateway Solutions 90 percent of the top 100 Web sites are classified as social networking or search and more than 47 percent of these sites support
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
WEBSENSE TRITON SOLUTIONS
WEBSENSE TRITON SOLUTIONS INNOVATIVE SECURITY FOR WEB, EMAIL, DATA AND MOBILE TRITON STOPS MORE THREATS. WE CAN PROVE IT. PROTECTION AS ADVANCED AND DYNAMIC AS THE THREATS THEMSELVES The security threats
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
Web Security Gateway Anywhere
Web Security Gateway Anywhere The Web Security Challenge Web Technology Trends Dynamic, interactive Web 2.0 technologies have transformed the Web into a core business application platform Customer relationship
Comprehensive real-time protection against Advanced Threats and data theft
TRITON AP-WEB Comprehensive real-time protection against Advanced Threats and data theft Your business and its data are under constant attack. Traditional security solutions no longer provide sufficient
V1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
Symantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
Symantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway Table of Contents Introduction... 3 Implementing Best Practices with the Websense Web Security
TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT
TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS AND DATA THEFT Your business and its data
ENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
Websense Email Security Transition Guide
Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
anomaly, thus reported to our central servers.
Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Websense Data Security Solutions
Data Security Suite Data Discover Data Monitor Data Protect Data Endpoint Data Security Solutions What is your confidential data and where is it stored? Who is using your confidential data and how? Protecting
Quick Start 5: Introducing and configuring Websense Cloud Web Security solution
Quick Start 5: Introducing and configuring Websense Cloud Web Security solution Websense Support Webinar April 2013 TRITON STOPS MORE THREATS. WE CAN PROVE IT. 2013 Websense, Inc. Page 1 Presenter Greg
TRITON APX. Websense TRITON APX
TRITON APX Unified protection and intelligence against Advanced Threats and data theft Your organization is faced with an increasing number of Advanced Threats that lead to data theft, denial of service
Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands
Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP Dennis de Leest Sr. Systems Engineer Netherlands Microsoft Forefront Threat Management Gateway (TMG) Microsoft Forefront Threat Management
Lab Testing Detailed Report DR131118 January 2014. Competitive Testing of Web Security Devices
Lab Testing Detailed Report DR131118 January 2014 Competitive Testing of Web Security Devices Websense TRITON Web Security Gateway Anywhere Blue Coat ProxySG 900-20 Secure Web Gateway, Proxy Edition Check
Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
Symantec Messaging Gateway powered by Brightmail
The first name in messaging security powered by Brightmail Overview, delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus protection, advanced
Lab Testing Summary Report
Lab Testing Summary Report February 14 Report 132B Product Category: Web Security Gateway Vendor Tested: Key findings and conclusions: security appliance exhibits best rate to date, 91.3%, for classifying
Email DLP Quick Start
1 Email DLP Quick Start TRITON - Email Security is automatically configured to work with TRITON - Data Security. The Email Security module registers with the Data Security Management Server when you install
TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS
TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS From a damaged reputation to regulatory
Content-ID. Content-ID URLS THREATS DATA
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
On and off premises technologies Which is best for you?
On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email
Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content
Network Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
A Buyer's Guide to Data Loss Protection Solutions
A Buyer's Guide to Data Loss Protection Solutions 2010 Websense, Inc. All rights reserved. Websense is a registered trademark of Websense, Inc. in the United States and certain international markets. Websense
Lab Testing Detailed Report DR100412D. Detailed Competitive Testing of the Websense Web Security Gateway 7.5
Lab Testing Detailed Report DR100412D Detailed Competitive Testing of the Security 7.5 May 2010 Miercom www.miercom.com Contents Executive Summary... 3 Key Findings... 4 Figure 1: Averages of Percentage
ZSCALER EMAIL SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE
The Leader in Cloud Security DATA SHEET ZSCALER EMAIL SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE OVERVIEW Email volume is growing every day. Administrators struggle with a growing number of appliances
Web DLP Quick Start. To get started with your Web DLP policy
1 Web DLP Quick Start Websense Data Security enables you to control how and where users upload or post sensitive data over HTTP or HTTPS connections. TRITON - Web Security is automatically configured to
Customer Service Description Next Generation Network Firewall
Customer Service Description Next Generation Network Firewall Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Interoute Communications Limited
Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even
Solution Brief: Enterprise Security
Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................
European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules
Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution
isheriff CLOUD SECURITY
isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console
Core Protection Suite
Core Protection Suite Admin Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. [email protected] www.spamsoap.com Contents EMAIL PROTECTION OVERVIEW...3
Trustwave SEG Cloud Customer Guide
Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Websense Messaging Security Solutions. Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security
Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security Websense Messaging Security Solutions The Websense Approach to Messaging Security Websense enables organizations to
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
Check Point submitted the SWG-12600 Secure Web Gateway for
Key findings and conclusions: Lab Testing Summary Report September 213 Report 1382 Product Category: Web Security Gateway Vendors/Products Tested: Secure Web Gateway BlueCoat Proxy SG3-5 Appliance Websense
SECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version 1.0 23/12/13. Product Information. Version & Platform SGOS 6.
