Stallioni Sügisseminar

Similar documents
Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Websense Data Security Solutions

Web Security Gateway Anywhere

Websense Web Security Solutions

UNIFIED CONTENT SECURITY: Securing the Borderless Enterprise

+ web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Comprehensive real-time protection against Advanced Threats and data theft

ENABLING FAST RESPONSES THREAT MONITORING

WEBSENSE TRITON SOLUTIONS

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

Websense Messaging Security Solutions. Websense Security Websense Hosted Security Websense Hybrid Security

TRITON APX. Websense TRITON APX

Secure Web Gateways Buyer s Guide >

Building a Web Security Ecosystem to Combat Emerging Internet Threats

WEBSENSE SECURITY SOLUTIONS OVERVIEW

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

REVOLUTIONIZING ADVANCED THREAT PROTECTION

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

Securing the Borderless Enterprise

How To Secure Your Employees Online With Zscaler.Com And Your Website From Being Infected With Spyware Or Malware

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

Lab Testing Detailed Report DR January Competitive Testing of Web Security Devices

Websense: Worldwide Leader in Web Filtering Expands into Web Security

Check Point submitted the SWG Secure Web Gateway for

Web Security Gateway Solutions

TRENDS IN THE THREAT LANDSCAPE

Threat Containment for Facebook

On and off premises technologies Which is best for you?

The first and only unified

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Symantec Protection Suite Add-On for Hosted and Web Security

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

OVERVIEW. Enterprise Security Solutions

SafeNet Content Security. esafe SmartSuite - Security that Thinks. Real-time, Smart and Simple Web and Mail Security Solutions.

Next Gen Firewall and UTM Buyers Guide

Lab Testing Summary Report

overview Enterprise Security Solutions

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

For additional information and evaluation copies of Trend Micro products and services, visit our website at

W H I T E P A P E R W e b S e c u r i t y S a a S : T h e N ext Generation of Web Security

THE EASY WAY TO SECURITY AND SIMPLICITY. Business Suite

The Advantages of Security as a Service versus On-Premise Security

Move over, TMG! Replacing TMG with Sophos UTM

Unified Threat Management, Managed Security, and the Cloud Services Model

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

OVERVIEW. Enterprise Security Solutions

Top 10 Reasons Enterprises are Moving Security to the Cloud

Network protection and UTM Buyers Guide

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution

Network Security. Intertech Associates, Inc.

Websense Overview. Cheryl Erlich February 2008

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

AWARENESS T E C H N O L O G I E S. Complete internal threat solution on the endpoint delivered as a service. A Whitepaper By Ron Penna

Next-Generation Firewalls: CEO, Miercom

4 Steps to Effective Mobile Application Security

Putting Web Threat Protection and Content Filtering in the Cloud

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

INTRODUCING isheriff CLOUD SECURITY

Key Findings. Websense Triton Security Gateway Anywhere

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Securing and Optimizing the Next Generation Branch Office

Astaro Gateway Software Applications

The Cost Benefits of a Hybrid Approach to Security

AVG AntiVirus. How does this benefit you?

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

GOING BEYOND BLOCKING AN ATTACK

Application Intelligence, Control and Visualization

Simplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86%

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Buyers Guide to Web Protection

Securing Cloud-Based

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Cyan Networks Secure Web vs. Websense Security Gateway Battle card

TERRE ACTIVE / BLUECOAT ROLAND MARTY WOHIN GEHT DIE REISE. Territory Sales Manager Switzerland. Septembre 2013

SAAS VS. ON-PREMISE SECURITY. Why Software-as-a-Service Is a Better Choice for and Web Threat Management

Towards a Comprehensive Internet Security Strategy for SMEs

isheriff CLOUD SECURITY

Cloud-based Web Security Isn t Hype: It s Here and It Works

Enterprise-Grade Security from the Cloud

The Next Level of Secure Channel Partnership

INFORMATION PROTECTED

White Paper. ZyWALL USG Trade-In Program

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Attacks from the Inside

The Value of Managed Security Services > White Paper

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Protecting the Infrastructure: Symantec Web Gateway

Websense Solutions. TRITON v7.7 Architecture

Managing Web Security in an Increasingly Challenging Threat Landscape

Balancing Social Networking with Network Security Objectives >

Cloud App Security. Tiberio Molino Sales Engineer

How Web Security Improves Productivity and Compliance

Transcription:

Stallioni Sügisseminar Juha Poutanen, Territory Manager Websense How to open Internet to your employees safely - managing risks of modern Internet web security data security web security email security data security email security

Topics for today Dynamic Internet possibilities and threats Challenges in protecting your essential information How Websense adds value Summary 2009 Websense, Inc. All rights reserved. 2

Today s market reality Jorma Ollila: Edessä on 2-3 vaikeaa vuotta Roni Rekomaa/Lehtikuva

