Websense, Inc., offers solutions for securing client workstations, laptops, and other endpoint devices from data loss and inbound Web threats when the devices are outside the corporate network.
The solutions are endpoint client software applications that run on the endpoint devices to block, monitor, and log transactions (like Internet requests) according to the organization's security and acceptable use policies. Administrators can create policies that provide full visibility into inbound and outbound traffic, but that don't restrict use of the device.
Websense Web Filter, Web Security, and Web Security Gateway (Anywhere) customers can use remote filtering software to monitor and filter Internet activity for endpoint devices (client machines) outside the network.
Remote Filtering Client routes Internet requests to Remote Filtering Server, which forwards it to Filtering Service. The request is then evaluated to determine whether or not to permit the site.
In Websense Web Security Gateway Anywhere deployments, Websense Web Endpoint can be used to secure client machines filtered by the hybrid service.
Web Endpoint provides transparent authentication, enforces the use of hybrid filtering policies, and passes authentication details to the hybrid service. It is designed for organizations that want to take advantage of in-the-cloud (security-as-a-service) Web filtering.
With Web Endpoint installed, Web traffic is routed via the hybrid proxies to control user access to Web content, according to the applicable filtering policies. Web Endpoint has 2 operation modes:
Data Endpoint is designed for organizations concerned about data loss originated at the endpoint, whether malicious or inadvertent. For example, if you want to prevent employees from taking sensitive data home on their laptops and printing it, posting to the Web, copy and pasting it, etc., you would benefit from this endpoint solution.
Websense Data Endpoint is a comprehensive, secure and easy-to-use endpoint data loss prevention (DLP) solution. It monitors real-time traffic and applies customized DLP policies over application and storage interfaces. You can also apply discovery policies to endpoints to determine what sensitive data they hold.
You can monitor user activity inside endpoint applications, such as the cut, copy, paste, print, and print screen operations. You can also monitor endpoint Web activities and know when users are copying data to external drives and endpoint devices.
System Requirements provides the operating system requirements for endpoint server and client components.