Technical note Version 1.0 23/12/13 Product Information Partner Name Web Site Product Name Blue Coat Systems, Inc. www.bluecoat.com ProxySG Version & Platform SGOS 6.5 Product Description Blue Coat ProxySG
Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control
Award-winning messaging security for inbound protection and outbound control Overview The delivers inbound and outbound messaging security for email and IM, with effective and accurate antispam and antivirus
MOVING EMAIL SECURITY TO THE CLOUD. pandasecurity.com
MOVING EMAIL SECURITY TO THE CLOUD pandasecurity.com 2 Secure email and Web gateways are great candidates for delivery through a cloudbased delivery mechanism also known as SaaS (security as a service).
Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications
Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications November, 2010 2010 Websense, Inc. All rights reserved. Websense is a registered
Symantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
CALNET 3 Category 7 Network Based Management Security. Table of Contents
State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2
Enterprise Buyer Guide
Enterprise Buyer Guide Umbrella s Secure Cloud Gateway vs. Web Proxies or Firewall Filters Evaluating usability, performance and efficacy to ensure that IT teams and end users will be happy. Lightweight
SafeNet Content Security. esafe SmartSuite - Security that Thinks. Real-time, Smart and Simple Web and Mail Security Solutions.
SafeNet Content Security esafe SmartSuite - Security that Thinks Real-time, Smart and Simple Web and Mail Security Solutions Product Overview Malware CONTENT SECURITY Antivirus Malware A secure Web gateway
Mailwall Remote Features Tour Datasheet
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters
E-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone
E-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure
Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution.
Security capabilities To support your business objectives Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution. Preemptive protection and spam control
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Superior protection from Internet threats and control over unsafe web usage
datasheet Trend Micro interscan web security Superior protection from Internet threats and control over unsafe web usage Traditional secure web gateway solutions that rely on periodic updates to cyber
Technology Blueprint. Protect Your Email. Get strong security despite increasing email volumes, threats, and green requirements
Technology Blueprint Protect Your Email Get strong security despite increasing email volumes, threats, and green requirements LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration
Websense Data Security Suite and Cyber-Ark Inter-Business Vault The Power of Integration Websense Data Security Suite Websense Data Security Suite is a leading solution to prevent information leaks; be
How To Secure Your Employees Online With Zscaler.Com And Your Website From Being Infected With Spyware Or Malware
DATA SHEET ZSCALER WEB SECURITY CLOUD FOR SMALL BUSINESS OVERVIEW In today s competitive world, Small and Medium Businesses (SMB) are focusing their discretionary resources on growing revenue and increasing
BitDefender Client Security Workstation Security and Management
BitDefender Client Security Workstation Security and Management BitDefender Client Security is an easy to use business security and management solution, which delivers superior proactive protection from
AntiVirus and AntiSpam email scanning The Axigen-Kaspersky solution
AntiVirus and AntiSpam email scanning The Axigen-Kaspersky solution The present document offers a comprehensive analysis of the ways to secure corporate email systems. It provides an expert opinion on
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"
Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000
Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business
Five Tips to Ensure Data Loss Prevention Success
Five Tips to Ensure Data Loss Prevention Success A DLP Experts White Paper January, 2013 Author s Note The content of this white paper was developed independently of any vendor sponsors and is the sole
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Threat Containment for Facebook
Threat Containment for Facebook Based on statistics for more than 62M users in 2009, the Blue Coat WebPulse cloud service ranked social networking as the number one most requested web category, surpassing
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200
800-782-3762 www.edgewave.com Welcome to EdgeWave Messaging Security! This short guide is intended to help administrators setup and test the EdgeWave Messaging Security Suite for evaluation purposes. A
EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS
EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the
Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1
Reviewer s Guide PureMessage for Windows/Exchange Product tour 1 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO WELCOME Welcome to the reviewer s guide for Sophos PureMessage for Lotus Domino, one
IronPort C300 for Medium-Sized Enterprises and Satellite Offices
I r o n P o r t A p p l i a n c e s H I G H - P E R F O R M A N C E E M A I L S E C U R I T Y. C A R R I E R - P R O V E N T E C H N O L O G Y. E N T E R P R I S E - C L A S S M A N A G E M E N T. IronPort
Guideline on Firewall
CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June
Advantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
Configuration Guide. Websense Web Security Solutions Version 7.8.1
Websense Web Security Solutions Version 7.8.1 To help you make the transition to Websense Web Security or Web Security Gateway, this guide covers the basic steps involved in setting up your new solution
Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses
Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses 1. Why do I need a Web security or gateway anti-spyware solution? Malware attack vector is rapidly shifting from
