Lab Testing Detailed Report DR January Competitive Testing of Web Security Devices

Size: px
Start display at page:

Download "Lab Testing Detailed Report DR131118 January 2014. Competitive Testing of Web Security Devices"

Transcription

1 Lab Testing Detailed Report DR January 2014 Competitive Testing of Web Security Devices Websense TRITON Web Security Gateway Anywhere Blue Coat ProxySG Secure Web Gateway, Proxy Edition Check Point Appliance Next-Generation Threat Protection McAfee WG-5500-B Web Gateway Palo Alto Networks PA-2020 Next-Generation Firewall Miercom

2 Contents 1.0 Executive Summary Products Tested Websense TRITON Web Security Gateway Anywhere (WSGA) Blue Coat ProxySG Secure Web Gateway, Proxy Edition Check Point Appliance Next-Generation Threat Protection McAfee WG-5500-B Web Gateway Palo Alto Networks PA-2020 Next-Generation Firewall Hardware and Software Used in Testing Overall Results Web Security Effectiveness Testing Web Security Effectiveness by Individual Categories Drive-By Installers Exploits Phishing Malicious Redirects Risk Web Filtering Testing Risk Web Filtering Testing, Results of Individual Categories Adult Gambling Hacking Proxy Avoidance Conclusion Copyright 2014 Miercom Page 2 DR131118

3 1.0 Executive Summary Miercom conducted an independent third-party validation of the Websense TRITON Web Security Gateway Anywhere (WSGA) and four competing web security products: the Blue Coat ProxySG Secure Web Gateway, the Check Point Appliance Next-Generation Threat Protection, the McAfee WG-5500-B Web Gateway and the Palo Alto Networks PA-2020 Next-Generation Firewall. Two types of testing were conducted to evaluate the ability of the appliances to block threats and certain types of risky web content using a URL sample set sourced independently by Miercom that was unknown to any of the vendors. Web Security Effectiveness testing verified the detection, classification and blocking of multiple web threats: drive-by-installers, complex exploits, phishing and malicious redirects. Risk Web Filtering testing verified the ability to detect and block various types of risky web content, such as sexual material, gambling, proxy avoidance and hacking. Blocking these types of web content is an important aspect of controlling online access to minimize loss of user productivity, manage bandwidth costs, prevent potentially malicious content from entering the enterprise network and meet compliance requirements. In both portions of testing, products that employ real-time dynamic content analysis tended to outperform those that rely on static database lookups for URL matching and/or threat signatures. We were pleased with the overall performance of the Websense TRITON WSGA solution, particularly its malware blocking and its real-time defense effectiveness. The Advanced Classification Engine (ACE) is a key component of Websense TRITON, employing advanced machine learning to quickly and accurately classify pages in real time based on contextual assessment of content including images, multimedia and links. The Websense TRITON WSGA solution demonstrated its ability to protect against both known and emerging threats. Key results validated that it had: The highest overall blocking rate, 98.1% (15,991 of 16,307 samples in eight categories) The highest blocking rate in both portions of testing, 98.2% in web security effectiveness and 98.0% in risk web filtering The highest blocking rate in all eight categories A blocking rate of more than 94% in seven of the eight categories The Websense TRITON WSGA solution demonstrated the ability to provide some of the most advanced real-time threat protection and content classification we have observed in testing to date. Therefore, it has earned the Miercom Performance Verified Certification. Rob Smithers CEO Miercom Copyright 2014 Miercom Page 3 DR131118

4 2.0 Products Tested 2.1 Websense TRITON Web Security Gateway Anywhere (WSGA) Part of the TRITON unified security platform, Websense TRITON Web Security Gateway Anywhere (WSGA) provides content analysis of web and SSL traffic in real time, ensuring safe use of the Internet. The Websense TRITON WSGA solution can analyze new sites and dynamic content in real time while proactively discovering security risks and blocking unsafe malware. Its Advanced Classification Engine (ACE) detects, blocks or strips malicious code before it enters the network. The WSGA dashboards offer feedback on network security, threat detection, traffic loads and user activity for both inbound and outbound traffic. The primary defense of all Websense TRITON solutions, ACE provides real-time, inline, contextual defense for web, , data and mobile security by using composite risk scoring and predictive analysis on inbound and outbound web traffic. ACE works in conjunction with a proprietary cloud-based threat intelligence security network, the Websense ThreatSeeker Intelligence Cloud, which collects data from more than 900 million endpoints and analyzes up to 5 billion web requests every day. The Websense TRITON management console can be used to configure web security, data loss prevention (DLP) and security on a single, easy-to-manage appliance. It offers both on-premise and unified hybrid cloud security that protects remote and mobile end users or entire offices. The hardware portion of the Websense TRITON WSGA solution tested was the 1U Websense V10000 appliance. Designed for headquarters locations and large branch offices, the V10000 has 24GB RAM and 6 1GB Base-T network interface ports and supports up to 7,500 users. 2.2 Blue Coat ProxySG Secure Web Gateway, Proxy Edition A 1U web control product, the Blue Coat ProxySG , Proxy Edition enables branch users to have the same security coverage as those in a main office or headquarters location. URL filtering is part of the functionality that provides protection and control of web traffic. ProxySG appliances deployed with Blue Coat WebFilter automatically include Web Pulse and Blue Coat Proxy Client for remote user protection, filtering and acceleration. The ProxySG is intended to serve up to 6,000 employees. Built-in ports are as follows: two 10000Base-T with bypass and two 1000-BaseT (no bypass), onboard SSL. It also has two 1TB SAS hard drives. 2.3 Check Point Appliance Next-Generation Threat Protection There are four possible security configurations for the Check Point appliance depending on the software modules used. In addition to Next-Generation Threat Protection, the others are Next-Generation Firewall, Next-Generation Data Protection and Secure Web Gateway. The tested had the URL Filtering software module as part of the Next-Generation Threat Protection configuration, which provides multi-layer protection against web-borne malware. The Next-Generation Threat Protection is the most robust of the four since it has 11 of a possible 12 software modules as standard. In addition to URL filtering, the other modules active in the Next-Generation Threat Protection configuration are Firewall, Identity Awareness, IPsec VPN, Advanced Networking & Clustering, Application Control, Mobile Access, IPS, Antivirus, Anti-Spam and Security, and Anti-Bot. The firmware utilized was R76. Copyright 2014 Miercom Page 4 DR131118

