Go to the table of contents Go to the previous page Go to the next page View or print as PDF
v2.0.0 Release Notes for TRITON RiskVision : RiskVision v2.0.0 Features
RiskVision v2.0.0 Features
52081 | Release Notes | TRITON RiskVision | 24-Sep-2015
TRITON RiskVision offers administrators:
*
*
*
*
*
Read on for more detailed information about the features and tools offered in this release.
Interactive incident investigation
The RiskVision Transaction Viewer is an interactive tool that administrators can use to find and investigate high-priority incidents in their network. The tool offers:
*
*
The Transaction Viewer combines the information returned by both local and cloud-based analysis tools, giving administrators detailed insight into why a malicious or suspicious incident was identified within a transaction.
Comprehensive local analysis
When RiskVision processes a transaction, it uses several analytic tools on the appliance to determine whether the transaction contains any malicious or suspicious characteristics. Together, these analytics are grouped together under the term Local Analysis.
*
URL lookup is used to determine whether HTTP requests are going to sites already known to pose a security risk
*
Content analysis uses Websense Advanced Classification Engine (ACE) technologies to find malicious and suspicious behavior within an HTTP or SMTP transaction
*
Data analysis uses data loss and data theft policies to detect sensitive data leaving the network via HTTP or SMTP transactions
*
Cloud app analysis is used to identify traffic to cloud applications that may present malware, compliance, or data loss risks to the organization
*
YARA analysis is provided for organizations that already use YARA for malware classification. When enabled, the RiskVision YARA Plugin tries to match YARA rules within each transaction to find evidence of malware.
RiskVision also offers the ability to send incident information to a third-party SIEM tool or syslog for further investigation.
Cloud-based file sandboxing
When RiskVision Local Analysis does not find malicious characteristics in its file analysis, it may recommend that the files go through further investigation from the Websense File Sandbox.
When a file is flagged for sandboxing, the File Sandbox Processor contacts the File Sandboxing service in the cloud to find out if the file has been analyzed previously.
*
*
File Sandbox Processor polls occasionally for results.
When File Sandboxing has completed its analysis, it creates an online report that details its findings. File Sandbox Processor retrieves a link to the report, and adds it to the RiskVision incident record.
RiskVision administrators can access the link from the Transaction Viewer.
Comprehensive risk reporting
RiskVision includes several pre-defined malicious activity and data analysis reports that can be generated either individually, or as part of a comprehensive incident assessment. These reports are available in PDF or RTF format, and include a combination of summary and detail reports in tabular and chart formats.
User-friendly diagnostic tools
The Diagnostics page in the RiskVision Local Manager offers tools and statistics to help administrators:
*
*
*
*
In addition, the Local Manager offers interfaces for administrators to start or restart services, verify database downloads, and configure network interface use.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
v2.0.0 Release Notes for TRITON RiskVision : RiskVision v2.0.0 Features
Copyright 2015 Raytheon | Websense. All rights reserved.