Websense Data Security Solutions



Similar documents
Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Websense Messaging Security Solutions. Websense Security Websense Hosted Security Websense Hybrid Security

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

Web Security Gateway Solutions

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

A Buyer's Guide to Data Loss Protection Solutions

WEBSENSE TRITON SOLUTIONS

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

SafeNet Content Security. esafe SmartSuite - Security that Thinks. Real-time, Smart and Simple Web and Mail Security Solutions.

UNIFIED CONTENT SECURITY: Securing the Borderless Enterprise

WEBSENSE SECURITY SOLUTIONS OVERVIEW

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

Lab Testing Detailed Report DR100412D. Detailed Competitive Testing of the Websense Web Security Gateway 7.5

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

Symantec Protection Suite Add-On for Hosted and Web Security

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

10 Building Blocks for Securing File Data

Identifying Broken Business Processes

ENABLING FAST RESPONSES THREAT MONITORING

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.5

Stop advanced targeted attacks, identify high risk users and control Insider Threats

TRITON - Data Security Help

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview

Symantec DLP Overview. Jonathan Jesse ITS Partners

INTRODUCING isheriff CLOUD SECURITY

Comprehensive real-time protection against Advanced Threats and data theft

CA Technologies Data Protection

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Outbound Security and Content Compliance in Today s Enterprise, 2005

MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network

WEBSENSE GLOBAL PARTNER PROGRAM OVERVIEW EMPOWERING PARTNERS WITH THE BEST SECURITY FOR TODAY S THREATS

overview Enterprise Security Solutions

Data Loss Prevention Program

Best Practices for a BYOD World

CISCO NETWORK CONNECTIVITY CENTER

Threat Containment for Facebook

Protecting the Infrastructure: Symantec Web Gateway

INSTANT MESSAGING SECURITY

Key Findings. Websense Triton Security Gateway Anywhere

V1.4. Spambrella Continuity SaaS. August 2

Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1

Using Data Loss Prevention for Financial Institutions Banks, Credit Unions, Payments

Fidelis XPS Tech Talk: Preventing Cyber Attacks With Real-Time Threat Intelligence. June 2010 Version 1.0 PAGE 1 PAGE 1

Devising a Server Protection Strategy with Trend Micro

THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION. Technology Overview, Business Justification, and Resource Requirements

Protecting ip Data From Loss and theft: The ShorTeST PaTh To PrevenTion and risk reduction

Devising a Server Protection Strategy with Trend Micro

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

SafeNet Content Security Product Overview. Protecting the Network Edge

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

TRITON - Data Security Help

OVERVIEW. Enterprise Security Solutions

overview Enterprise Security Solutions

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

Data Protection McAfee s Endpoint and Network Data Loss Prevention

isheriff CLOUD SECURITY

Cisco Blended Agent: Bringing Call Blending Capability to Your Enterprise

McAfee Web Reporter Turning volumes of data into actionable intelligence

Analyzing HTTP/HTTPS Traffic Logs

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

Taking a Data-Centric Approach to Security in the Cloud

Malware and Other Malicious Threats

Cyberoam Perspective BFSI Security Guidelines. Overview

Next Gen Firewall and UTM Buyers Guide

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Secure Your Mobile Workplace

Technology Blueprint. Protect Your . Get strong security despite increasing volumes, threats, and green requirements

Five Tips to Ensure Data Loss Prevention Success

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

Top Four Considerations for Securing Microsoft SharePoint

Data Loss Prevention. Keeping sensitive data out of the wrong hands*

Transcription:

Data Security Suite Data Discover Data Monitor Data Protect Data Endpoint Data Security Solutions