5 The basic hardware configuration of the appliance includes 8 10/100/1000Base-T ports, one network card expansion slot, 4 GB memory and a 500GB hard drive. 2.4 McAfee WG-5500-B Web Gateway McAfee Web Gateways protect the enterprise network from inbound and outbound Web-borne threats. The WG-5500-B is the high-end model in the McAfee family of medium- and enterprisecapacity appliances. Specifications include 12GB of memory, four copper 10/100/1000 network interface ports and RAID-10. The URL filtering functionality of McAfee Web Gateways is McAfee Global Threat Intelligence (GTI), which filters on reputation and category. The following is from the McAfee data sheet: McAfee GTI creates a profile of all Internet entities websites, , and IP addresses based on hundreds of different attributes gathered from the massive global data collection capabilities of McAfee Labs. It then assigns a reputation score based on the security risk posed, enabling administrators to apply very granular rules about what to permit or deny. 2.5 Palo Alto Networks PA-2020 Next-Generation Firewall The PA-2020 Next-Generation Firewall from Palo Alto Networks is designed for use as a highspeed Internet gateway, providing network security and threat prevention in large branch offices and medium-sized enterprises. URL filtering functionality for the PA-2020 is available via subscription. The functionality is based on an on-box customizable database that can include up to 76 categories and 20 million URLs. The user can customize categories, allowable content, block lists and block pages. The maximum number of policies that can be created is 2,500. Specifications include a 180-watt power supply, a 160GB hard drive and 12 10/100/1000, 2 gigabit SFP. The SFP transceivers are sold separately. Copyright 2014 Miercom Page 5 DR131118

6 3.0 Hardware and Software Used in Testing Source: Miercom, January 2014 Product Name Function Software Version Websense TRITON WSGA Secure web gateway TRITON Blue Coat ProxySG Secure web gateway SGOS Proxy Edition Check Point Next-Generation Threat Protection R76 firmware McAfee WG-5500-B Web gateway Web Gateway 7 ( ) Palo Alto Networks PA-2020 Next-generation firewall Mu Dynamics Mu-8000 Spirent Studio Security Ixia XM12 BreakingPoint FireStorm Security testing appliance Security testing software Primary traffic generator Alternate traffic generator and security test system Apache JMeter Load testing tool Miercom client URL Filtering Client Ubuntu Linux 12.04LTS The Ixia XM12 was the primary traffic generator. Ixia ( is an industry leader in performance testing of networking equipment. Real-world traffic was generated by the test platform and test applications, principally IxAutomate for Layer 2-3 switching and routing traffic. The BreakingPoint FireStorm was the alternate traffic generator. Copyright 2014 Miercom Page 6 DR131118

7 4.0 Overall Results The Websense TRITON WSGA made the best overall performance of the five web security products tested. Its 98.1% blocking rate, shown in Table 1 and Figure 1 is the result of blocking 15,991 of 16,307 in the eight categories. Also, Websense TRITON WGSA had the highest blocking rate in all eight categories and in both portions of testing, 98.2% in web security effectiveness and 98.0% in web risk filtering. Table 1: Overall Blocking Rate, URLs in Eight Categories Vendor Product Sample Size Retrieved Percentage Websense TRITON WSGA 16, , % Check Point NGTP 16,307 1,176 15, % Blue Coat SG ,307 3,638 12, % McAfee WG-5500-B 16,307 3,696 12, % Palo Alto Networks PA ,307 5,242 11, % Average 16,307 2, , % Figure 1: Overall Blocking Rate, URLs in Eight Categories Percentage (%) Websense TRITON WSGA Check Point NGTP Blue Coat SG Source: Miercom Web Security Industry Assessment, January 2014 McAfee WG-5500-B Palo Alto Networks PA-2020 Copyright 2014 Miercom Page 7 DR131118

8 5.0 Web Security Effectiveness Testing Description This series of tests assessed the ability of each security appliance to analyze and block realworld threats sourced by Miercom from an unbiased sample set of live Internet targets. The threats were drive-by installers, complex exploits, phishing and malicious redirects. Configuration and Procedure A sample set of thousands of live malicious web targets was used. A generic diagram of the test bed, direct path, is below. Figure 2: Direct Path Testing Each security appliance had the latest software and database(s) as well as access to the latest cloud lookup services. Default security policies, including anti-malware engines, as well as settings required to filter URLs in a specific category were enabled. The Miercom client, Apache JMeter, sent an HTTP GET request to the target web server via the web gateway, the router and the Internet. The client was configured to wait up to 20 seconds for the web gateway to render a decision, block or pass. The 20 seconds was intended to remove the possibility of a temporary Internet issue from interfering with a block or pass decision. The composition of the sample set is shown in Table 2. Table 2: Sample URLs in Each Web Security Effectiveness Category Category of URLs Drive-by Installers 37 Exploits 108 Phishing 3,536 Redirects 44 Total 3,725 Copyright 2014 Miercom Page 8 DR131118

9 Expected Results The expectation was that each web security product would detect and filter or block drive-by installers, exploits, phishing and malicious redirect URLs. Overall Results The Websense TRITON WSGA made the best overall performance, finishing first in all four categories and recording a blocking rate of 98.2% (3,657 of 3,725 samples) as shown in Table 3 and Figure 3 below. Table 3: Overall Blocking Rate Web Security Effectiveness in Four Categories Vendor Product Sample Size Retrieved Percentage Websense TRITON WSGA 3, , % McAfee WG-5500-B 3, , % Check Point NGTP 3, , % Blue Coat SG ,725 1,916 1, % Palo Alto Networks PA ,725 3, % Average 3,725 1, , % Figure 3: Overall Blocking Rate Web Security Effectiveness, URLs in Four Categories Percentage (%) Websense TRITON WSGA McAfee WG-5500-B Check Point NGTP Source: Miercom Web Security Industry Assessment, January 2014 Blue Coat SG Palo Alto Networks PA-2020 Copyright 2014 Miercom Page 9 DR131118

