Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Similar documents
Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Websense Web Security Solutions

Websense Data Security Solutions

Websense Messaging Security Solutions. Websense Security Websense Hosted Security Websense Hybrid Security

Securing the Borderless Enterprise

Web Security Gateway Solutions

WEBSENSE TRITON SOLUTIONS

Stallioni Sügisseminar

Symantec Protection Suite Add-On for Hosted and Web Security

The first and only unified

Stop advanced targeted attacks, identify high risk users and control Insider Threats

WEBSENSE SECURITY SOLUTIONS OVERVIEW

INTRODUCING isheriff CLOUD SECURITY

Websense: Worldwide Leader in Web Filtering Expands into Web Security

TRITON APX. Websense TRITON APX

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

ENABLING FAST RESPONSES THREAT MONITORING

SafeNet Content Security. esafe SmartSuite - Security that Thinks. Real-time, Smart and Simple Web and Mail Security Solutions.

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

UNIFIED CONTENT SECURITY: Securing the Borderless Enterprise

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Protecting the Infrastructure: Symantec Web Gateway

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

SAAS VS. ON-PREMISE SECURITY. Why Software-as-a-Service Is a Better Choice for and Web Threat Management

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Buyers Guide to Web Protection

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

isheriff CLOUD SECURITY

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Web Security Gateway Anywhere

+ web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

SECURALIVE WEB SECURITY GATEWAY

Content-ID. Content-ID URLS THREATS DATA

Comprehensive real-time protection against Advanced Threats and data theft

Netsweeper Whitepaper

Secure Web Gateways Buyer s Guide >

INFORMATION PROTECTED

Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1

Symantec Messaging Gateway 10.6

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Attack Intelligence Research Center Monthly Threat Report MalWeb Evolution and Predictions

Cyan Networks Secure Web vs. Websense Security Gateway Battle card

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Cyber Security Solutions:

W H I T E P A P E R W e b S e c u r i t y S a a S : T h e N ext Generation of Web Security

Secure Your Mobile Workplace

Cisco ASA 5500 Series Business Edition

Firewall and UTM Solutions Guide

Best Practices for a BYOD World

Threat Containment for Facebook

IBM Global Technology Services Preemptive security products and services

Next-Generation Firewalls: Critical to SMB Network Security

Next Gen Firewall and UTM Buyers Guide

Symantec Messaging Gateway powered by Brightmail

OVERVIEW. Enterprise Security Solutions

V1.4. Spambrella Continuity SaaS. August 2

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

Check Point submitted the SWG Secure Web Gateway for

On and off premises technologies Which is best for you?

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Symantec Messaging Gateway 10.5

Intelligent, Scalable Web Security

SafeNet Content Security Product Overview. Protecting the Network Edge

Managing Web Security in an Increasingly Challenging Threat Landscape

HIPAA DATA SECURITY & PRIVACY COMPLIANCE

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Putting Web Threat Protection and Content Filtering in the Cloud

overview Enterprise Security Solutions

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

Looking Ahead The Path to Moving Security into the Cloud

Building a Web Security Ecosystem to Combat Emerging Internet Threats

Phishing Activity Trends Report June, 2006

WEBSENSE GLOBAL PARTNER PROGRAM OVERVIEW EMPOWERING PARTNERS WITH THE BEST SECURITY FOR TODAY S THREATS

WildFire. Preparing for Modern Network Attacks

World-class security solutions for your business. Business Products. C a t a l o g u e

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

User Documentation Web Traffic Security. University of Stavanger

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

NetDefend Firewall UTM Services

Lab Testing Detailed Report DR100412D. Detailed Competitive Testing of the Websense Web Security Gateway 7.5

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Protecting Organizations from Spyware

Mitigating Web Threats with Comprehensive, Cloud-Delivered Web Security

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

The Benefits of SSL Content Inspection ABSTRACT

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Powerful and reliable virus and spam protection for your GMS installation

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS

Spyware: Securing gateway and endpoint against data theft

Zone Labs Integrity Smarter Enterprise Security

Enterprise Buyer Guide

Transcription:

Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions

The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even from so-called trusted sites is constantly changing with end-users encouraged to post, edit, or manipulate content. The most popular and heavily-trafficked sites that make the most use of dynamic Web 2.0 content, are also the most vulnerable to attack. In fact, according to research covering the first half of 2008, over 60 percent of these top 100 sites either hosted malicious content or contained a masked redirect to an illegitimate site.* Web Traffic The Dynamic Web Constantly changing content Millions of varied pages per site Legitimate sites compromised Legacy security systems obsolete Requires real-time content analysis The Known Web Current events, regional, genre sites Less user-generated content Legitimate sites compromised Reputation, URL databases fairly effective The Unknown Web unk, personal, scam, adult, etc. Million of new sites appear daily Reputation and URL databases can t keep up Requires real-time categorization and real-time security scanning Top 100 Sites ext 1 Million Sites ext 100 Million Sites The Web security landscape is changing: heavily-trafficked sites contain the most dynamic content, which bypasses most legacy security systems. understands both the content and the context of the Internet landscape through its industry-leading ThreatSeeker Network, and feeds this intelligence into all its security solutions. is the first security vendor to address the risks of Web 2.0 by deploying ThreatSeeker analytics inline at the customer s gateway, providing dynamic, adaptive protection against new threats and uncategorized content. ThreatSeeker Network The ThreatSeeker Network adaptive security technology uses more than 50 million real-time data collecting systems that continuously monitor Internet content including new and dynamic content for emerging threats. The ThreatSeeker Network feeds this intelligence into its Web security, messaging security, and data loss prevention solutions. As a result, is able to adapt to the rapidly changing Internet at speeds not possible by traditional security solutions and basic email filtering solutions. The ThreatSeeker Network: Analyzes more than 40 million Web sites per hour Assigns reputation to more than 2 million domains, networks, IP addresses, and hosts every hour Scans nearly 10 million emails for unwanted content and malicious code every hour Captures more than 10 million unsolicited spam, phishing, or exploit campaigns every day customers can now harness the power of Web 2.0, while keeping security risks in check by examining the content of both inbound and outbound HTTP and SSL-encrypted traffic. Real-time content analysis is combined with powerful anti-malware, Web reputation, and URL filtering protection to proactively block malicious content before other security solutions even know it exists. This approach keeps networks secure, while still enabling the latest Web-based tools, applications, and legitimate content. * Security Labs Threat Report, July 2008

The Web 2.0 Challenge The Internet is rapidly evolving and Web 2.0 technologies are dramatically changing the way people communicate and work. As the powerful, collaborative nature of Web 2.0 is creating a new way of doing business, it also introduces unprecedented security risks. Web 2.0 applications are rapidly appearing on the desktop, from Web-based mashups to hosted services to user-generated content and applications. The dynamic, user-generated content common to Web 2.0 cannot be monitored with legacy security models, such as reputation databases or URL filtering. This presents IT security teams with conflicting challenges how to tap the enormous potential of Web 2.0 while keeping networks, end-users, and sensitive data secure. Web-based Mashup ThreatSeeker Network is the best set of security categorization and detection technologies we have seen available on the market. Beth Cannon, Thomas Weisel Partners Local Applications & Data Network Applications & Data Hosted Applications & Data User Generated Content Hosted Security User Generated Applications prevented attacks from hitting our network and potentially prevented the theft of confidential and patient data. The changing desktop: Web mashups, user-generated content, widegets and hosted applications present new security challenges. Central Coast Community Healthcare Say Yes to Web 2.0 As new capabilities made possible by Web 2.0 enter the business mainstream, simply denying access and blocking the use of these technologies is no longer a viable option. To take advantage of the business opportunities of Web 2.0, organizations need to know that essential corporate information is being protected. With, IT professionals can provide access to the latest Web-based tools and applications while still keeping the enterprise safe from attack. With the unrivaled knowledge of the threat landscape, real-time analysis of dynamic content, and comprehensive inbound and outbound security found in Web security solutions, IT professionals can now say Yes to Web 2.0.

Web Security Products Optional Add-ons The capabilities of Web security products can be extended with optional add-on modules: Client Policy Manager provides a comprehensive endpoint security solution for desktops, laptops and servers to protect against known and unknown security threats. It prevents installation and execution of unauthorized applications and enforces policy with a comprehensive database of categorized applications. Remote Filtering extends Web filtering and security protection to remote offices and mobile laptop users. Remote Filtering extends protection to users and equipment when used outside the network and ensures safe and secure Internet use anytime and anywhere. Web Security Gateway Web Security Gateway analyzes and secures Web traffic in real-time, enabling safe use of the latest Web 2.0 sites and tools. The Web Security Gateway adds on-premise, proxy-based content analysis of Web and SSL traffic to the robust Web Security and Web Filter platform. This allows instant categorization of new sites and dynamic content, while proactively discovering security risks and blocking dangerous malware. The Web Security Gateway includes: The Active Security module deploys state-of-the-art ThreatSeeker analytics at the gateway to detect, block, or strip malicious code before it enters the network. Using advanced heuristics, rules, signatures, and behavior detection, these analytics are integrated with the global ThreatSeeker Network providing continuous updates and fine-tuning to detect the latest threats. The Content Gateway module provides inline classification of new content, along with decryption and scanning of SSL traffic. Built on a robust Web proxy and caching platform, the Content Gateway module can identify proxy avoidance, adult, hacking, and many other types of content, protecting users from the potential risks of new, unknown Web content. Web Security Gateway combines powerful security with unrivaled ease-of-use. An intuitive management dashboard provides immediate feedback on network security, threat detection, traffic loads, and user activity. Combined Integrated policy management, reporting, and delegated administration saves time and effort while reducing errors that can lead to security breaches. Web Security Gateway Internet End User Content Gateway Web Security V7 Security Labs Data Security Suite Web Security Gateway components. Intuitive security dashboard provides instant feedback on threats, user activities and policy controls.

