TRITON APX. Websense TRITON APX



Similar documents
Comprehensive real-time protection against Advanced Threats and data theft

Stop advanced targeted attacks, identify high risk users and control Insider Threats

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

WEBSENSE TRITON SOLUTIONS

ENABLING FAST RESPONSES THREAT MONITORING

WEBSENSE SECURITY SOLUTIONS OVERVIEW

Can Your Organization Brave The New World of Advanced Cyber Attacks?

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński

Websense Solutions. TRITON v7.7 Architecture

+ web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.

Lab Testing Detailed Report DR January Competitive Testing of Web Security Devices

ADVANCED PERSISTENT THREATS AND OTHER ADVANCED ATTACKS:

Cisco Advanced Malware Protection

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Cisco Advanced Malware Protection for Endpoints

Cisco Cloud Web Security

Advanced Persistent. From FUD to Facts. A Websense Brief By Patrick Murray, Senior Director of Product Management

Protecting ip Data From Loss and theft: The ShorTeST PaTh To PrevenTion and risk reduction

Web Security Gateway Anywhere

Web Security Gateway Solutions

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Content Security: Protect Your Network with Five Must-Haves

Websense Messaging Security Solutions. Websense Security Websense Hosted Security Websense Hybrid Security

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Cisco Advanced Malware Protection for Endpoints

overview Enterprise Security Solutions

Lab Testing Detailed Report DR Competitive Testing of the Websense TRITON Web Security Gateway Anywhere v7.7.3

Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Finding Security in the Cloud

Unified Security, ATP and more

Securing Office 365 with Symantec

Fighting Advanced Threats

Symantec Messaging Gateway powered by Brightmail

Advanced Threat Protection with Dell SecureWorks Security Services

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

overview Enterprise Security Solutions

Defending Against. Phishing Attacks

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

OVERVIEW. Enterprise Security Solutions

Zak Khan Director, Advanced Cyber Defence

A New Era of Cybersecurity Neil Mohammed, Sales Engineer

The Symantec Approach to Defeating Advanced Threats

The Hillstone and Trend Micro Joint Solution

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense

Comprehensive Advanced Threat Defense

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

isheriff CLOUD SECURITY

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

The Attacker s Target: The Small Business

10 Things Every Web Application Firewall Should Provide Share this ebook

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution

AppGuard. Defeats Malware

CyberArk Privileged Threat Analytics. Solution Brief

INTRODUCING isheriff CLOUD SECURITY

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

Symantec Protection Suite Add-On for Hosted and Web Security

Cisco Web Security: Protection, Control, and Value

Key Findings. Websense Triton Security Gateway Anywhere

SPEAR PHISHING AN ENTRY POINT FOR APTS

KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE INSIDE THE CORPORATE INFRASTRUCTURE

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Breaking the Cyber Attack Lifecycle

IBM Security Strategy

Protect Your Business and Customers from Online Fraud

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

UNIFIED CONTENT SECURITY: Securing the Borderless Enterprise

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Securing Cloud-Based

Top 10 Reasons Enterprises are Moving Security to the Cloud

Cloud Services Prevent Zero-day and Targeted Attacks

ONLINE AND MOBILE BANKING, YOUR RISKS COVERED

Transcription:

TRITON APX

Unified protection and intelligence against Advanced Threats and data theft Your organization is faced with an increasing number of Advanced Threats that lead to data theft, denial of service and other attacks. This complex threat environment, combined with a growing number of mobile and remote workers and a shortage of trained security professionals, increase your risk of data theft in today s business environment. Security teams today have to do more with less Deploy Adaptive Security- Deploy adaptive security solutions for rapidly changing technology and threat landscapes. Protect Everywhere- The perimeter is the data. Protect critical information from theft whether on-premise, in the cloud or on mobile devices. Raise the Security IQ- Combat the cyber security skills shortage by providing predictive actionable intelligence across the entire threat lifecycle.

TRITON APX advantages A Unified Solution with Deployment Flexibility The beauty of TRITON APX lies in its deployment flexibility. Choose which products or components you want to deploy. Rest assured that when you decide to add an additional product, it will work seamlessly with the already deployed product, thanks to the unified architecture of TRITON. With TRITON APX you can protect users anywhere, anytime. Real Time Analysis for Advanced Threat Protection TRITON AP-WEB goes beyond antivirus defenses by using eight defense assessment areas in a composite scoring process that uses predictive analysis with the Websense ACE (Advanced Classification Engine). Multiple real-time content engines analyze full web page content, active scripts, web links, contextual profiles, files and executables. TRITON APX capabilities Unified Protection Anywhere, Anytime Complex, uncoordinated, multi-vendor security deployments increase security risk and IT complexity. TRITON APX provides a single, unified solution for complete Web, Email, Data, and Endpoint protection and threat intelligence across the Kill Chain, on-premise, remote and in the Cloud. Protect Against Advanced Threats Many of today s security solutions can t address Advanced Threats in real time. TRITON APX and its core products are powered by advanced, real-time threat defense. Stop Data Theft Most stand-alone DLP solutions are too complex to deploy. TRITON APX offers industry-leading DLP technology protection against data loss over Web, Email and Endpoint channels. Enterprise Class DLP Industry-leading data theft defenses detect and intercept data theft attempts and provide regulatory compliance for data loss prevention (DLP). These capabilities can be deployed as a stand-alone solution and can integrate directly with the TRITON AP-WEB and TRITON AP-EMAIL products. Examples of these capabilities include detection of custom encrypted uploads, password file data theft, slow data leaks (drip DLP), optical character recognition OCR (Optical Character Recognition) of text within images and geo-location destination awareness.