10 6.0 Web Security Effectiveness by Individual Categories 6.1 Drive-By Installers Configuration Websense TRITON WSGA was configured to block all available security categories. Blue Coat ProxySG , Proxy Edition was configured to block all available security categories. Check Point NGTP was configured to block all available security categories as well as high risk and critical risk categories. McAfee WB-5500-B was configured to block all available security categories. Palo Alto Networks PA-2020 was configured to block all available security categories. Each product was configured with the latest versions of software/firmware and databases. All were also configured to utilize their AV engine(s) as well as cloud lookup services. The log information from the management interface was used to see all categories assigned per sample blocked. This log was compared to the Miercom scripts log for better accuracy. Results The Websense WSGA had the highest blocking rate, 94.6%, as shown in Table 4 below and Figure 4 on the following page. Table 4: Blocking Rate, Drive-by Installer URLs Vendor Product Sample Size Retrieved Percentage Websense TRITON WSGA % McAfee WG-5500-B % Blue Coat SG % Check Point NGTP % Palo Alto Networks PA % Average % Copyright 2014 Miercom Page 10 DR131118

11 Figure 4: Blocking Rate, Drive-by Installer URLs Percentage (%) Websense TRITON WSGA McAfee WG-5500-B Blue Coat SG Source: Miercom Web Security Industry Assessment, January 2014 Check Point NGTP 0.0 Palo Alto Networks PA-2020 The category, Drive-by Installers, had the smallest sample set in the test. The Websense TRITON WSGA was the winner by a large margin, blocking 35 of the 37 URLs for a blocking rate of 94.6%. The runner-up failed to block 16 URLs. Copyright 2014 Miercom Page 11 DR131118

12 6.2 Exploits Configuration Websense TRITON WSGA was configured to block all available security categories. Blue Coat ProxySG , Proxy Edition was configured to block all available security categories. Check Point NGTP was configured to block all available security categories as well as high risk and critical risk categories. McAfee WB-5500-B was configured to block all available security categories. Palo Alto Networks PA-2020 was configured to block all available security categories. Each product was configured with the latest versions of software/firmware and databases. All were also configured to utilize their AV engine(s) as well as cloud lookup services. The log information from the management interface was used to see all categories assigned per sample blocked. This log was compared to the Miercom scripts log for better accuracy. Results The Websense WSGA had the highest blocking rate, 99.1, as shown in Table 5 below and Figure 5 on the following page. The blocking rate of the runner-up was more than 30% adrift. Table 5: Blocking Rate, Exploit URLs Vendor Product Sample Size Retrieved Percentage Websense TRITON WSGA % Blue Coat SG % McAfee WG-5500-B % Check Point NGTP % Palo Alto Networks PA % Average % Copyright 2014 Miercom Page 12 DR131118

13 Figure 5: Blocking Rate, Exploit URLs Percentage (%) Websense TRITON WSGA Blue Coat SG McAfee WG-5500-B Check Point NGTP 7.4 Palo Alto Networks PA-2020 Source: Miercom Web Security Industry Assessment, January 2014 In terms of blocking percentage, the performance of the Websense TRITON WSGA in the Exploits Category was the best in the entire test. The Websense solution blocked all but one of the 108 samples, earning a blocking rate of 99.1%. Copyright 2014 Miercom Page 13 DR131118

14 6.3 Phishing Configuration Websense TRITON WSGA was configured to block phishing and all available security categories. Blue Coat ProxySG , Proxy Edition was configured to block phishing and all available security categories. Check Point NGTP was configured to block phishing, as well as all available security, high risk and critical risk categories. McAfee WB-5500-B was configured to block phishing and all available security categories. Palo Alto Networks PA-2020 was configured to block phishing and all available security categories. Each product was configured with the latest versions of software/firmware and databases. All were also configured to utilize their AV engine(s) as well as cloud lookup services. The log information from the management interface was used to see all categories assigned per sample blocked. This log was compared to the Miercom scripts log for better accuracy. Results The Websense WSGA had the highest blocking rate, 98.2%, as shown in Table 6 and Figure 6 on the following page. Table 6: Blocking Rate, Phishing URLs Vendor Websense Product TRITON WSGA Sample Size Retrieved Percentage 3, , % McAfee WG-5500-B 3, , % Check Point , , % Blue Coat SG ,536 1,832 1, % Palo Alto Networks PA ,536 3, % Average 3,536 1, , % Copyright 2014 Miercom Page 14 DR131118

15 Figure 6: Blocking Rate, Phishing URLs Percentage (%) Websense TRITON WSGA McAfee WG-5500-B Check Point NGTP Blue Coat SG Palo Alto Networks PA-2020 Source: Miercom Web Security Industry Assessment, January 2014 Phishing was the category with the largest gap between the blocking rate of the leader and the last-place finisher. The leader, the Websense TRITON WSGA, had a blocking rate of 98.2%, 95.3% clear of the Palo Alto Networks PA Copyright 2014 Miercom Page 15 DR131118

16 6.4 Malicious Redirects Configuration Websense TRITON WSGA was configured to block malicious redirects and all available security categories. Blue Coat ProxySG , Proxy Edition was configured to block all available security categories. Check Point NGTP was configured to block all available security categories as well as high risk and critical risk categories. McAfee WB-5500-B was configured to block all available security categories. Palo Alto Networks PA-2020 was also configured to block all available security categories. Each product was configured with the latest versions of software/firmware and databases. All were also configured to utilize their AV engine(s) as well as cloud lookup services. The log information from the management interface was used to see all categories assigned per sample blocked. This log was compared to the Miercom scripts log for better accuracy. Results The Websense WSGA had the highest blocking rate, 98.2%, as shown in Table 7 and Figure 7 on the following page. Table 7: Blocking Rate, Malicious Redirects Vendor Product Sample Size Retrieved Percentage Websense TRITON WSGA % McAfee WG-5500-B % Blue Coat SG % Check Point NGTP % Palo Alto Networks PA % Average % Copyright 2014 Miercom Page 16 DR131118

