Websense, Inc. (NASDAQ: WBSN), a global leader in unified web security, email security, mobile security and data loss prevention (DLP), today announced the general availability of ACE in the Cloud for the TRITON™ architecture. ACE in the Cloud is a global overlay cloud defence that is easily deployed and stops cyber attacks with both real-time threat analysis and security defences.
“Before ACE in the Cloud, CSOs with traditional networking infrastructures couldn’t keep up with today’s toughest cyber attacks because deep content-aware defences required a forklift upgrade,” said John McCormack, president, Websense. “ACE in the Cloud changes the game. With the TRITON architecture, organisations can easily add global, deep content-aware security to thwart advanced threats and targeted attacks. We leverage and correlate big data analytics to give CSOs unprecedented visibility into threats throughout the world.”
ACE in the Cloud integrates seamlessly with current traditional proxy gateways and firewall defences to deliver a clean pipe from the internet. It runs the unique defence assessments of the powerful Websense Advanced Classification Engine (ACE) on web page content, active scripts, exploit code, obfuscated commands, web redirects, files, PDFs and executables.
ACE in the Cloud offers:
· Defences built on the proven, global TRITON cloud security infrastructure. This includes protection across seven ACE defence assessment areas such as in-depth security, content and data analysis of all web page content, active scripts, web links and files.
· More than 10,000 security analytics, which are derived from the Websense ThreatSeeker Network® and maintained by the Websense Security Labs™.
· Real-time security updates that unite more than 900 million endpoints and analyce 3-5 billion requests per day, including social media and correlating web and email links.
· A clean pipe, cloud defence that provides additional protection against advanced threats, spear-phishing and targeted attacks.
· An extremely easy implementation and a low impact on operational processes, procedures and administration.
To analyse malware and other threats, organisations can utilise TRITON ThreatScope™, a cloud-based malware analysis sandbox environment, to safely test potential threats. Security administrators simply identify a suspicious file to ThreatScope, which applies ACE security defences and analytics while executing the file within a cloud sandbox. Administrators then receive an extensive report of observed execution characteristics. Insights include the infection process; post-infection activities (such as calling home); system-level events and processes; and registry changes and file modifications. In addition, ThreatScope can identify advanced zero-day threat attributes, which helps organisations stop serious compromises and data theft.
ACE in the Cloud is the second TRITON cloud-based solution that easily plugs into existing infrastructures. Websense Cloud Email Security and Content Control is also available for cloud-based email security. It provides URL sandboxing for point-of-click threat analysis of suspicious links embedded in emails, which are often related to spear-phishing attacks.
For more information on ACE in the Cloud, please visit: www.websense.com/content/ACE-in-the-Cloud.aspx. For more information on the TRITON architecture, please visit: www.websense.com/triton
About Websense, Inc.
Websense, Inc. (NASDAQ: WBSN), a global leader in unified web security, email security, mobile security, and data loss prevention (DLP), delivers the best content security for modern threats at the lowest total cost of ownership to tens of thousands of enterprise, mid-market and small organisations around the world. Distributed through a global network of channel partners and delivered as appliance-based software or SaaS-based cloud services, Websense TRITON content security solutions help organisations leverage social media and cloud-based communication, while protecting from advanced persistent threats and modern malware, preventing the loss of confidential information, and enforcing internet use and security policies. Websense is headquartered in San Diego, California with offices around the world. For more information, visit www.websense.com
Follow Websense on Twitter: www.twitter.com/websense
Join the discussion on Facebook: www.facebook.com/websense
Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint
Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.
Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation
CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)
Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana