|Websense Announces TRITON v7.7 with 10 New Malware & Data Theft Defenses
IT News Online Staff
Websense Inc. has announced Websense TRITON v7.7 with 10 new advanced malware and data theft defenses, spear phishing protection with cloud sandboxing and a forensic reporting dashboard with in-depth security intelligence.
"We tested the Websense TRITON solution security advancements and were very impressed by the results," said Jan Erik Sorensen, senior IT security consultant of anti-malware operations for EVRY ASA, a Websense TRITON solution customer. "Our investment in Websense TRITON technology is one of the best security buying decisions we have made. Websense is constantly proving its effectiveness against the toughest online attacks. It protects our customers and us from the latest advanced threats and prevents data theft and loss."
With this release, the Websense said its TRITON solution redefines the security gateway. It provides enterprises with the deep protection, forensics and visibility necessary to understand: which individuals are subject to attacks; cybercrime tactics and methods; attack communications and destinations; and what data is being targeted.
The latest Websense security breakthroughs:
10 advanced threat and data theft defenses - The real-time, inline Websense ACE (Advanced Classification Engine) security engine has 10 new defenses that stop data theft and loss. Many of which are industry firsts such as detecting criminal encrypted uploads; advanced malware payloads and command-and-control recognition; optical character recognition (OCR) of text within images for data-in-motion; drip (stateful) DLP detection; password file theft detection; and geolocation awareness.
Several of these defenses are powered by the embedded enterprise DLP engine, which is unique to the Websense TRITON architecture.
Spear phishing protection with cloud sandboxing - Cybercriminals frequently target specific users with spear phishing email attacks. Many of these attacks load malware and threats onto Web sites after initial email gateway security inspection. Websense's cloud sandboxing capability identifies suspicious links in emails for real time analysis. Once email recipients click on an embedded URL, Websense analyzes the Web site content and browser code in real time, in a cloud environment, to ensure safety in any location at any time.
Websense TRITON Advanced Malware Threat dashboard - This dashboard profiles security incidents, provides in-depth forensics and data theft capture. With severity levels and the ability to export incidents to SIEM solutions, Websense users know who was attacked, how the attacks function, where those communications were being sent and most importantly, what data was targeted.
"No matter what you are running - anti-virus, URL filtering, next generation firewalls - cybercriminals may find a way in and will establish command and control communication to steal your data," said John McCormack, president, Websense. "Our advanced malware and data theft protection measures set a heightened standard for security and forensic reporting. Our technology is designed to retain and contain your most sensitive data, while providing you with the visibility necessary to understand how significant the threat to your organization truly is and what cybercriminals are targeting."
The Websense TRITON solution unifies all the key components of threat defense and data theft prevention into a cohesive content security system. It brings together Web security, email security, mobile security and DLP defenses with unified security intelligence and a unified management console. TRITON solutions can be deployed on enterprise-grade appliances, as cloud-based services, and as powerful and efficient hybrids of on-premise and cloud elements working together.
"With the enhancements, Websense TRITON raises the bar for security defenses," said Christian Christiansen, program vice president for industry analyst firm IDC's Security Products and Services. "The new Websense advanced malware and data theft innovations address evolving threats from external and internal sources. Especially notable is the comprehensive approach that includes data loss prevention coupled to web-based malware mitigation and managed from a consolidated dashboard."