TRITON APX components Advanced Threats involve sophisticated, multi-stage attacks with built-in techniques to evade detection, even while stealing sensitive data. TRITON AP-WEB provides complete protection against advanced threats and data theft across the entire kill chain in a unified solution for on-premise, remote, mobile, and cloud users. Advanced Threats blend web and email elements throughout multi-stage cyber-attacks in Kill Chains, presenting multiple opportunities to stop attacks before possible breaches occur. TRITON AP-EMAIL identifies targeted attacks, high risk users, and Insider threats while empowering mobile workers and safe adoption of new technologies like Office 365. TRITON AP-DATA enables you to discover and protect sensitive data wherever it lives on endpoints, in the Cloud or on premise. Secure personal data, intellectual property, or meet compliance use cases quickly with custom or out-of-the-box policies, applying unique DLP capabilities to control data theft. TRITON AP-ENDPOINT protects roaming users against data theft while on and off the network. Secure personal data, intellectual property, and meet compliance use cases quickly with custom or out-of-the-box policies, and apply unique DLP capabilities to control data theft on Mac OS X or Windows systems. Websense Websense TRITON TRITON APX APX

TRITON APX protects across the Kill Chain Cybercriminal attacks succeed by following the staged-attack model to bypass traditional defenses and steal data. These advanced attacks happen too frequently for signatures to be developed, rendering traditional standalone defenses unable to respond. Organizations need three key security requirements to defend across the 7-Stage Kill Chain Real-time, in-line defenses that can identify Zero-day, signature-less threats and APTs. Integrated Web, Email and Data security solutions powered by real-time intelligence. Advanced outbound containment defenses to protect against data theft and data loss. RECON LURE REDIRECT EXPLOIT KIT DROPPER FILE CALL HOME DATA THEFT Websense TRITON APX is the first platform to combine all three requirements into a single, unified solution 1. TRITON APX is powered by Websense ACE (Advanced Classification Engine), with powerful real-time defenses informed by global threat intelligence. 2. TRITON APX provides unified Web, Email, Data and Endpoint security all powered by ACE. 3. TRITON APX incorporates data loss prevention (DLP) technology at the core of web and email security and advanced containment defenses that can protect against data leaving your organization. 4. TRITON APX also enables organizations to equally protect their headquarters, branch and mobile workers by deploying security on appliances, in the Cloud or a hybrid of both platforms. With TRITON APX, your organization, employees and valuable data are protected against all 7 stages of the Kill Chain

The power behind TRITON solutions ACE (Advanced Classification Engine) Websense ACE provides real-time, inline contextual defenses for Web, Email, Data and Mobile security by using composite risk scoring and predictive analytics to deliver the most effective security available. It also provides containment by analyzing inbound and outbound traffic with data-aware defenses for industry-leading data theft protection. Classifiers for real-time security, data and content analysis the result of years of research and development enable ACE to detect more threats than traditional anti-virus engines every day (the proof is updated daily at http://securitylabs.websense.com). ACE is the primary defense behind all Websense TRITON solutions and is supported by the Websense ThreatSeeker Intelligence Cloud. Integrated set of defense assesment capabilities in 8 key areas. 10,000 analytics available to support deep inspections. WEB + EMAIL ATTACKS Anti-Malware Reputation Analysis Behavioral Sandboxing Predictive security engine see several moves ahead. Inline operation not only monitors, but blocks threats. URL Classification Real-time Security Classification Anti-Spam/ Phishing EMAIL ATTACKS WEB ATTACKS Real-time Content Classification Real-time Data Classification DATA THEFT

ThreatSeeker Intelligence Cloud The ThreatSeeker Intelligence Cloud, managed by Websense Security Labs, provides the core collective security intelligence for all Websense security products. It unites more than 900 million endpoints, including inputs from Facebook, and, in conjunction with Websense ACE security defenses, analyzes up to 5 billion requests per day. This expansive awareness of security threats enables the ThreatSeeker Intelligence Cloud to offer real-time security updates that block Advanced Threats, malware, phishing attacks, lures and scams, plus provides the latest web ratings. The ThreatSeeker Intelligence Cloud is unmatched in size and in its use of ACE realtime defenses to analyze collective inputs. (When you upgrade to Web Security, the ThreatSeeker Intelligence Cloud helps reduce your exposure to web threats and data theft.) TRITON Architecture With best-in-class security and a unified architecture, Websense TRITON offers point-of-click protection with real-time, inline defenses from Websense ACE. The unmatched real-time defenses of ACE are backed by Websense ThreatSeeker Intelligence Cloud and the expertise of Websense Security Labs researchers. The powerful result is a single, unified architecture with one unified user interface and unified security intelligence. TRITON APX In Summary: TRITON APX provides many key benefits to organizations interested in deploying the best possible protection against Advanced Threats across the 7-Stage Kill Chain. They can be summarized in these three statements: Deploy Adaptive Security- Deploy adaptive security solutions for rapidly changing technology and threat landscapes. Protect Everywhere- The perimeter is the data. Protect critical information from theft whether on-premise, in the cloud or on mobile devices. Raise the Security IQ- Combat the cyber security skills shortage by providing predictive actionable intelligence across the entire threat lifecycle.

BRAVE THE NEW WORLD. www.websense.com/apx 2015 Websense, Inc. All rights reserved. Websense, the Websense logo, TRITON and TheatSeeker, are registered trademarks of Websense, Inc. in the United States and various countries. All other trademarks are the property of their respective owner. [TRITON APX-BROCHURE-USEN-18NOV14]