MyWebsense Login
Buy & Renew
English (US)
English (US)
English (AU)
English (India)
English (UK)
Español (LatAm)
Français
Italiano
Português (Brasil)
Deutsch
日本語
中文 (simplified)
台灣 (traditional)
Русский
Türkçe
한국어
Products
Products
TRITON
®
APX
› TRITON APX Enterprise Core
› TRITON AP-WEB
› TRITON AP-DATA
› TRITON AP-EMAIL
› TRITON AP-ENDPOINT
TRITON RiskVision
Web Filter & Security
Free Trials and Demos
Product Expansion Options
Cloud & Hybrid Modules
DLP Module
Sandbox Module
Email Encryption Module
Image Analysis Module
TRITON AP-MOBILE
Technology Overview
TRITON Architecture
› Advanced Classification Engine
› Master Database
› Threatseeker Intelligence Cloud
Deployment Options
› Software
› Appliance
› Hybrid
› Cloud
Solutions
Advanced Persistent Threat Protection
Cloud Network Security
Corporate Email Phishing
Data Theft Prevention
Financial Services
Insider Threat
Mobile Workforce Security
Services
Free Trials and Demos
Contact Us
Find a Websense Partner
Implement
Implementation Support
Managed Deployment
Assess & Design
Technical Security Assessment
Cybersecurity Intelligence (CSI)
Free Analysis Tool: ACE Insight
Training and Certification
Customer Certifications
Partner Certifications
Support
Resources
Upgrade to 7.8
Upgrade to 8.0
Technical Library
Online Tools
Product Lifecycles
Supported Configurations
Contact Support
Support Webinars
Downloads
Product Installers
Product Upgrades
Hotfixes and Service Packs
MyWebsense
Access MyWebsense
Register
Stay Informed
Subscribe to Tech Alerts
View Support Videos
Visit Customer Forums
Resources
By Type
Analyst Reports
Brochures
Case Studies
Community
Datasheets
Free Trials and Demos
Infographics
Videos
Webcasts
Whitepapers
Featured
Websense Threat Report
Websense Security Predictions
The Forrester Wave™: SaaS Web Content Security, Q2 2015
Gartner 2015 Magic Quadrant For Secure Web Gateways
Gartner 2015 DLP Report
2015 Industry Drill-Down Report - Financial Services
Security Labs
Security Labs Blog
Security Labs Twitter Feed
Partners
Log In
Request a Login
Global Partner Program
Triton Security Alliance & OEM Partners
Find a Partner
Find a Distributor
Company
About Us
History
Executive Team
Offices
Office of the CSO
Executive Briefing Center
Triton Advisory Board
Customer Advocacy Board
Careers
News & Views
News
Blogs
› Insights
› Security Labs
Accolades
Support
Overview
Solution Center
Technical Library
Forums
Tools & Policies
Contact Support
Introducing Websense TRITON RiskVision
Introducing Websense TRITON RiskVision
TRITON RiskVision Setup Guide | Websense TRITON RiskVision | v7.8.x
Websense TRITON
®
RiskVision™ uses advanced analytics—including rules, signatures, heuristics, and application behaviors—to provide real-time Internet traffic analysis. This analysis is used to:
Proactively discover security risks.
Detect access to proxy avoidance and hacking sites, adult content, botnets, keyloggers, sites related to phishing attacks, spyware, and many other types of unsafe content.
Report on potential vulnerabilities and active threat activity in your network.
Categorize new sites and dynamic content.
TRITON RiskVision monitors Internet traffic by connecting to the SPAN or mirror port on a switch, or to a network tap that supports aggregation.
Requests and responses monitored by the solution are analyzed in real time by Websense Advanced Classification Engine (ACE) analytics within Websense Content Gateway. Administrators can:
Use dashboard charts, reporting tools, and Real-Time Monitor to investigate and understand the results of this analysis.
Enable suspicious activity and usage alerts to be notified about types of detected Internet activity of interest to the organization.
ThreatScope Cloud Services provide sandboxing to find advanced malware threats in suspicious files. Administrators can:
Receive ThreatScope alerts when file analysis is complete.
Access online ThreatScope reports to learn more about analyzed files, the threats associated with them, and steps needed for remediation.
Use investigative reports to find more information about Internet activity on machines where threat-related files were downloaded.
Web DLP analyzes data leaving your network to detect data exfiltration activity. Administrators can:
Create Web DLP policies that target the types of data loss activity that they want to monitor.
Use dashboard charts and incident reports in the Data Security manager to investigate data loss activity.
Print
Email
Font Size:
A
A
Search
All
Technical Library
Article Rating:
Do you have any additional feedback?
Email:
close
Related Articles
Understanding TRITON RiskVision behavior
v7.8.0 Release Notes for Websense® TRITON® RiskVision™
Introducing TRITON RiskVision
Deployment and Installation Center
Quick Links
Technical Library
Site lookup tool
Hotfixes and downloads
Certified Product Matrix
Support Videos
Support Webinars
Suggest a Feature
Service Requests
Open a New Case
Manage My Cases
How are we doing?
Provide us feedback on your experience with the Service Request portal.
provide feedback >
Introducing Websense TRITON RiskVision
Careers
Contact Us
News & Views
Site Map
Legal Information
Privacy Policy
©2015 Websense, Inc. All Rights Reserved.