Tough times give us a reason to pause, to think and to change

Now is the Opportunity to Retool Skate where the puck's going, not where it's been. Wayne Gretzky In today s economic climate, this advice is more important than ever. To get there, however, requires us to rethink how we do business. We need to be more effective, more efficient, and more secure

Personal observations Investments are still done price sensitiveness Web 2.0 Consolidation; networks, application, vendors etc. Awakening, we have some sensitive information SaaS or MSP, but retaining control Cost savings Time out Gartner, market leadership Who defines what is important; business or IT 2009 Websense, Inc. All rights reserved. 6

Business 2.0: Real-time Value Chain The Web is THE Business Communication Platform Sales Supply Chain Support Partnerships Information Exchange Example: Software as a Service a Low-cost Delivery Model Infrastructure Operations & Support Time to Market

Employee 2.0 is Driving the Adoption Web 2.0 Corporate Webmail Blogs Hosted Applications YouTube Videos File Sharing Instant Messaging Networking Local Weather

The New Web, Web 2.0 What do we mean Web 2.0? Well, where better to find out than Wikipedia? The changing trends in the use of World Wide Web technology and web design that aim to enhance creativity, communications, secure information sharing, collaboration and functionality of the web Usergenerated Content Complexity and Asynchronous Operation Web 2.0 Mashups and Web Services Diversity of Client Software Consumer and Enterprise Worlds Convergence

Web Traffic Today s Webscape 70 percent of the top 100 Web sites have either hosted or been involved in malicious activity over the last six-month period. THE DYNAMIC WEB Constantly changing content Millions of varied pages per site Legitimate sites compromised Legacy security systems obsolete Requires real-time content analysis THE KNOWN WEB Current events, regional, genre sites Less user-generated content Reputation, URL databases fairly effective THE UNKNOWN WEB Junk, personal, scam, adult, etc. Million of new sites appear daily Reputation and URL databases can t keep up Requires real-time categorization and real-time security scanning Top 100 sites Next 1 million sites Next 100 million sites

Web Traffic Today s Webscape 90 percent of the top 100 Web sites are classified as Social Networking or Search and more than 45% of these sites support user-generated content. THE DYNAMIC WEB Constantly changing content Millions of varied pages per site Legitimate sites compromised Legacy security systems obsolete Requires real-time content analysis THE UNKNOWN WEB Junk, personal, scam, adult, etc. Million of new sites appear daily Reputation and URL databases can t keep up Requires real-time categorization and real-time security scanning THE KNOWN WEB Current events, regional, genre sites Less user-generated content Reputation, URL databases fairly effective Top 100 sites Next 1 million sites Next 100 million sites Requires real-time inline analysis Requires proactive mining, and reputation analysis 11

How Web 2.0 Is Being Used By Hackers Koobface targeting Facebook and Twitter Malicious Facebook apps Scams on LinkedIn and Facebook Malicious URLS posted in YouTube comments BlogSpot continues to be haven for malware 12

State of Internet Security Highlights Email and Web Threats have Converged Blended threats continued to dominate the security landscape in the first half of 2009 85.6 percent of all unwanted emails in circulation contained links to spam sites and/or malicious Web sites Malicious Web sites identified by Websense Security Labs increased by 233 percent over the last 6 months 671 percent over the last year 77 percent of Web sites with malicious code are compromised legitimate sites 95 percent of the of user-generated comments to blogs, chat rooms, and message boards are spam or malicious 13

Addressing the Risks Many security systems rely on looking backwards Reputation systems know what used to be on a site not what was just posted AV signatures are reactive waiting until the damage is done Simplistic, non-granular policies can lead to over-blocking and frustration Examples : Facebook = BAD, block all pages Wikipedia = GOOD, allow unrestricted access 14

Web 1.0 Security won t work Recent survey results show 15

How Competitors Deal with Web 2.0 YES NO MAYBE???????? Backwards-looking technology Decisions on entire sites based on past reputation not content Web 2.0 sites content are considered all good or all bad Facebook = BAD, block all pages Wikipedia = GOOD, allow unrestricted access Simplistic, non-granular policies can lead to over-blocking and frustration

How Websense Deals with Web 2.0 Inline, real-time classification of all content, at any level within a site. Comprehensive Web 2.0 malware protection Dynamic threats, malicious scripts, infected Web objects, browser-based applications YES NO MAYBE NO YES MAYBE YES YES YES Granular policy controls based on actual content not past reputation Enables organizations to allow access to large Web 2.0 sites without allow unwanted content or malware

Accurate Classification of Web 2.0 Content

Competitors Fail To Address Web 2.0 Blue Coat WebFilter is limited Static URL list does not cover Web 2.0 Web sites, particularly password protected content

