- 5 December 2012 15:44
Websense TRITON Architecture Stops Targeted Cyber Attacks with New ACE in the Cloud Defence
Websense, Inc. (NASDAQ: WBSN), a global leader in unified web security, email security, mobile security and data loss prevention (DLP), today announced the general availability of ACE in the Cloud for the TRITON™ architecture. ACE in the Cloud is a global overlay cloud defence that is easily deployed and stops cyber attacks with both real-time threat analysis and security defences.
“Before ACE in the Cloud, CSOs with traditional networking infrastructures couldn’t keep up with today’s toughest cyber attacks because deep content-aware defences required a forklift upgrade,” said John McCormack, president, Websense. “ACE in the Cloud changes the game. With the TRITON architecture, organisations can easily add global, deep content-aware security to thwart advanced threats and targeted attacks. We leverage and correlate big data analytics to give CSOs unprecedented visibility into threats throughout the world.”
ACE in the Cloud integrates seamlessly with current traditional proxy gateways and firewall defences to deliver a clean pipe from the internet. It runs the unique defence assessments of the powerful Websense Advanced Classification Engine (ACE) on web page content, active scripts, exploit code, obfuscated commands, web redirects, files, PDFs and executables.
ACE in the Cloud offers:
· Defences built on the proven, global TRITON cloud security infrastructure. This includes protection across seven ACE defence assessment areas such as in-depth security, content and data analysis of all web page content, active scripts, web links and files.
· More than 10,000 security analytics, which are derived from the Websense ThreatSeeker Network® and maintained by the Websense Security Labs™.
· Real-time security updates that unite more than 900 million endpoints and analyce 3-5 billion requests per day, including social media and correlating web and email links.
· A clean pipe, cloud defence that provides additional protection against advanced threats, spear-phishing and targeted attacks.
· An extremely easy implementation and a low impact on operational processes, procedures and administration.
To analyse malware and other threats, organisations can utilise TRITON ThreatScope™, a cloud-based malware analysis sandbox environment, to safely test potential threats. Security administrators simply identify a suspicious file to ThreatScope, which applies ACE security defences and analytics while executing the file within a cloud sandbox. Administrators then receive an extensive report of observed execution characteristics. Insights include the infection process; post-infection activities (such as calling home); system-level events and processes; and registry changes and file modifications. In addition, ThreatScope can identify advanced zero-day threat attributes, which helps organisations stop serious compromises and data theft.
ACE in the Cloud is the second TRITON cloud-based solution that easily plugs into existing infrastructures. Websense Cloud Email Security and Content Control is also available for cloud-based email security. It provides URL sandboxing for point-of-click threat analysis of suspicious links embedded in emails, which are often related to spear-phishing attacks.
For more information on ACE in the Cloud, please visit: www.websense.com/content/ACE-in-the-Cloud.aspx. For more information on the TRITON architecture, please visit: www.websense.com/triton
About Websense, Inc.
Websense, Inc. (NASDAQ: WBSN), a global leader in unified web security, email security, mobile security, and data loss prevention (DLP), delivers the best content security for modern threats at the lowest total cost of ownership to tens of thousands of enterprise, mid-market and small organisations around the world. Distributed through a global network of channel partners and delivered as appliance-based software or SaaS-based cloud services, Websense TRITON content security solutions help organisations leverage social media and cloud-based communication, while protecting from advanced persistent threats and modern malware, preventing the loss of confidential information, and enforcing internet use and security policies. Websense is headquartered in San Diego, California with offices around the world. For more information, visit www.websense.com
Follow Websense on Twitter: www.twitter.com/websense
Join the discussion on Facebook: www.facebook.com/websense
Sign up now »
Get powerful mobile security capabilities, and protect the data the various mobile devices inside your organization.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.