Choose from several options for complete web, email and data security.
Evaluate Websense products by watching demos and installing evaluation software.
Learn how Websense solutions help keep our customer safe, secure and productive
Get information on product updates, support resources and more.
Get the most out of support in five simple steps.
Find tools and assets to help sell Websense solutions.
Come work for the global leader in unified information security.
we want to hear from you >
For C&S Electric managing increasing amounts of spam was becoming a burden. Supporting over 900 users, dealing with spam, false positives and latency in the existing on-network email security solution was time-consuming and having a detrimental effect on available bandwidth.
Working with Momentum Infocare, a Websense partner that provides leading solutions and consulting services in enterprise information security, C&S Electric took the decision to implement Websense Hosted Email Security to better protect its email security and manage in-house resources.
With levels of spam and malicious emails on the rise, ACPL was investing increasing amounts of time and valuable skill on managing its email traffic and was repeatedly struggling with high volumes of spam, false positive and latency in the system.
Following a detailed review of possible solutions, ACPL took the decision to implement Websense Hosted Email Security. The company wanted to reduce complexity, maintenance and costs, and ACPL was confident that a hosted solution could offer all three.
As a financial organisation, Reliance Capital is responsible for significant amounts of confidential customer data and regulatory and corporate compliance is a key priority. With five operating businesses and a heavy flow of information, the organisation realised it needed control over data moving across systems, geographies and group companies.
With thousands of students accessing the Internet at any one time and usage of Web 2.0 sites on the increase, City College Coventry had growing concerns that it was adequately protecting its students and network.
It falls to the colleges' IT department to manage the computer, network and Internet resources across the multiple sites. Despite using a basic Web filtering to block access to specific Web Sites, it had become evident that the college needed a more customised product to better manage Internet access.
KPIT Cummins required a Web security solution that would seamlessly manage the Web and protect its network. On its squid-based proxy servers, it previously would update policies manually, and the efficacy of these policies was largely dependent on the knowledge and skill-base of the security administrators.
In the past, most Web content was static and predictable. But today’s reality is that Web content – even from so-called ‘trusted’ sites – is constantly changing. Reactive Web filtering measures can’t keep up and KPIT Cummins was aware that it needed a solution that could offer real-time protection and automatically block Web threats and malicious sites as they are identified in the wild.
With 500 Web users across the group, the IT team at Davies Turner needed to protect its network from malicious threats and ensure employee Web access was secure, safe and productive. In addition, Davies Turner had recognised that it needed to improve the management of the Web sites its employees were spending time visiting during working hours. Following a request from the HR team for increased insight and reporting of time spent online, it quickly became apparent that the organisations current solution could not provide the level of information required.
Before Zim implemented data loss prevention technology, there were security products in place that provided perimeter and internal protection. However, what Zim needed in addition was to actually secure its critical business information.
“Providing protection for the information systems is only going half-way. Protecting the business information itself is the main issue. To do that, we needed visibility of where our confidential data was stored, who had access to it and where it was going inside and outside our organisation,” explains Itay Yanovski, Zim’s chief security officer, responsible for the company’s information security.
One of the main challenges faced by Wipro in terms of security was the accidental access to malware and spyware by employees. Employees would inadvertently allow in malware which could put the entire business at risk, or cripple the systems. “We needed to ensure that malware and spyware did not get entry into our systems and that employees were not accidentally accessing inappropriate sites,” says J Pazhamalai, GM Information Risk Management, Wipro.
AXA Australia needed an email security solution that supported their existing policies on employee email use without impeding the flow of information.
Platform Engineer, Camille Livera, says that AXA Australia had recognized the importance of protecting staff from inappropriate email content for many years, but it was becoming increasingly difficult to respond to the unique requirements of the company using their existing software.
With over 3,000 employees relying on email, incorrectly quarantined emails negatively impacted productivity. AXA needed the ability to tailor its filtering settings to working requirements and new situations as they arose, while still keeping unsuitable content at bay.
With 6,000 users accessing the Internet on a daily basis, MphasiS recognised that it needed to increase the protection of its network from malicious threats and ensure that Web access was secure and productive.
The organisation needed to be confident that it was complying with its legal, regulatory and contractual agreements. “We have SLA’s with our clients and in order to deliver on these, we needed to keep our Internet access safe,” said Surajit Sarkhel, Associate Leader of Information Technology.
In addition, MphasiS recognised that, while a number of its employees needed access to the Web, it was important that the time spent online by employees was in line with its Acceptable Use Policy.