Stronger, smarter email security from the cloud.

Websense® Cloud Email Security and Content Control integrates best-in-class web and data security technology with email security to achieve unparalleled visibility and protection against today's targeted and blended threats — all without the complexities of managing hardware or software.

Top Features

  • In-the-cloud deployment is ISO 27001 certified and provides 99.999% service availability and 99% or higher spam detection.
  • Gateway threat analysis uses security intelligence from the Websense ThreatSeeker® Intelligence Cloud and Websense ACE (Advanced Classification Engine) to defend against advanced malware, blended threats and spam.
  • URL sandbox, available as part of TRITON ThreatScope, provides point-of-click threat analysis by isolating suspicious links embedded in emails and analyzing their destination when users click on them from any device, including smart phones and tablets.
  • Built-in data loss prevention (DLP) makes it easy to prevent data loss, comply with regulations and enforce email acceptable use policies. Pre-defined dictionaries covering 20 topics in 12 languages, plus built-in PCI-DSS and data privacy templates, help you quickly identify and stop email policy violations.

Additional Features

Feature Description
TRITON Unified Security Center Reduces TCO by unifying management of web security and email security components.
Spam Detection Websense provides highly accurate spam blocking with very low false positives that is backed by a 99% or higher spam detection service level agreement. Spam is identified using a combination of technologies including sender reputation, adaptive learning, URL analysis, heuristics, suspicious PDF identification and optical recognition of image spam.
Malware Protection Websense ACE (Advanced Classification Engine) scans inbound and outbound email for malware, spyware and targeted and blended threats. Combining real-time composite risk scoring with security intelligence from the Websense ThreatSeeker® Intelligence Cloud, ACE protects against both known and unknown threats within email.
Data Loss Prevention Unique inspection requirements can easily be met with advanced regular expressions and flexible policies. Violations are identified through in-depth inspection of both the email message and the content within any attachment. Messages can also be quarantined based on attachment true file type and deferred for later delivery based on size.
Data Center Security
  • 24/7 staffing
  • Physical intrusion detection systems
  • Video surveillance
  • Restricted access lists
  • Photo and biometric verification
Service Level Agreements (SLAs)
  • Availability: 99.999%
  • Spam detection: 99% or higher
  • Processing latency: 60 seconds or less for non-spam email less than 2 MB in size
  • Email logs and quarantine: Available five minutes or less after email receipt
Email Spooling Built-in redundancy and email spooling ensures that email is never lost when a customer experiences a network or mail server outage.
Quarantine Management Includes a powerful search engine for complete visibility and access of quarantined messages and logs.
End-User Self Service Reduces administrative overhead by giving scheduled and on-demand access to users, enabling them to view and release quarantined messages and whitelist/blacklist senders.
Reporting Includes multiple report types to provide summary and detailed visibility into types and volumes of threats, number of messages processed, policy violations and more.
TLS Encryption Encrypts email between the sender's mail server and the receiver's mail server to prevent the email from being intercepted or altered while traversing the Internet. Mandatory TLS to specific domains, as well as opportunistic TLS, is supported.
Advanced Email Encryption* Encrypts the entire email and any attachments so that the contents are viewed only by intended recipient(s).
Email Archive*1 Every email that any person in your business sends and receives is securely archived, searchable and accessible forever in the cloud.
Image Analysis* Reliably detects pornographic images to ensure compliance with network use policy.

* Optional add-on
1 Partnered with Sonian