Watch a video to learn more about Websense products and technologies.
TRITON APX Advanced Protection
Organizations face a new era of advanced cybercriminal activity and need to deploy adaptive security measures, protecting across the kill chain, which produce actionable intelligence.
TRITON AP-WEB provides comprehensive protection against inbound and outbound advanced threats and data theft, across the entire Kill Chain.
Email is the backbone of modern communication, but also exposes organisations to increased risks. TRITON AP-EMAIL identifies targeted attacks, high-risk user behavior and insider threat.
TRITON AP-DATA stops data theft from advanced attacks and insider threats, empowering you to safely adopt new cloud-based technologies to innovate your business.
TRITON AP-ENDPOINT provides advanced protection for your roaming users while on and off the corporate network, as well as preventing data leaks and theft through USB and other removable media.
The Shellshock Reality – and Solutions
See how the Shellshock vulnerability lets hackers breach a server in only a few seconds - and what you need to do NOW to protect your data.
Black Hat 2014 Recap
Websense experts recap what was hot – and what was not – at Black Hat 2014.
Interview with Charisse Castagnoli: Security Strategist, Websense Office of the CSO
Interview with Bob Hansmann: Director, Websense Product Marketing
Adventist Health Adventist Health is a faith-based healthcare provider, operating more than 300 full service hospitals, clinics and outpatient centers in the Western United States and Hawaii. Find out how they protect their patients and employees from identity theft and fraud.
Websense® TRITON® Mobile Cyber Defense is Here!
Websense® TRITON® Mobile Solutions give your users the data protection they need against cybercrime -- anywhere, anytime. Websense and AirWatch work together to monitor your mobile devices, store your data in the cloud, and protect it against mobile malware, phishing, SMS Spoofing and other advanced threats.
Websense® 2014 Threat Report – Need-to-Know Intelligence to Protect Your Organization
The threat lifecycle, attack apparatus and attacker motivations are key factors for understanding risk and reviewing your cybersecurity along every point of the seven-stage Advanced Threat Kill Chain.
Featured Customer: Brisbane Catholic Education
Brisbane Catholic Education provides faith-based schooling for Prep–Grade 12 students in Southeast Queensland, Australia. The school system has seen 30,000 percent growth in Internet traffic over the past ten years. See how Websense helps secure that traffic across 45,000 devices and 150 endpoints.
We are entering a new era in cybersecurity. Let us share our vision for a safer, more secure future, one where organizations and individuals can conduct business freely and openly, without fear of falling victim to cybercriminals and data theft.
Websense Reveals New Way to Detect Zero-Day Exploits
For the first time, Websense® Security Labs™ researchers used crash reports to detect unknown threats. Head researcher Alex Watson explains.
Websense Wrap Up: Black Hat USA 2013
Black Hat USA 2013 was "one to remember," according to Neil Thacker, security strategist and certified ethical hacker from the Websense® Office of the CSO. Neil discusses the great talks, tool and technology he witnessed at the show.
Black Hat USA 2013 Predictions
What topics will be hot at Black Hat USA 2013? Find out from security strategist and certified ethical hacker Neil Thacker from the Websense® Office of the CSO.
Only real-time, inline defenses can protect against today's timed and targeted attacks.
Advanced Data Theft:
Learn why data theft is now a boardroom topic.
In today's work-from-anywhere world, you need security that protects more than the device.
Websense® 2013 Threat Report –
Mobile malware is on the rise. In 2012, the number of executables and attack vectors increased exponentially. In addition, malicious mobile applications are using customization and social engineering tactics to create more effective attack methods.
What "Prove It" Means to a CSO
As a Fortune 500 CISO, Lamont Orange asked hard questions of security vendors. Now Websense Sr. Dir. of Security, he says CSOs must demand proof that products can perform in real-world conditions.
Websense® TRITON® Mission
Websense is dedicated to stopping cybercriminals dead in their tracks. Websense® TRITON® technology can increase your comfort and trust within the cybercommunity. TRITON stops more threats, and we can Prove It!
Miercom Security Effectiveness
The results are clear: Websense® TRITON® defenses stop more real-world threats across the entire kill chain.
Websense® 2013 Threat Report
Our experts explain a huge increase in malicious web activity, and more.
Websense 2013 Security Predictions
Websense Security Labs™ researchers highlight key threats to prepare for in the coming year.
Next Generation Email Security
Learn more about the features contained in the next generation of email security.
Websense on the BBC
Patrik Runald from Websense Security Labs™ talks to Working Lunch about staying safe online.
Watch the ACE demo
Websense researchers explain the technology and capabilities behind ACE.
Enabling the Social Workplace
Social web controls enable the safe and secure business use of social media.
Websense® TRITON® Solution
Learn how the TRITON solution gives you enterprise-class security for web, data and email.
The Executive Guide to DLP
View a primer on data loss prevention (DLP) products and methodology.
Websense Web Security Gateway
Safely enable social media use while protecting your organization from data loss and lost productivity.
What's in Store for Email Security?
The future includes combined web, email and data loss prevention technologies and hybrid platforms.
Websense Email Security
Get email and data security plus protection from converged email and web attacks.
Websense TRITON Solution:
Next Generation Security
Get enterprise-class security for web, data and email on a variety of platforms — all managed from one console.
Websense Data Security Suite
Monitor where your sensitive data is going, who's using it and how — and protect your sensitive data.