Websense scored the highest in email filtering capabilities and overall current offering evaluation criteria.
- Forrester Wave
Email Content Security Q4, 2012
Advanced Threats blend web and email elements throughout multistage cyber-attacks in Kill Chains, presenting multiple opportunities to stop those attacks before possible breaches occur. TRITON AP-EMAIL identifies targeted attacks, high risk users and Insider Threats while empowering mobile workers and safe adoption of new technologies like Microsoft Office 365™.
Add enhanced security options and extend protection to remote workers and DLP protection for outbound data.
Leverage cloud services for performance and scalability. Combine on-premise threat defenses with Cloud-based pre-filtering services to preserve bandwidth with industry - leading anti-spam SLA's. Or, choose a 100% Cloud deployment of all TRITON AP-EMAIL services.
Block data theft with enterprise-class content-aware DLP. Prepare for the Insider Threat and malware data theft, achieve compliance goals and further mitigate the risk to personal information or IP. Advanced capabilities detect data theft concealed in images or custom encrypted files, or even data transmitted in small amounts over time to evade detection.
Integrate behavioral sandboxing for additional malware assessment. Supplement Websense ACE analytics with an integrated file sandbox for additional deep inspection, and take advantage of behavioral analysis in a virtual environment to uncover the malicious behavior of Zero-day and other advanced malware. Test files automatically or manually to generate detailed forensics.
Identify explicit images to enforce acceptable use and compliance standards. Monitor, educate and enforce email policies regarding explicit or pornographic image attachments.
Ensure confidentiality of sensitive communications. Create custom policies to encrypt an entire email, including any attachments, so the contents are viewed only by the intended recipient(s).
Get real-time protection against Advanced Threats and data theft with multiple deployment options for both
Discover and protect sensitive data wherever it lives - on servers, endpoints or cloud services like Microsoft Office 365™ , as well as in use or in motion through Web or email gateways.
Protect roaming users against data theft and retain control of sensitive information on Mac® OS X® and Windows endpoint systems on and off the network.
Applies over 10,000 contextual analytics as part of its real-time assessment of Web, Email and Data communications, delivering the most effective protection available against Advanced Threats.
Learn more >
Managed by Websense Security Labs™, it provides the core threat intelligence for all Websense security products, uniting 900 million endpoints and analyzing up to 5 billion requests per day for Zero-day activity and Advanced Threat trends.
Learn more >
Real-time protection with appliance, Cloud, or hybrid deployment options, sharing threat intelligence across all defenses, with one unified user interface. TRITON architecture removes the complexity of managing a sophisticated end-to-end security solution across your enterprise.
Learn more >