Websense continued its cybersecurity drive by advancing
Websense TRITON defenses to thwart every stage of the targeted threat
kill chain. Cybercriminals prey on organizations through reconnaissance,
luring victims, redirecting web traffic, executing exploit kits,
deploying dropper files, calling home and ultimately stealing critical
data. Websense is the only security company that continues to protect
organizations from targeted attacks and advanced persistent threats
(APTs) across the entire advanced threat kill chain.
Today’s
new Websense TRITON 7.8 enhancements include advanced threat protection
with expanded ThreatScope inline sandboxing, malware isolation to
heighten data loss prevention, end-user phishing education and new
platform support for pervasive deployment.
“Websense TRITON is the most advanced integrated security solution on the market,” said John McCormack, Websense CEO. “No
other solution offers the broadest range of threat protection, across
the entire advanced threat kill chain, in a completely integrated
system. Organizations are
vulnerable if they rely on security solutions that only address part of
the problem. TRITON provides comprehensive security that stops attacks
other solutions miss. Today’s enhancements are yet another important
step forward for our customers in enhancing their security defenses.”
TRITON ThreatScope Web and Email Sandboxing Expanded in ACE
Websense
ACE (Advanced Classification Engine) delivers real-time security
ratings to all Websense TRITON products. ACE’s eight assessment areas
and unique composite scoring capabilities enable TRITON solutions to
detect threats that other security solutions miss. The predictive
security engines can see developing trends and use contextual
assessments to ensure accuracy and counter evasion techniques. With more
than 10,000 analytics, ACE provides deep inspection and composite
scoring to support effective decision-making.
TRITON
ThreatScope enables an additional capability within ACE to
automatically intercept files for behavioral sandboxing and forensic
reporting. Organizations can also manually upload files to the on-demand
sandbox and input links to a cloud-based URL analysis service. Each
action generates detailed reports to support forensic investigations and
threat mitigation. ThreatScope also marks suspicious email links for
supplemental scrutiny through email URL sandboxing. Real-time analysis
of links occurs at point-of-click, which in some cases, can be long
after the initial email arrives.
Comments
Post a Comment