What is your confidential data and where is it stored? Who is using your confidential data and how? Protecting customer and other confidential data from malicious and accidental leaks is one of the top business and IT security challenges facing organizations today. Whether it s customer records or intellectual property, information is the lifeblood of today s enterprise. Today s CIOs invest in technologies to make this data available on demand to employees, customers, and partners. But broken business processes, employee error, and gaps in security often put this data at risk risk from regulatory and corporate compliance, customer and competitive pressures, and the rising cost and publicity of data leaks. But what if you could Is your confidential data secure? Discover where confidential information is stored throughout the network. Monitor where sensitive data travels in and out of the network. Protect confidential data and information from misuse. With you can protect your data Your internal network contains a surprising amount of sensitive and proprietary information, and more organizations are falling victim to high-profile data leaks. The majority of data leaks are accidental or unintentional, but any leak has the potential to be devastating and the losses can be significant. Data leaks can be prevented and the enterprise kept safe, without inhibiting business. ThreatSeeker Network The ThreatSeeker Network adaptive security technology uses more than 50 million real-time data collecting systems that continuously monitor Internet content including new and dynamic content for emerging threats. The ThreatSeeker Network feeds this intelligence into its Web security, messaging security, and data loss prevention solutions. As a result, is able to adapt to the rapidly changing Internet at speeds not possible by traditional security solutions and basic email filtering solutions. The ThreatSeeker Network dynamically classifies structured and unstructured data to enforce data standards and regulations and prevent loss of sensitive data on internal endpoint systems. The ThreatSeeker Network: Analyzes more than 40 million Web sites per hour Assigns reputation to more than 2 million domains, networks, IP addresses, and hosts every hour Scans nearly 10 million emails for unwanted content and malicious code every hour Captures more than 10 million unsolicited spam, phishing, or exploit campaigns every day

The Approach to Data Security enables business while securing an organization s essential information. Data Security Suite protects against data loss by quickly analyzing data and enforcing policies automatically whether users are on the network or offline. offers the leading Data Loss Prevention (DLP) solution designed to protect customer information, intellectual property, and enforce and report on regulatory compliance. Through our patented PreciseID technology, automatically discovers confidential data, monitors its use, and enables administrators to create and implement content enforcement policies. Data Security solutions are available in the Data Security Suite* which is comprised of four, fully-integrated modules that can be deployed based on customer need: Data Discover Discovers and classifies data distributed throughout the enterprise. Through 2010 we expect sensitive information leaks to be primarily unintentional, accidental, or the result of poor business processes. Paul Proctor, Research Vice President, Gartner Data Monitor Monitors who is using what data, and how. Data Protect Protects data with policy-based controls that map to business processes. Data Endpoint Extends data security to the endpoint with integrated management and reporting. Data Security Suite is the only data loss prevention (DLP) solution that provides content, context, and destination awareness, allowing administrators to manage who can send what information, where, and how. Data Security Suite includes an advanced policy framework to intelligently map data policies to business processes for protection on the network and at the endpoint. It includes a powerful policy platform to enable business and secure data. This unique capability provides visibility and control for managing who and what go where and how. * All Data Security products require Premium Support unless otherwise approved. Who Human Resources Customer Service Marketing Finance Accounting Sales Legal Technical Support Engineering What Where How Source Code Business Plans Employee Information M&A Plans Patient Information Financial Statements Customer Records Technical Documentation Competitive Information Benefits Provider Internet Auction Business Partner Blog Customer Spyware Site North Korea Competitor Analyst File Transfer Web Instant Messaging Peer-to-Peer Email Network Printing Data Security Suite provides controls to manage who can send what data where, and how.

Data Security Products With Data Security Suite, we can accurately identify any communication containing PII or source code, and route it for encryption. CISO, SallieMae Inc. Data Security Suite Data Security Suite prevents data loss, manages compliance, and secures business practices. Each of the four integrated modules provides unparalleled visibility into communications, compliance auditing, and the risk of data loss. Visibility. Data Security Suite s advanced policy framework intelligently maps data policies to business processes, enabling business and securing data providing visibility and control over managing who and what go where and how. Detection Accuracy. Through PreciseID technology, combined with the powerful ThreatSeeker Network, Data Security Suite accurately identifies and classifies data, both on the network and at the endpoint. Solution Coverage. Data Security Suite monitors all types of data on the network and at the endpoint, securing data regardless of format or location. Management and Reporting. Centralized management and reporting provides easy tools to analyze, track, remediate, and report on policy violations. Fifty percent of organizations start with the network (data in motion), 25% lead with discovery (data at rest) and approximately 25% start with a contentaware endpoint. GARTNER: Develop an Enterprise Strategy for Content Monitoring and Filtering/Data Loss Prevention, 2008 Web Security Suite Web-based management and reporting dashboard.