Websense ThreatSeeker Network Threat Detection/Probes Real-Time Security Updates Shared Analytics/Feedback Websense Web Security Gateway ThreatSeeker Technology 1 billion pieces of content per day Websense Hosted Customers Websense Security Labs 200+ million sites per hour 10+ million emails per hour Websense Hosted Security URL and Security Database ThreatSeeker Technology 20

Web 2.0 Effectiveness #1 Revolutionary performance Websense clear leader in controlling Web 2.0 content and threats Websense has unique visibility into social networking and blogging communities Most competitors use only legacy security techniques that cannot address Web 2.0 21

Consolidation - Deployment Comparison ( 10000 Users) BlueCoat Websense V10000 2 x Proxy SG 8100-30 4 x Proxy AV 810B 1 x Director 2 x BCAAA Agent 1 x Blue Coat Enterprise Reporter ( $$ ) 3 x V10000 1 x Manager / Reporting 9 RU Rack Space Saved 22

Case Study - Email Security Project In 2008, Websense migrated from on-premise email security to cloud-based. The result was a 55% cost savings! Brightmail Websense Subscription License 3 Year (list) $41,800 $36,960 Subscription Licenses 3 Year (discounted) $24,000 $25,025 Servers 2 x $5,000 $10,000 - Power 600W @.26Whr $4,100 - Bandwidth $1,800 - Labor (install/training/monitoring) $44,000 $12,400 Total $83,900 $37,425

Websense Data Security Suite Best DLP solution available Block Quarantine Encrypt Email Notify Confirm HTTP FTP Application IM Desktop Print Remediate Removable Media Laptop Custom Channels CD/DVD Database File Server

Recent DLP Project Network Monitoring Uncovered 9764 policy violations in 5 weeks Most common violations were via email Customer, Partner, personal, financial, strategic information Result of broken business processes Second most common violations were over the Web Data sent out via personal Webmail Third most common violation is FTP FTPs to partners or from BU to BU Many personal Web transactions Personal purchases etc

Websense - Essential Information Protection Global Technical Support Standard Support Premium Support Mission Critical Support Web Security WEBSENSE Integrated Policy Controls Shared Content Gateway Web Security Suite WEBSENSE Web Security Express WEBSENSE Remote Filtering WEBSENSE Web Security Gateway* WEBSENSE Enterprise WEBSENSE Hosted Web Security Data Security WEBSENSE Data Security Suite Data Security Discover Monitor Protect Endpoint Essential Information Protection Shared Content Awareness Messaging Security WEBSENSE Email Security Messaging Antivirus Security Antispam Content Filter WEBSENSE Hosted Email Security = Hosted = On-Premise = Client Encryption Integrated Threat Detection Unified Hosted Services 26

Challenge of Protecting Essential Information Who What Where How Action Human Resources Source Code Benefits Provider File Transfer Audit Customer Service Business Plans Personal Web Storage Web Block Marketing Patient Information Business Partner Instant Messaging Notify Finance M&A Plans Blog Peer-to-Peer Remove Accounting Employee Salary Customer Email Encrypt Sales Financial Statements Spyware Site Print Quarantine Legal Customer Records Removable Media File Access Confirm Technical Support Technical Documentation Competitor Print Screen Engineering Competitive Information Analyst Copy/Paste

Technology Directions 2009-2010 SSL Integrated Cloud + On Premise Policy Management Enterprise Network Content UTM Real-time Content and Threat Analysis Application Control Email Websense Virtual Application Platform Anti-Virus Data Loss Prevention Product Directives Portfolio Integration for Granular Policy Management and Reporting Deployment Options to Suit Customer Environments Product & Portfolio Innovation to Address Dynamic Threats to Security, Productivity, and to Enable Business Email Web Data Mobile Worker & Remote/Branch Office

So what does this mean for you and your business?

Websense Can Protect your employees from threats on the Web and email Safeguard your organizations productivity and legal liability, in a dynamic, Web 2.0 world Prevent data loss, over your critical business channels Enable your business to securely take advantage of new markets and technologies, like Web 2.0 Deliver an integrated, information protection management solution Lower your security and operations costs, through flexible, hybrid deployments

Next steps and resources etc... See a product demo: www.websense.com/wsgdemo Ask your Partner Account Manager about our latest promotional offers * * Terms & conditions apply, offers expire 31 st December 2009 2009 Websense, Inc. All rights reserved. 31

Thank You!

About Websense Leading Provider of Web, Email and Data Security (DLP) Solutions Annual Revenue: $310M (20% year over year growth) Employees: 1,303 More than 50,000 customers worldwide 42 million subscription seats 5,000 value-add resellers, worldwide Award-winning partner program Global development with 5 sites Global security research with more than 80 dedicated content researchers Global support and services Today s enterprises require a more holistic and integrated approach for Internet security a Web security ecosystem to combat emerging threats from the Internet Websense is the worldwide leading vendor in the Web Security market. -Brian Burke, Program Director Security Products, IDC 33