Websense advances defenses against targeted Attacks and APTs

Websense continued its cybersecurity drive by advancing Websense TRITON defenses to thwart every stage of the targeted threat kill chain. Cybercriminals prey on organizations through reconnaissance, luring victims, redirecting web traffic, executing exploit kits, deploying dropper files, calling home and ultimately stealing critical data. Websense is the only security company that continues to protect organizations from targeted attacks and advanced persistent threats (APTs) across the entire advanced threat kill chain.


Today’s new Websense TRITON 7.8 enhancements include advanced threat protection with expanded ThreatScope inline sandboxing, malware isolation to heighten data loss prevention, end-user phishing education and new platform support for pervasive deployment.

“Websense TRITON is the most advanced integrated security solution on the market,” said John McCormack, Websense CEO. “No other solution offers the broadest range of threat protection, across the entire advanced threat kill chain, in a completely integrated system. Organizations are vulnerable if they rely on security solutions that only address part of the problem. TRITON provides comprehensive security that stops attacks other solutions miss. Today’s enhancements are yet another important step forward for our customers in enhancing their security defenses.”

TRITON ThreatScope Web and Email Sandboxing Expanded in ACE
Websense ACE (Advanced Classification Engine) delivers real-time security ratings to all Websense TRITON products. ACE’s eight assessment areas and unique composite scoring capabilities enable TRITON solutions to detect threats that other security solutions miss. The predictive security engines can see developing trends and use contextual assessments to ensure accuracy and counter evasion techniques. With more than 10,000 analytics, ACE provides deep inspection and composite scoring to support effective decision-making.

TRITON ThreatScope enables an additional capability within ACE to automatically intercept files for behavioral sandboxing and forensic reporting. Organizations can also manually upload files to the on-demand sandbox and input links to a cloud-based URL analysis service. Each action generates detailed reports to support forensic investigations and threat mitigation. ThreatScope also marks suspicious email links for supplemental scrutiny through email URL sandboxing. Real-time analysis of links occurs at point-of-click, which in some cases, can be long after the initial email arrives.

Comments