17 Figure 7: Blocking Rate, Redirects Percentage (%) Websense TRITON WSGA McAfee WG-5500-B Blue Coat SG Check Point NGTP Palo Alto Networks PA-2020 Source: Miercom Web Security Industry Assessment, January 2014 The Websense solution blocked all but one of the 44 malicious redirects, earning a blocking rate of 97.7%. The McAfee WG-5500-B took second place by blocking less than half of the sample set, reaching a 45.4% blocking rate. Copyright 2014 Miercom Page 17 DR131118

18 7.0 Risk Web Filtering Testing This series of tests assessed the ability of each security appliance to analyze and block web content in four risk categories. The URLs were sourced by Miercom from an unbiased sample set of live Internet targets. The four risk categories were adult, gambling, hacking and proxy avoidance. These web targets often compromise employee productivity, are required to be filtered to meet compliance requirements, harbor malicious threats, or provide mechanisms by which to bypass web security controls and are therefore a critical aspect of any web security solution testing. Configuration and Procedure A sample set of thousands of live web targets was used. A generic diagram of the test bed, direct path, is below. Figure 8: Direct Path Testing Each security appliance had the latest software and database(s) as well as access to the latest cloud lookup services. Default security policies, including anti-malware engines, as well as settings required to filter URLs in a specific category were enabled. All available security related filter categories were also configured. The Miercom client, Apache JMeter, sent an HTTP GET request to the target web server via the web gateway, the router and the Internet. The client was configured to wait up to 20 seconds for the web gateway to render a decision, block or pass. The 20 seconds was intended to remove the possibility of a temporary Internet issue from interfering with a block or pass decision. The composition of the sample set is shown in Table 8. Table 8: Sample URLs in Each Risk Web Filtering Category Category of URLs Adult 6,919 Gambling 5,418 Hacking 196 Proxy Avoidance 49 Total 12,582 Copyright 2014 Miercom Page 18 DR131118

19 Expected Results The expectation was that each web security product would detect and filter or block adult, gambling, hacking and proxy avoidance URLs. Overall Results The Websense TRITON WSGA made the best overall performance, finishing first in all four categories and recording a blocking rate of 98.0% (12,334 of 12,582 samples) as shown in Table 9 and Figure 9. Table 9: Overall Blocking Rate Risk Web Filtering in Four Categories Vendor Product Sample Size Retrieved Percentage Websense TRITON WSGA 12, , % Check Point NGTP 12, , % Palo Alto Networks PA ,582 1,630 10, % Blue Coat SG ,582 1,722 10, % McAfee WG-5500-B 12,582 3,279 9, % Average 12,582 1, , % Figure 9: Overall Blocking Rate Risk Web Filtering in Four Categories Percentage (%) Websense TRITON WSGA Check Point NGTP Palo Alto Networks PA-2020 Source: Miercom Web Security Industry Assessment, January 2014 Blue Coat SG McAfee WG-5500-B Copyright 2014 Miercom Page 19 DR131118

20 8.0 Risk Web Filtering Testing, Results of Individual Categories 8.1 Adult Configuration Websense TRITON WSGA was configured to block adult content, lingerie and swimsuit, nudity, sex and sex education under the adult material menu. Blue Coat ProxySG , Proxy Edition was configured to block child pornography, nudity, pornography and sex education. Check Point NGTP was configured to block nudity, pornography, sex, sex education, and high risk and critical risk categories. McAfee WB-5500-B was configured to block incidental nudity, nudity, pornography and sexual materials. Palo Alto Networks PA-2020 was configured to block adult and nudity. Each product was configured with the latest versions of software/firmware and databases. All were also configured to utilize their AV engine(s) as well as cloud lookup services. In addition to the specific risk categories, all security categories were also enabled. The log information from the management interface was used to see all categories assigned per sample blocked. This log was compared to the Miercom scripts log for better accuracy. Results The Websense WSGA had the highest blocking rate, 97.8%, as shown in Table 10 and Figure 10. Table 10: Blocking Rate, Adult URLs Vendor Product Sample Size Retrieved Percentage Websense TRITON WSGA 6, , % Check Point NGTP 6, , % Blue Coat SG , , % Palo Alto Networks PA , , % McAfee WG-5500-B 6,919 1,041 5, % Average 6, , % Copyright 2014 Miercom Page 20 DR131118

21 Figure 10: Blocking Rate, Adult URLs Percentage (%) Websense TRITON WSGA Check Point NGTP Blue Coat SG Palo Alto Networks PA-2020 McAfee WG-5500-B Source: Miercom Web Security Industry Assessment, January 2014 Adult was the category with the smallest gap between the blocking rate of the leader and the last-place finisher. The leader, the Websense TRITON WSGA, had a blocking rate of 97.8%, 12.7% clear of the McAfee WG-5500-B. Copyright 2014 Miercom Page 21 DR131118

22 8.2 Gambling Configuration Websense TRITON WSGA with Web Security Gateway Anywhere was configured to block gambling under the Extended Protection Menu. Blue Coat ProxySG , Proxy Edition was configured to block gambling. Check Point NGTP was configured to block gambling, high risk and critical risk. McAfee WB-5500-B was configured to block gambling and gambling related. Palo Alto Networks PA-2020 was configured to block gambling. Each product was configured with the latest versions of software/firmware and databases. All were also configured to utilize their AV engine(s) as well as cloud lookup services. In addition to the specific risk categories, all security categories were also enabled. The log information from the management interface was used to see all categories assigned per sample blocked. This log was compared to the Miercom scripts log for better accuracy. Results The Websense WSGA had the highest blocking rate, 98.6%, as shown in Table 11 and Figure 11. Table 11: Blocking Rate, Gambling URLs Vendor Product Sample Size Retrieved Percentage Websense TRITON WSGA 5, , % Check Point NGTP 5, , % Palo Alto Networks PA , , % Blue Coat SG , , % McAfee WG-5500-B 5,418 2,091 3, % Average 5, , % Copyright 2014 Miercom Page 22 DR131118

