Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Websense Extends Advanced Security Protection of ThreatSeeker Network

Web-Based API Enables Delivery of Industry’s Leading Security Intelligence to New Markets and End Users
  • 30 October, 2009 12:23

<p>Sydney – October 30, 2009 – Websense, Inc. (NASDAQ: WBSN) the leader in content security solutions today introduced the Websense® ThreatSeeker® Cloud, a cloud-based security service that allows third-party solution providers to deliver added value and dynamic security protection to their products and services. The ThreatSeeker Cloud service delivers Web, data and email security intelligence through the proven cloud-based delivery infrastructure that powers all Websense content security products, including the company’s SaaS security offerings and V10000 Web Security Gateway appliance.</p>
<p>“The ThreatSeeker Cloud is basically a carrier-grade subscription service to our cloud-based content identification and intelligence infrastructure for third-party solutions providers,” said Phil Vasic, ANZ Country Manager, Websense. “It extends the value of Websense technology to a new set of users in markets that we did not previously address. This new offering benefits everyone: infrastructure vendors can increase the total value of their products and services and end-users gain real-time protection and a better user experience.”</p>
<p>The ThreatSeeker Cloud service enables access to the industry’s leading content security intelligence gathered by the 50 million real-time data collection points of the Websense ThreatSeeker Network, which processes more than 1.5 billion end-user security requests daily and scans more than 40 million Web sites and ten million emails each hour to discover new threats. Through a Web-based API, third-party solution providers can leverage the ThreatSeeker Cloud to incorporate the security intelligence of ThreatSeeker Network – including real-time Web and content classification, reputation, behavioural analysis, file and data analysis and security filtering – into their own products and services to protect their end-users from malicious Web content, fraud and phishing attacks.</p>
<p>More than 3.5 million end-users are already protected from Internet threats through third-party solution providers using the ThreatSeeker Cloud. Examples third-party applications using the ThreatSeeker Cloud include:</p>
<p>· Web 2.0 Security Services – Social networking sites or other Web 2.0 sites can use the ThreatSeeker Cloud to analyse and classify hyperlinks and content posted by users in real-time, to prevent malicious and spam links or content from being distributed on the site.</p>
<p>· Network Security Gateways – Providers of network security gateways, such as firewalls, UTMs or other devices can take advantage of ThreatSeeker Cloud’s Web-based API as a service extension layer that allows for additional content security functions without requiring costly additional hardware capacity or processing power on that network device.</p>
<p>· Consumer ISP Services – Internet service providers (ISPs) can leverage the ThreatSeeker Cloud to dynamically classify Web sites and their content to deliver parental controls and safe Web browsing to their customers.</p>
<p>· Mobile Security Services – Mobile carriers can protect their users from malicious Web content and spam on their Web-enabled mobile devices.</p>
<p>Unlike other security services which only check basic reputation of a source IP, ThreatSeeker Cloud is the only cloud-based security service that provides full content analysis and categorisation in addition to nine points of reputation – including property type, URL category, lexical and search reputation, history, age, geography, neighbouring properties and more – for IP sources, Web sites, and the content on them. By leveraging the multiple analysis engines of the ThreatSeeker Network – including feedback gathered from 44 million product seats under subscription for Websense hosted and on-premise Web and email security customers – ThreatSeeker Cloud provides real-time security to protect against today’s blended threats which span multiple threat vectors including the Web and email.</p>
<p>All Websense Web, data and email security products are powered by the threat intelligence gathered by ThreatSeeker Network. Today, Websense is making that intelligence available to third-party applications, service and solution providers through the ThreatSeeker Cloud as part of its continued strategy to provide cloud-based security within its integrated line of content-based security solutions and grow its software-as-a-service (SaaS) Web security offerings.</p>
<p>About Websense, Inc.</p>
<p>Websense, Inc. (NASDAQ: WBSN), a global leader in integrated Web, data and email security solutions, provides Essential Information Protection™ for more than 40,000 customers. Distributed through its global network of channel partners, Websense software and hosted security solutions help organisations block malicious code, prevent the loss of confidential information and enforce Internet use and security policies. For more information, visit</p>
<p>Follow Websense on Twitter:</p>

Most Popular

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Media Release

More media release

Market Place