Data Discover The explosion of information faced by all companies means you often don t know what data is confidential or where it is located. Data Discover provides agentless network and data discovery to efficiently find the location of confidential information on laptops, desktops, file servers and classify it. Data Discover provides situational awareness of data stored throughout the organization to support data security policies, and can be purchased alone or deployed as part of the fully integrated Data Security Suite. Data Monitor Data Monitor provides enterprise-wide monitoring of all internal and external business communications, email, network printing, FTP, HTTP, HTTPS, IM, and more. Data Monitor helps organizations audit business processes with an advanced policy framework that identifies who is sending what data where, how they are sending it, and provides actionable intelligence to reduce the risk of data loss and manage compliance. Data Protect Data Protect includes Data Monitor and provides built-in, automated policy enforcement to secure how and where data travels. It is the only data loss prevention solution with native enforcement for in-line protection of SMTP and HTTP traffic. With Data Protect, organizations can employ enforcement actions such as blocking, quarantining, forced encryption, and notification, in addition to a powerful set of incident management tools to prevent data leakage, improve business processes, and manage compliance and risk. Data Endpoint Data Endpoint extends data security to the endpoint, including the ability to discover, monitor, and protect data whether the user is on or off the network. It includes fingerprinting and policy templates for data identification and can prevent data loss even if the user is offline for such channels as USB devices, printing, IM, and for such actions as copy/paste, print screen, and more. The capabilities of Data Security products can be extended with these optional Web Security add-on modules from : Web Security Gateway Web Security Gateway analyzes and secures your Web traffic in real-time, enabling safe use of the latest Web 2.0 sites and tools. Consisting of the Active Security Module and Content Gateway Module, the Web Security Gateway adds on-premise, proxybased content analysis of Web and SSL traffic to the robust Web Security and Web Filter platform. This allows instant categorization of new sites and dynamic content, while proactively discovering security risks and blocking dangerous malware. Web Filter Web Filter is the world s leading solution to improve employee productivity, decrease legal liability, and optimize use of network resources. The solution allows for customized policies to meet specialized needs and minimizes administrative overhead with an intuitive Web-based GUI and flexible integrated reporting. In addition to controlling access to Web sites, Web Filter provides policy-based control over more than 100 network protocols, protecting you from blended security threats and bandwidth drains.

, Inc. San Diego, CA USA tel 800 723 1166 tel 858 320 8000 www. UK Ltd. Reading, Berkshire UK tel 0118 938 8600 fax 0118 938 8698 www.websense.co.uk Australia.au Brazil portuguese. Colombia.es France websense.fr Germany websense.de Hong Kong websense.cn India Ireland websense.co.uk Israel websense.co.uk Italy websense.it Japan websense.jp Malaysia Mexico.es PRC prc. Singapore Spain.es Taiwan websense.cn UAE The Company Behind the Solutions is a leader in integrated Web, data and email security, protecting the essential information of more than 42 million people around the world. software and hosted security solutions help organizations block malicious code, prevent the loss of confidential information and enforce Internet use and security policies. After 15 years of Internet experience, nobody knows the Web like. has unprecedented visibility into the internal and external movement of information in the Web 2.0 world with knowledge of: Who is authorized to access Web sites, content, or applications What data must be protected from leaks Where users can go online and sensitive data can be sent How sensitive data can be communicated and online resources can be used provides unparalleled protection by means of the ThreatSeeker Network the technology foundation for Web, data, and email security solutions. The ThreatSeeker Network provides the intelligence that underlies Essential Information Protection by delivering real-time reputation analysis, expanded behavioral analysis and actual data identification. Learn more about Essential Information Protection, the ThreatSeeker Network, and the entire line of solutions at www.. Say Yes to Web 2.0 with. Provides Leading Global Technical Support offers three levels of support tailored to the needs of customers: Mission Critical Support includes Premium Support, plus access to a dedicated technical account manager (TAM) who provides one-on-one strategic support planning and more. Premium Support includes Standard Support with extended 24/7 support, 365 days a year, and priority call access and email support. Standard Support provides all customers with phone and email support during business hours, plus unlimited access to the My Web portal and Knowledge Base resources. For a free evaluation of all products or to view our online demos, visit www./evaluations. 2008, Inc. All rights reserved. and Enterprise are registered trademarks of, Inc. in the United States and certain international markets. has numerous other unregistered trademarks in the United States and internationally. All other trademarks are the property of their respective owners. 10.15.08