Stop advanced targeted attacks, identify high risk users and control Insider Threats



Similar documents
TRITON APX. Websense TRITON APX

Comprehensive real-time protection against Advanced Threats and data theft

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

ENABLING FAST RESPONSES THREAT MONITORING

WEBSENSE TRITON SOLUTIONS

WEBSENSE SECURITY SOLUTIONS OVERVIEW

Can Your Organization Brave The New World of Advanced Cyber Attacks?

Securing the Borderless Enterprise

GOING BEYOND BLOCKING AN ATTACK

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

TRENDS IN THE THREAT LANDSCAPE

The first and only unified

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

ADVANCED PERSISTENT THREATS AND OTHER ADVANCED ATTACKS:

Content Security: Protect Your Network with Five Must-Haves

Websense Messaging Security Solutions. Websense Security Websense Hosted Security Websense Hybrid Security

Websense Web Security Solutions

When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński

The Hillstone and Trend Micro Joint Solution

Defending Against. Phishing Attacks

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Advanced Persistent. From FUD to Facts. A Websense Brief By Patrick Murray, Senior Director of Product Management

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Fighting Advanced Threats

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

Cisco Cloud Web Security

Analyzing HTTP/HTTPS Traffic Logs

overview Enterprise Security Solutions

Unified Security, ATP and more

Advanced Threat Protection with Dell SecureWorks Security Services

+ web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.

Cisco Advanced Malware Protection for Endpoints

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

OVERVIEW. Enterprise Security Solutions

overview Enterprise Security Solutions

Symantec Protection Suite Add-On for Hosted and Web Security

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

A New Era of Cybersecurity Neil Mohammed, Sales Engineer

Endpoint protection for physical and virtual desktops

Cisco Advanced Malware Protection

Cisco Advanced Malware Protection for Endpoints

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

IBM Security Strategy

Stallioni Sügisseminar

The Symantec Approach to Defeating Advanced Threats

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

Websense Solutions. TRITON v7.7 Architecture

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

OVERVIEW. Enterprise Security Solutions

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

SPEAR PHISHING AN ENTRY POINT FOR APTS

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Breaking the Cyber Attack Lifecycle

Spear Phishing Attacks Why They are Successful and How to Stop Them

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense

Protecting PoS Environments Against Multi-Stage Attacks

Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview

Addressing Advanced Web Threats. Addressing Advanced Web Threats: Protect Your Data and Brand

V1.4. Spambrella Continuity SaaS. August 2

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Microsoft s cybersecurity commitment

Lab Testing Detailed Report DR January Competitive Testing of Web Security Devices

Protecting ip Data From Loss and theft: The ShorTeST PaTh To PrevenTion and risk reduction

Lab Validation Report

Cloud App Security. Tiberio Molino Sales Engineer

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

The Evolution of the Enterprise And Enterprise Security

24/7 Visibility into Advanced Malware on Networks and Endpoints

Concierge SIEM Reporting Overview

Superior protection from Internet threats and control over unsafe web usage

Protecting Point-of-Sale Environments Against Multi-Stage Attacks

Symantec Consulting Services

WildFire. Preparing for Modern Network Attacks

Achieve Deeper Network Security and Application Control

Symantec Mobile Security

Lab Testing Detailed Report DR Competitive Testing of the Websense TRITON Web Security Gateway Anywhere v7.7.3

IBM Endpoint Manager for Core Protection

Protecting Data From the Cyber Theft Pandemic. A FireEye Whitepaper - April, 2009

INTRODUCING isheriff CLOUD SECURITY

Commtouch RPD Technology. Network Based Protection Against -Borne Threats

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Zak Khan Director, Advanced Cyber Defence

Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT -BASED THREATS

Types of cyber-attacks. And how to prevent them

Advanced Persistent Threat (APT) Protection - Market Quadrant 2015

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

Data Center security trends

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Transcription:

TRITON AP-EMAIL

Stop advanced targeted attacks, identify high risk users and control Insider Threats From socially engineered lures to targeted phishing, most large cyberattacks begin with email. As these advanced, multi-stage threats blend web and email elements throughout attacks, they present a Kill Chain of opportunities to stop them before the breach occurs. Maximize your use and safety of email TRITON AP-EMAIL identifies targeted attacks, high risk users and Insider Threats while empowering mobile workers and the safe adoption of new technologies like Microsoft Office 365 and Box. From inbound attack activity to outbound data theft or botnet communication attempts, Websense TRITON Email security protects email communications as part of a complete TRITON APX defense against APTs and other Advanced Threats. Email security challenges APTs commonly use email for early stages in their advanced attacks. Email must do more to address data theft and Insider Threats. Businesses need to adopt Microsoft Office 365 and other services to expand and compete. Risky user habits can easily lead to security breaches and data loss.