23 Figure 11: Blocking Rate, Gambling URLs Percentage (%) Websense TRITON WSGA Check Point NGTP Palo Alto Networks PA-2020 Blue Coat SG McAfee WG-5500-B Source: Miercom Web Security Industry Assessment, January 2014 Gambling was one of two categories in which a competing web security product came closest in terms of percentage to the Websense TRITON WSGA in first place. As in Adult, just 0.1% separated the performance of the Websense solution and the runner-up, the Check Point NGTP, in determining whether to block or pass 5,418 gambling URLs. Copyright 2014 Miercom Page 23 DR131118

24 8.3 Hacking Configuration Websense TRITON WSGA was configured to block hacking. Blue Coat ProxySG , Proxy Edition was configured to block hacking. Check Point NGTP was configured to block hacking, high risk and critical risk. McAfee WB-5500-B was configured to block potential hacking/computer crime. Palo Alto Networks PA-2020 was configured to block hacking. Each product was configured with the latest versions of software/firmware and databases. All were also configured to utilize their AV engine(s) as well as cloud lookup service. In addition to the specific risk categories, all security categories were also enabled. The log information from the management interface was used to see all categories assigned per sample blocked. This log was compared to the Miercom scripts log for better accuracy. Results The Websense WSGA had the highest blocking rate, 96.9%, as shown in Table 12 and Figure 12. Table 12: Blocking Rate, Hacking URLs Vendor Product Sample Size Retrieved Percentage Websense TRITON WSGA % Check Point NGTP % Palo Alto Networks PA % Blue Coat SG % McAfee WG-5500-B % Average % Copyright 2014 Miercom Page 24 DR131118

25 Figure 12: Blocking Rate, Hacking URLs Percentage (%) Websense TRITON WSGA Check Point NGTP Palo Alto Networks PA-2020 Blue Coat SG McAfee WG-5500-B Source: Miercom Web Security Industry Assessment, January 2014 The results in the hacking category revealed a three-tiered pecking order. The Websense TRITON WSGA was a clear winner with a blocking rate of 96.9%, preventing retrieval of 190 of the 196 samples. The Check Point NGTP was alone as the runner-up at 73.5%. The other web security products were in a group below 50%. Copyright 2014 Miercom Page 25 DR131118

26 8.4 Proxy Avoidance Configuration Websense TRITON WSGA was configured to block proxy avoidance. Blue Coat ProxySG , Proxy Edition was configured to block proxy avoidance. Check Point NGTP was configured to block anonymizer, anonymizers/proxy avoidance sites, high risk and critical risk. McAfee WB-5500-B was configured to block anonymizers and anonymizing utilities. Palo Alto Networks PA-2020 was configured to block proxy avoidance. Each product was configured with the latest versions of software/firmware and databases. All were also configured to utilize their AV engine(s) as well as cloud lookup service. In addition to the specific risk categories, all security categories were enabled. The log information from the management interface was used to see all categories assigned per sample blocked. This log was compared to the Miercom scripts log for better accuracy. Results The Websense WSGA had the highest blocking rate, 69.4, shown in Table 13 and Figure 13. Table 13: Blocking Rate, Proxy Avoidance URLs Vendor Product Sample Size Retrieved Percentage Websense TRITON WSGA % Blue Coat SG % Check Point NGTP % McAfee WG-5500-B % Palo Alto Networks PA % Average % Copyright 2014 Miercom Page 26 DR131118

27 Figure 13: Blocking Rate, Proxy Avoidance URLs 100 Percentage (%) Websense TRITON WSGA Blue Coat SG Check Point NGTP McAfee WG-5500-B 12.2 Palo Alto Networks PA-2020 Source: Miercom Web Security Industry Assessment, January 2014 Proxy avoidance was the category in which the web control products had the lowest overall blocking rates. The Websense TRITON WSGA performed the best, blocking 34 of 49 proxy avoidance URLs for a blocking rate of 69.4%. Copyright 2014 Miercom Page 27 DR131118

28 9.0 Conclusion Of the five web security products tested, the Websense TRITON Web Security Gateway Anywhere (WSGA) finished first in web security effectiveness and risk web filtering tests. Of the 16,307 URLs in the eight categories, the Websense solution blocked 15,991 samples for an overall blocking rate of 98.1%. The blocking rate of the runner-up, Check Point, was 92.8%. All web security products tested utilized the latest software, database(s), anti-malware engines and cloud-based resources available at the time of testing. All products tested were subjected to the same URL sample set sourced independently by Miercom. Testing revealed that web security risks are best mitigated when performed by security appliances, which offer real-time security defenses and content classification. Devices tested such as the Websense TRITON WSGA surpassed point-based security technologies in both accuracy and coverage by correlating multiple analytic engines to identify threats that might otherwise bypass any single mechanism. The use of this layered security approach proved to provide the best protection as well as content classification accuracy. The Websense TRITON WSGA achieved the highest efficacy scores in tests for detecting and blocking of multiple types of malware threats and analyzing and classifying content. Overall, the Websense TRITON WSGA is a superior web security solution, providing advanced multi-layered threat protection from malicious attacks and employing sophisticated real-time content analysis engines and algorithms that do not rely on traditional static database lookups. Copyright 2014 Miercom Page 28 DR131118

29 Applicability of Test Results The tests in this report are intended to be reproducible for customers who wish to recreate them with the appropriate test and measurement equipment. Current or prospective customers interested in repeating these results may contact for further details on this testing. Miercom recommends that customers conduct their own needs analysis review with us or any other proven network consultancy and test specifically for the expected environment for deploying new equipment. This report was sponsored by Websense, Inc. Data was obtained completely and independently as part of the Miercom Web Security Industry Assessment in which all vendors have equal opportunity to participate and contribute to the test methodology. All vendors included in these tests were afforded the opportunity to represent their products, and continue to have the opportunity to participate in the ongoing Industry Assessment. About Miercom Miercom has had hundreds of product comparison analyses published in Network World, Business Communications Review, Communications News, xchange, Internet Telephony and other leading publications. Miercom s reputation as the leading, independent product test center is unquestioned. Miercom s private test services include competitive product analyses, as well as individual product evaluations. Miercom features comprehensive certification and test programs including: Certified Interoperable, Certified Reliable, Certified Secure and Certified Green. Products may also be evaluated under the Performance Verified program, the industry s most thorough and trusted assessment for product usability and performance. Copyright 2014 Miercom Page 29 DR131118

Lab Testing Summary Report

Lab Testing Summary Report Lab Testing Summary Report February 14 Report 132B Product Category: Web Security Gateway Vendor Tested: Key findings and conclusions: security appliance exhibits best rate to date, 91.3%, for classifying

More information

Check Point submitted the SWG-12600 Secure Web Gateway for

Check Point submitted the SWG-12600 Secure Web Gateway for Key findings and conclusions: Lab Testing Summary Report September 213 Report 1382 Product Category: Web Security Gateway Vendors/Products Tested: Secure Web Gateway BlueCoat Proxy SG3-5 Appliance Websense

More information

Comprehensive real-time protection against Advanced Threats and data theft

Comprehensive real-time protection against Advanced Threats and data theft TRITON AP-WEB Comprehensive real-time protection against Advanced Threats and data theft Your business and its data are under constant attack. Traditional security solutions no longer provide sufficient

More information

TRITON APX. Websense TRITON APX

TRITON APX. Websense TRITON APX TRITON APX Unified protection and intelligence against Advanced Threats and data theft Your organization is faced with an increasing number of Advanced Threats that lead to data theft, denial of service

More information

Lab Testing Detailed Report DR100412D. Detailed Competitive Testing of the Websense Web Security Gateway 7.5

Lab Testing Detailed Report DR100412D. Detailed Competitive Testing of the Websense Web Security Gateway 7.5 Lab Testing Detailed Report DR100412D Detailed Competitive Testing of the Security 7.5 May 2010 Miercom www.miercom.com Contents Executive Summary... 3 Key Findings... 4 Figure 1: Averages of Percentage

More information

WEBSENSE TRITON SOLUTIONS

WEBSENSE TRITON SOLUTIONS WEBSENSE TRITON SOLUTIONS INNOVATIVE SECURITY FOR WEB, EMAIL, DATA AND MOBILE TRITON STOPS MORE THREATS. WE CAN PROVE IT. PROTECTION AS ADVANCED AND DYNAMIC AS THE THREATS THEMSELVES The security threats

More information

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS AND DATA THEFT Your business and its data

More information

Next-Generation Firewalls: CEO, Miercom

Next-Generation Firewalls: CEO, Miercom Next-Generation Firewalls: Results from the Lab Robert Smithers Robert Smithers CEO, Miercom Agenda Participating i Vendors and Products How We Did It Categories of Products Tested About the Technology

More information

WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW

WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked

More information

Lab Testing Detailed Report DR130214. Competitive Testing of the Websense TRITON Web Security Gateway Anywhere v7.7.3

Lab Testing Detailed Report DR130214. Competitive Testing of the Websense TRITON Web Security Gateway Anywhere v7.7.3 Lab Testing Detailed Report DR130214 Competitive Testing of the v7.7.3 February 2013 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Key Findings... 4 3.0 Methodology... 5 3.1 Systems Under

More information

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Stop advanced targeted attacks, identify high risk users and control Insider Threats TRITON AP-EMAIL Stop advanced targeted attacks, identify high risk users and control Insider Threats From socially engineered lures to targeted phishing, most large cyberattacks begin with email. As these

More information

ENABLING FAST RESPONSES THREAT MONITORING

ENABLING FAST RESPONSES THREAT MONITORING ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,

More information

Email + web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.

Email + web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all. Page 1 of 9 Overview Email + web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all. Security risks for email, web, and data are no secret. Most people

More information

Cloud Based Secure Web Gateway

Cloud Based Secure Web Gateway Cloud Based Secure Web Gateway DR160203 March 2016 Miercom www.miercom.com Contents Executive Summary... 3 Introduction... 4 Product Tested... 4 Test Focus... 4 How We Did It... 5 Test Bed Setup... 5 Test

More information

Lab Testing Summary Report

Lab Testing Summary Report Key findings and conclusions: Lab Testing Summary Report March 2012 Report SR120222B AR s Access and Interconnection Vendor Tested: Dual 3G uplinks provide fully redundant WAN connectivity Interoperability

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even

More information

Masters Project Proxy SG

Masters Project Proxy SG Masters Project Proxy SG Group Members Chris Candilora Cortland Clater Eric Garner Justin Jones Blue Coat Products Proxy SG Series Blue Coat Proxy SG appliances offer a comprehensive foundation for the

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content

More information

Websense Web Security Solutions

Websense Web Security Solutions Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Web 2.0 Challenge The Internet is rapidly evolving. Web 2.0 technologies are dramatically changing the way people

More information

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution Quick Start 5: Introducing and configuring Websense Cloud Web Security solution Websense Support Webinar April 2013 TRITON STOPS MORE THREATS. WE CAN PROVE IT. 2013 Websense, Inc. Page 1 Presenter Greg

More information

Secure Web Gateways Buyer s Guide >

Secure Web Gateways Buyer s Guide > White Paper Secure Web Gateways Buyer s Guide > (Abbreviated Version) The web is the number one source for malware distribution. With more than 2 million 1 new pages added every day and 10,000 new malicious

More information

REVOLUTIONIZING ADVANCED THREAT PROTECTION

REVOLUTIONIZING ADVANCED THREAT PROTECTION REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my

More information

Symantec Advanced Threat Protection: Network

Symantec Advanced Threat Protection: Network Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How

More information

Intelligent, Scalable Web Security

Intelligent, Scalable Web Security Solution Overview Citrix and Trend Micro Intelligent, Scalable Web Security Application-Level Control, Load Balancing, High-Traffic Capacity Table of Contents The Challenge... 3 The Solution: Citrix NetScaler

More information

Web Security Gateway Anywhere

Web Security Gateway Anywhere Web Security Gateway Anywhere The Web Security Challenge Web Technology Trends Dynamic, interactive Web 2.0 technologies have transformed the Web into a core business application platform Customer relationship

More information

Unified Threat Management Throughput Performance

Unified Threat Management Throughput Performance Unified Threat Management Throughput Performance Desktop Device Comparison DR150818C October 2015 Miercom www.miercom.com Contents Executive Summary... 3 Introduction... 4 Products Tested... 6 How We Did

