Choose from several options for complete web, email and data security.
Evaluate Websense products by watching demos and installing evaluation software.
Learn how Websense solutions help keep our customer safe, secure and productive
Get information on product updates, support resources and more.
Get the most out of support in five simple steps.
Find tools and assets to help sell Websense solutions.
Come work for the global leader in unified information security.
we want to hear from you >
week we announced several new, important core security technologies that we added
to our TRITON architecture. Websense ACE now includes 10 new defense innovations; seven are focused
on outbound traffic to keep data theft and call-home communications contained,
preventing theft or loss. Because so many of them are industry firsts,
I wanted to take a moment to explain what many of these do and why we created
the bad guys are stealing
corporate data and avoiding detection using advanced techniques. In just
the last year, we've seen key intellectual property and user identities stolen
from corporations and government agencies, including some you would least expect-including
entertainment (gaming) and security companies!
are a few examples of how cyber criminals are going undetected, stealing your
IP and how we can stop it from happening.
1. Criminal encryption-Once inside your
systems, the bad guys have to get communications and data out. They often use
proprietary encryption for communications and data files to send it out
cloaked, making it unrecognizable to traditional defenses. Websense can now
examine the type of encryption for outbound web requests and data files to
determine if known encryption methods are being used, or are the communications
and data files using proprietary (criminal) encryption techniques that are
non-standard. If criminal encrypted uploads are detected, they can be blocked
and a high severity alert appears providing incident details including
"Non Document" Data Theft-The bad guys know that DLP can stop confidential
documents from leaving an organization. However, images are not easily analyzed
when in motion. As a result, criminals are accessing proprietary files and using
images to steal data because data loss defenses are not analyzing images when
in motion through gateways.
now includes an in-motion Optical Character Recognition (OCR) defense within
the web gateway to catch these attempts at stealing confidential information
using images. The OCR feature is also available for end point protection and
data discovery within the TRITON solution architecture. So even in a
non-document form, Websense recognizes sensitive information and prohibits its
misuse as data-at-rest, in-use and in-motion.
3. "Low and Slow" Data
Theft (Drip DLP)-Organizations often define how many incidents of confidential
information can leave an organization per document or request. For example,
sending out one customer address to a website is likely to be approved, but sending
out more than 100 customer addresses to one website is not. As a result, bad
guys have learned these thresholds and are stealing data under the designated
allowance in a "low and slow" approach. Often it includes sending sensitive
information out in pieces over time with patience and persistence.
Websense can now
recognize slow data "drip" leaks for multiple requests over a defined time
period to prevent "low and slow" data theft. Administrators can define the time
periods, incident levels and thresholds within web gateways for stateful (or
In addition to Drip DLP, one of the first things cybercriminals do is collect
password information to expand their reach within a network. Websense can also detect
password file theft, including AD/SAM database data, on outbound web requests. Criminally
encrypted upload and password file data theft detection are new features
included in the entry level proxy-based Web Security Gateway from Websense.
4. Email Security Evasion-Cybercriminals know that
organizations are frequently using email security services that include some
sort of embedded link security scanning. They know that
if they send an email with an embedded link to a website with malicious code, the
email may be blocked from ever getting to the recipient. Here is how they are
evading traditional email security measures:
Our Websense Security
Labs have seen this type of attack increasing on a regular basis. Websense now
has the capability to mark these emails
with embedded links for real-time cloud sandboxing analysis for point-of-click
protection whenever and wherever the email is opened and the web link is
clicked upon. For example, when a user goes to click on the email
embedded web link on Monday, the original web link has been wrapped by Websense
with a web link to cloud-based security services providing real-time security
analysis of the original web link destination. This defense is key against
spear-phishing and targeted attacks blending email and web together.
We've also upped the ante with forensic intelligence. We are able to
Websense researches the latest threats and data theft trends and anticipates
tomorrow's. These methods of prevention and detection for containment are only
available with Websense TRITON security solutions. With this
release, the Websense TRITON solution redefines the security gateway and
clearly demonstrates that we are leading the security industry in innovation,
and more specifically using DLP as a defense against data theft. It provides
enterprises with the deep protection, forensics and visibility necessary to
prevent today's advanced attacks that lead to data theft.
And these are just a few of the additions we have implemented. You can
read about them more here.