Appliance-based web and email security solution with built-in DLP.

Websense® TRITON® Security Gateway provides industry-leading web security with email security that has built-in DLP capabilities. You can add Websense CyberSecurity Intelligence™ (CSI) services to get online malware sandboxing and direct access to Websense Security Labs™ threat researchers.

And as with all TRITON solutions, you get:

  • Unified Architecture
  • Unified Security Intelligence
  • Unified Policy and Reporting

Top Features

Web Security Gateway

  • Gateway threat analysis uses real-time, inline security analysis from Websense ACE (Advanced Classification Engine) and threat intelligence from the Websense ThreatSeeker® Intelligence Cloud to defend against advanced malware, blended threats and spam.
  • An advanced threat dashboard provides actionable forensic detail on who was attacked, what data was attacked, where the data almost went, and how the attack was executed. Data capture is provided when possible.
  • Social media controls manage use of Facebook, LinkedIn and other social media websites through highly granular rules. For example, you can allow Facebook access but prohibit posting content or playing games; or allow access to LinkedIn, but prevent job searches.

Email Security Gateway

  • Gateway threat analysis uses security intelligence from the Websense ThreatSeeker® Intelligence Cloud and Websense ACE (Advanced Classification Engine) to defend against advanced malware, blended threats and spam.
  • Websense TruEmail DLP™ capability offers enterprise-level protection against data theft and data loss for the SMTP channel. It includes natural language processing, data fingerprinting, mobile email DLP, incident forensics reporting and more than 1,600 built-in templates for compliance to prevent confidential data from leaving the corporate network via email.
  • Highly accurate spam detection returns very low false positives. Spam is identified using a combination of technologies including sender reputation, adaptive learning, URL analysis, heuristics, suspicious PDF identification and optical recognition of image spam.