More information

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property

More information

Key Findings. Websense Triton Security Gateway Anywhere

Key Findings. Websense Triton Security Gateway Anywhere Websense Triton Security Gateway Anywhere A Usability Study and Performance Evaluation Executive Summary In today s global economy the ways in which businesses use the Internet have changed dramatically

More information

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect Protect your internal users on the Internet with Secure Web Gateway Richard Bible EMEA Security Solution Architect Identity and Access Management (IAM) Solution Authentication, Authorization, and SSO to

More information

Web Security Gateway Solutions

Web Security Gateway Solutions Web Security Gateway Solutions Websense Web Security Gateway Solutions 90 percent of the top 100 Web sites are classified as social networking or search and more than 47 percent of these sites support

More information

Top 10 Reasons Enterprises are Moving Security to the Cloud

Top 10 Reasons Enterprises are Moving Security to the Cloud ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different

More information

The first and only unified

The first and only unified The first and only unified content security solution It s time for a new solution. Content is the lifeblood of every organization. The way we create, consume, and communicate it has radically changed so,

More information

The Cisco ASA 5500 as a Superior Firewall Solution

The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls

More information

Stallioni Sügisseminar

Stallioni Sügisseminar Stallioni Sügisseminar Juha Poutanen, Territory Manager Websense How to open Internet to your employees safely - managing risks of modern Internet web security data security web security email security

More information

WildPackets engaged Miercom to conduct comprehensive,

WildPackets engaged Miercom to conduct comprehensive, Lab Testing Summary Report January 2014 Report 140109 Key findings and conclusions: Omnipliance TL network analysis appliance with two-port OmniAdapter 10G card proves in testing a capture-to-disk rate

More information

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,

More information

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.6 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Analyzing HTTP/HTTPS Traffic Logs

Analyzing HTTP/HTTPS Traffic Logs Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that

More information

Threat Containment for Facebook

Threat Containment for Facebook Threat Containment for Facebook Based on statistics for more than 62M users in 2009, the Blue Coat WebPulse cloud service ranked social networking as the number one most requested web category, surpassing

More information

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the

More information

Lab Testing Summary Report

Lab Testing Summary Report Key findings and conclusions: Huawei AR27V-P router achieved 177.5 Mbps throughput with IMIX traffic and IPsec security enabled Lab Testing Summary Report March 212 Report SR12221B AR Series Routers Performance

More information

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link) NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering

More information

Downloading and Configuring WebFilter

Downloading and Configuring WebFilter Downloading and Configuring WebFilter What is URL Filtering? URL filtering is a type of transaction content filtering that limits a user s Web site access through a policy that is associated with a specific

More information

ESET Security Solutions for Your Business

ESET Security Solutions for Your Business ESET Security Solutions for Your Business It Is Our Business Protecting Yours For over 20 years, companies large and small have relied on ESET to safeguard their mission-critical infrastructure and keep

More information

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP Dennis de Leest Sr. Systems Engineer Netherlands Microsoft Forefront Threat Management Gateway (TMG) Microsoft Forefront Threat Management

More information

Symantec Messaging Gateway 10.5

Symantec Messaging Gateway 10.5 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS From a damaged reputation to regulatory

More information

Extreme Security Threat Protection G2 - Intrusion Prevention Integrated security, visibility, and control for next- generation network protection

Extreme Security Threat Protection G2 - Intrusion Prevention Integrated security, visibility, and control for next- generation network protection DATA SHEET Extreme Security Threat Protection G2 - Intrusion Prevention Integrated security, visibility, and control for next- generation network protection HIGHLIGHTS Delivers superior zero-day threat

More information

Cisco Small Business ISA500 Series Integrated Security Appliances

Cisco Small Business ISA500 Series Integrated Security Appliances Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated

More information

Unified Security, ATP and more

Unified Security, ATP and more SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users

More information

Symantec Messaging Gateway powered by Brightmail

Symantec Messaging Gateway powered by Brightmail The first name in messaging security powered by Brightmail Overview, delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus protection, advanced

More information

Securing the Borderless Enterprise

Securing the Borderless Enterprise Securing the Borderless Enterprise Websense TRITON Solution The Web 2.0 Workplace: New Opportunities, New Risks Web-enabled technologies are reshaping the modern enterprise. Powerful, cloud-based business

More information

Lab Testing Summary Report

Lab Testing Summary Report Lab Testing Summary Report September 2007 Report 070914 Product Category: WAN Optimization Vendor Tested: Packeteer, Inc. Product Tested: ishaper 400 Key findings and conclusions: Deep packet inspection

More information

Huawei Eudemon200E-N Next-Generation Firewall

Huawei Eudemon200E-N Next-Generation Firewall Huawei 200E-N Next-Generation Firewall With the popularity of mobile working using smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of works. This change in IT

More information

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Securing Virtualization with Check Point and Consolidation with Virtualized Security Securing Virtualization with Check Point and Consolidation with Virtualized Security consolidate security gateways with full power of Software Blades with Check Point Virtual Systems (VSX) secure virtualized

More information

ProxySG ICAP Integration

ProxySG ICAP Integration ProxySG ICAP Integration Blue Coat s proxies can utilize the Internet Content Adaptation Protocol (ICAP) to hand off HTTP requests and/or responses to an external server for configured processing and transformation.

More information

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform) McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload

More information

Performanta Pty Ltd. Company Profile. May 2012. Trust. Practical. Performanta.