Web Security Web Security (formerly Web Security Suite) combines industry-leading URL filtering with extensive security capabilities. The solution includes Web reputation services and comprehensive security categories, such as spyware, phishing, keylogging, and malicious mobile code. Web Security minimizes exposure to threats by applying updates from the ThreatSeeker Network within minutes of discovery. It provides control over instant messaging (IM) and IM attachments, which can be a major source of data leaks and malicious attacks. Web Security is easy to manage with a Web-based GUI and security dashboard, intuitive policy controls, delegated administration, and flexible, integrated reporting. Solutions and Modules Flexibly Packaged Web Security includes Web Protection Services, which continuously watches the organization s Web sites, brands, and associated URLs for malicious activity to prevent them from being used in fraudulent attacks. Web Filter Web Filter (formerly Enterprise ) is the world s leading Web security solution to improve employee productivity, decrease legal liability, and optimize use of network resources. It allows for customized policies to meet specialized needs and minimizes administrative overhead with an intuitive Webbased GUI and flexible integrated reporting. In addition to controlling access to Web sites, Web Filter provides policy-based control over more than 100 network protocols protecting against blended security threats and bandwidth drains. The solution is highly scalable with a distributed architecture, and offers extensive integrations with third-party network devices. Also available from Express Express provides the industry s leading content filtering and Internet security capabilities in a simple and affordable solution. It allows organizations under 250 users to quickly and easily protect their employees from Internet risks by controlling access to inappropriate content and proactively blocking security threats before they have a chance to infect their systems. Hosted Web Security also offers an alternative for distributed organizations with many remote locations or roaming users. Hosted Web Security (formerly SurfControl WebDefense ) proactively discovers and blocks threats at the Internet level, eliminating the need to deploy on-premise software or hardware. This hosted service centralizes Web protection across multiple gateways, locations, and roaming user sites, eliminating threats before they reach the network. data centers are certified to ISO 27001 standards, and the service is backed by industry-leading SLAs to guarantee uptime and competitive disaster recovery provisions.

Operating Systems Web Security Gateway* Content Gateway RedHat Enterprise Linux 4, update 5 Web Security RedHat Enterprise Linux 4, update 5 Standard or Enterprise Editions, with SP1 Microsoft Windows 2000 with SP3 or higher Content Gateway* RedHat Enterprise Linux 4, update 5 Web Security RedHat Enterprise Linux 4, update 5 Standard or Enterprise Editions, with SP1 Microsoft Windows 2000 with SP3 or higher Web Filter RedHat Enterprise Linux 4, update 5 Standard or Enterprise Editions, with SP1 Microsoft Windows 2000 with SP3 or higher Express (SP1-R2) Available as software (worldwide) or an appliance (North America only). Consult your reseller for details. * The Web Security Gateway and Content Gateway Module require Premium Support unless otherwise approved., Inc. San Diego, CA USA tel 800 723 1166 tel 858 320 8000 www. UK Ltd. Reading, Berkshire UK tel 0118 938 8600 fax 0118 938 8698 www.websense.co.uk Australia.au Brazil portuguese. Colombia.es France websense.fr Germany websense.de Hong Kong websense.cn India Ireland websense.co.uk Israel websense.co.uk Italy websense.it Japan websense.jp Malaysia Mexico.es PRC prc. Singapore Spain.es Taiwan websense.cn UAE The Company Behind the Solutions is a leader in integrated Web, data and email security, protecting the essential information of more than 42 million people around the world. software and hosted security solutions help organizations block malicious code, prevent the loss of confidential information, and enforce Internet use and security policies. After 15 years of Internet experience, nobody knows the Web like. has unprecedented visibility into the internal and external movement of information in the Web 2.0 world with knowledge of: Who is authorized to access Web sites, content, or applications What data must be protected from leaks Where users can go online and sensitive data can be sent How sensitive data can be communicated and online resources can be used provides unparalleled protection by means of the ThreatSeeker Network the technology foundation for Web, data, and email security solutions. The ThreatSeeker Network provides the intelligence that underlies Essential Information Protection by delivering real-time reputation analysis, expanded behavioral analysis and actual data identification. Learn more about Essential Information Protection, the ThreatSeeker Network, and the entire line of solutions at www.. Say Yes to Web 2.0 with. Provides Leading Global Technical Support offers three levels of support tailored to the needs of customers: Mission Critical Support includes Premium Support, plus access to a dedicated technical account manager (TAM) who provides one-on-one strategic support planning and more. Premium Support includes Standard Support with extended 24/7 support, 365 days a year, and priority call access and email support. Standard Support provides all customers with phone and email support during business hours, plus unlimited access to the My Web portal and Knowledge Base resources. For a free evaluation of all products or to view our online demos, visit www./evaluations. 2008, Inc. All rights reserved. and Enterprise are registered trademarks of, Inc. in the United States and certain international markets. has numerous other unregistered trademarks in the United States and internationally. All other trademarks are the property of their respective owners. 10.14.08