Stronger, smarter email security from the cloud.
Websense® Cloud Email Security and Content Control integrates best-in-class web and data security technology with email security to achieve unparalleled visibility and protection against today's targeted and blended threats — all without the complexities of managing hardware or software.
- In-the-cloud deployment is ISO 27001 certified and provides 99.999% service availability and 99% or higher spam detection.
- Gateway threat analysis uses security intelligence from the Websense ThreatSeeker™ Network and Websense ACE (Advanced Classification Engine) to defend against advanced malware, blended threats and spam.
- URL sandbox provides point-of-click threat analysis by isolating suspicious links embedded in emails and analyzing their destination when users click on them.
- Built-in data loss prevention (DLP) makes it easy to prevent data loss, comply with regulations and enforce email acceptable use policies. Pre-defined dictionaries covering 20 topics in 12 languages, plus built-in PCI-DSS and data privacy templates, help you quickly identify and stop email policy violations.
|TRITON Unified Security Center||Reduces TCO by unifying management of web security and email security components.|
|Spam Detection||Websense provides highly accurate spam blocking with very low false positives that is backed by a 99% or higher spam detection service level agreement. Spam is identified using a combination of technologies including sender reputation, adaptive learning, URL analysis, heuristics, suspicious PDF identification and optical recognition of image spam.|
|Malware Protection||Websense ACE (Advanced Classification Engine) scans inbound and outbound email for malware, spyware and targeted and blended threats. Combining real-time composite risk scoring with security intelligence from the Websense ThreatSeeker® Network, ACE protects against both known and unknown threats within email.|
|Data Loss Prevention||Unique inspection requirements can easily be met with advanced regular expressions and flexible policies. Violations are identified through in-depth inspection of both the email message and the content within any attachment. Messages can also be quarantined based on attachment true file type and deferred for later delivery based on size.|
|Data Center Security||
|Service Level Agreements (SLAs)||
|Email Spooling||Built-in redundancy and email spooling ensures that email is never lost when a customer experiences a network or mail server outage.|
|Quarantine Management||Includes a powerful search engine for complete visibility and access of quarantined messages and logs.|
|End-User Self Service||Reduces administrative overhead by giving scheduled and on-demand access to users, enabling them to view and release quarantined messages and whitelist/blacklist senders.|
|Reporting||Includes multiple report types to provide summary and detailed visibility into types and volumes of threats, number of messages processed, policy violations and more.|
|TLS Encryption||Encrypts email between the sender's mail server and the receiver's mail server to prevent the email from being intercepted or altered while traversing the Internet.|
|Advanced Email Encryption*||Encrypts the entire email and any attachments so that the contents are viewed only by intended recipient(s).|
|Email Archive*||Every email that any person in your business sends and receives is securely archived, searchable and accessible forever in the cloud.|
|Image Analysis*||Reliably detects pornographic images to ensure compliance with network use policy.|
* Optional add-on