Performanta Pty Ltd. Company Profile. May 2012. Trust. Practical. Performanta. May 2012 Trust. Practical. Performanta. Company Overview Performanta Pty Ltd is an information security organisation that has a practical approach, competitively priced services, strong client commitment,

More information

Requirements When Considering a Next- Generation Firewall

Requirements When Considering a Next- Generation Firewall White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

Protecting Your Network Against Risky SSL Traffic ABSTRACT

Protecting Your Network Against Risky SSL Traffic ABSTRACT Protecting Your Network Against Risky SSL Traffic ABSTRACT Every day more and more Web traffic traverses the Internet in a form that is illegible to eavesdroppers. This traffic is encrypted with Secure

More information

NEC s UC for Enterprise (UCE) in conjunction with the

NEC s UC for Enterprise (UCE) in conjunction with the Lab Testing Summary Report May 2011 Report SR110219 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: NEC UCE system transfers seamlessly between a variety of endpoints

More information

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security White Paper Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security Introduction Organizations that want to harness the power of the web must deal with

More information

Router Throughput Tests

Router Throughput Tests Lab Testing Summary Report June 2013 Report 130605 Key findings and conclusions: Cisco 4451-X ISR branch office router, with advanced features enabled, demonstrated 1 GB and 2 GB capacity as advertised

More information

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering (WCF) for superior

More information

Cisco Cloud Web Security

Cisco Cloud Web Security Data Sheet Today s highly connected and fast-moving world is filled with complex and sophisticated web security threats. Cisco delivers the strong protection, complete control, and investment value that

More information

DUBEX CUSTOMER MEETING

DUBEX CUSTOMER MEETING DUBEX CUSTOMER MEETING JOHN YUN Director, Product Marketing Feb 4, 2014 1 AGENDA WebPulse Blue Coat Cloud Service Overview Mobile Device Security 2 WEBPULSE 3 GLOBAL THREAT PROTECTION NEGATIVE DAY DEFENSE

More information

THE WEBPULSE COLLABORATIVE DEFENSE

THE WEBPULSE COLLABORATIVE DEFENSE WHITEPAPER PROACTIVELY DEFENDING YOUR NETWORK AGAINST MALWARE The ease with which we can access and share information in today s highly connected world is changing everything the way we live our personal

More information

How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform

How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform McAfee Endpoint Security 10 provides customers with an intelligent, collaborative framework, enabling endpoint defenses to

More information

Astaro Gateway Software Applications

Astaro Gateway Software Applications Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security

More information

Moving Beyond Proxies

Moving Beyond Proxies Moving Beyond Proxies A Better Approach to Web Security January 2015 Executive Summary Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy security

More information

WildFire. Preparing for Modern Network Attacks

WildFire. Preparing for Modern Network Attacks WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon

More information

INTRODUCING isheriff CLOUD SECURITY

INTRODUCING isheriff CLOUD SECURITY INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.

More information

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services Product Highlights Intrusion Prevention System Dectects and prevents known and unknown attacks/ exploits/vulnerabilities, preventing outbreaks and keeping your network safe. Gateway Anti Virus Protection

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information

TRENDS IN THE THREAT LANDSCAPE

TRENDS IN THE THREAT LANDSCAPE TRENDS IN THE THREAT LANDSCAPE Guy Eilon, SEE Regional Manager April 2013 geilon@websense.com TRITON STOPS MORE THREATS. WE CAN PROVE IT. 2013 Websense, Inc. Page 1 CHANGING CUSTOMERS NEEDS 90% of companies

More information

2012 North American Enterprise Firewalls Market Penetration Leadership Award

2012 North American Enterprise Firewalls Market Penetration Leadership Award 2012 2012 North American Enterprise Firewalls Market Penetration Leadership Award 2012 Frost & Sullivan 1 We Accelerate Growth Market Penetration Leadership Award Enterprise Firewalls North America, 2012

More information

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee

More information

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media Enabling Business Beyond the Corporate Network Secure solutions for mobility, cloud and social media 3 Trends Transforming Networks and Security Are you dealing with these challenges? Enterprise networks

More information

Lab Testing Summary Report

Lab Testing Summary Report Key findings and conclusions: Cisco WAAS exhibited no signs of system instability or blocking of traffic under heavy traffic load Lab Testing Summary Report September 2009 Report 090815B Product Category:

More information

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited The Radicati Group, Inc. www.radicati.com Web Security Update A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited 9:30 am, PT March 25, 2010 Speakers

More information

Zscaler Internet Security Frequently Asked Questions

Zscaler Internet Security Frequently Asked Questions Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices

More information

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET ELITE S NEXT GENERATION MANAGED SECURITY SERVICES Security risks to business information systems are expanding at a rapid rate; often,

More information

USG6600 Next-Generation Firewall

USG6600 Next-Generation Firewall USG6600 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The

More information

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS Traditionally, IT risk management has balanced security investment and the impact of the threat, allowing each business

More information

VMware vcloud Air Networking Guide

VMware vcloud Air Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Securing and Optimizing the Next Generation Branch Office

Securing and Optimizing the Next Generation Branch Office Securing and Optimizing the Next Generation Branch Office 1 Global Organizations Current state of affairs 3 Globally distributed enterprises rely on the WAN for day to day operations to stay competitive

More information

Comparative Performance and Resilience Test Results - UTM Appliances. Miercom tests comparing Sophos SG Series appliances against the competition

Comparative Performance and Resilience Test Results - UTM Appliances. Miercom tests comparing Sophos SG Series appliances against the competition Comparative Performance and Resilience Test Results - UTM Appliances Miercom tests comparing SG Series appliances against the competition Overview Firewalls not only provide your first line of defense

More information

QRadar Security Intelligence Platform Appliances

QRadar Security Intelligence Platform Appliances DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management

More information

Cisco Security Intelligence Operations

Cisco Security Intelligence Operations Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,

More information

INFORMATION PROTECTED

INFORMATION PROTECTED INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never

More information

Check Point 4800 Appliance

Check Point 4800 Appliance Datasheet: Check Point 4800 Appliance 4800 Enterprise-grade security appliance (623 SPU/Gbps) great multi-blade performance and 0Gb Fiber connectivity options Check Point 4800 Appliance Today the enterprise

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,

More information

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research 2 3 6 7 9 9 Issue 1 Welcome From the Gartner Files Definition:

More information

Advanced Endpoint Protection Overview

Advanced Endpoint Protection Overview Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking

More information

Cyan Networks Secure Web vs. Websense Security Gateway Battle card

Cyan Networks Secure Web vs. Websense Security Gateway Battle card URL Filtering CYAN Secure Web Database - over 30 million web sites organized into 31 categories updated daily, periodically refreshing the data and removing expired domains Updates of the URL database

More information