TRITON AP-EMAIL capabilities Stop APT and other Advanced Targeted Threats The Websense ACE (Advanced Engine) is at the heart of all TRITON solutions and identifies malicious lures, exploit kits, emerging threats, botnet communications and other advanced threat activity across the Kill Chain. This enables TRITON AP-EMAIL to identify the early stages of an attack. With its powerful malware assessment capabilities that include a fully-integrated, file behavioral sandboxing, it can even identify Zero-day malware threats. Secure sensitive data against external attacks and Insider Threats To prepare for a malicious Insider Threat or the potentially successful cyber-attack, it s vital that outbound communications be monitored. This is also necessary both for data theft compliance needs as well as for business requirements. Only Websense provides the technology to stop data infiltration and exfiltration, with capabilities such as: OCR (Optical Character Recognition) scanning to identify sensitive data hidden in images such as scanned documents or screen shots. Encrypted file detection to recognize custom encrypted files designed to defy identification. Safely adopt new technologies like Microsoft Office 365 and Box while supporting your roaming workforce IT departments are strained to maintain current systems while supporting an increasingly mobile workforce and the demands to adopt new technologies like Microsoft Office 365. TRITON AP-EMAIL provides industry-leading capabilities that leverage systems and other information to control communications, such as preventing total access to sensitive email attachments on vulnerable mobile devices, while permitting full access on fully secured laptops. These inbound and outbound defenses are all supported on Microsoft Office 365. Identify high-risk user behavior and educate users to improve awareness The rich data collections in TRITON AP-EMAIL are used by a number of policies to report and identify systems that may require special IT attention. They generate a report on a number of Indicators of Compromise to identify infected systems and more proactive reports on suspicious behavior, or even disgruntled employee activity as potential Insider Threats. User feedback capabilities help educate employees as mistakes are made, helping them to better learn and understand safe email best practices. Drip DLP monitoring to identify where sensitive data is leaked in small quantities over time.

Enhanced Protection Modules Email Cloud or Email Hybrid Module Leverage cloud services for performance and scalability Combine on-premise threat defenses with cloud-based prefiltering services to preserve bandwidth with industry-leading anti-spam SLA s. Or choose a 100% Cloud deployment of all TRITON AP-EMAIL services. Email DLP Module Block data theft with enterprise-class content-aware DLP Prepare for the Insider Threat and malware data theft, achieve compliance goals and further mitigate the risk to personal information or IP. Advanced capabilities detect data theft concealed in images or custom encrypted files, or even transmitted in small amounts over time to evade detection. Email Sandbox Module Integrate behavioral sandboxing for additional malware assessment Supplement Websense ACE analytics with an integrated file sandbox for additional deep inspection, and take advantage of behavioral analysis in a virtual environment to uncover the malicious behaviour of Zero-day and other advanced malware. Test files automatically or manually to generate detailed forensics. Email Encryption Module Ensure the confidentiality of sensitive communications Enable mobile devices in your workplace by extending your existing security policies to mobile devices to protect them from Advanced Threats, mobile malware, phishing attacks, spoofing and more. Image Analysis Module Identify explicit images to enforce acceptable use and compliance The Websense Image Analysis Module allows employers to take proactive measures to monitor, educate and enforce the company email policy in regard to explicit or pornographic image attachments. TRITON APX The Websense recommended solution for complete protection Extend your protection from TRITON AP-EMAIL to TRITON AP-WEB, TRITON AP-DATA or TRITON AP-ENDPOINT for powerful, unified protection across all channels of attack.

The power behind TRITON solutions ACE (Advanced Engine) Websense ACE provides real-time, inline contextual defenses for Web, Email, Data and Mobile security by using composite risk scoring and predictive analytics to deliver the most effective security available. It also provides containment by analyzing inbound and outbound traffic with data-aware defenses for industry-leading data theft protection. Classifiers for real-time security, data and content analysis the result of years of research and development enable ACE to detect more threats than traditional anti-virus engines every day (the proof is updated daily at http://securitylabs.websense.com). ACE is the primary defense behind all Websense TRITON solutions and is supported by the Websense ThreatSeeker Intelligence Cloud. Integrated set of defense assessment capabilities in 8 key areas. 10,000 analytics available to support deep inspections. WEB + EMAIL ATTACKS Anti-Malware Reputation Analysis Behavioral Sandboxing Predictive security engine sees several moves ahead. Inline operation not only monitors, but blocks threats. URL Real-time Security Anti-Spam/ Phishing EMAIL ATTACKS WEB ATTACKS Real-time Content Real-time Data DATA THEFT

ThreatSeeker Intelligence Cloud The ThreatSeeker Intelligence Cloud, managed by Websense Security Labs, provides the core collective security intelligence for all Websense security products. It unites more than 900 million endpoints, including inputs from Facebook, and, with Websense ACE security defenses, analyzes up to 5 billion requests per day. This expansive awareness of security threats enables the ThreatSeeker Intelligence Cloud to offer real-time security updates that block Advanced Threats, malware, phishing attacks, lures and scams, plus provides the latest web ratings. The ThreatSeeker Intelligence Cloud is unmatched in size and in its use of ACE real-time defenses to analyze collective inputs. (When you upgrade to Web Security, the ThreatSeeker Intelligence Cloud helps reduce your exposure to web threats and data theft.) TRITON Architecture With best-in-class security, Websense TRITON unified architecture offers point-of-click protection with real-time, inline defenses from Websense ACE. The unmatched real-time defenses of ACE are backed by Websense ThreatSeeker Intelligence Cloud and the expertise of Websense Security Labs researchers. The powerful result is a single, unified architecture with one unified user interface and unified security intelligence. TRITON APX TRITON APX provides many key benefits to organizations interested in deploying the best possible protection against Advanced Threats across the 7-Stage Kill Chain. They can be summarized in these three statements: Deploy Adaptive Security- Deploy adaptive security solutions for rapidly changing technology and threat landscapes. Protect Everywhere- The perimeter is the data. Protect critical information from theft whether on-premise, in the cloud or on mobile devices. Raise the Security IQ- Combat the cyber security skills shortage by providing predictive actionable intelligence across the entire threat lifecycle.

BRAVE THE NEW WORLD. www.websense.com/apx 2015 Websense, Inc. All rights reserved. Websense, the Websense logo, TRITON and TheatSeeker, are registered trademarks of Websense, Inc. in the United States and various countries. All other trademarks are the property of their respective owner. [TRITON AP-EMAIL-BROCHURE-US-EN-23DEC14]