Learn from the people behind our information security products and technologies.

Monthly Support Webinars
View all

Join us for interactive presentations presented by our expert support technicians.

Webcasts on Demand


Websense® 2014 Threat Report
Watch

The Websense Security Labs™ "intelligence operatives" behind the 2014 Threat Report explain its significance and what you can expect to learn from it.

Learn about 2014's key threats and how to respond.
Watch

After viewing the Websense 2014 Security Predictions webcast, you'll know what to expect from cybercriminals and how to be ready for when they attack.

Enhancing the TRITON Portfolio: What's New
Watch

Find out how Websense has improved the industry-leading TRITON architecture to provide even greater protection.

Defending Against Advanced Cyberthreats and APTs
Watch

A new on-demand webcast describes the nature of APTs and outlines how best to defend against them.

Enabling Fast Responses to Security Incidents
Watch

Websense® TRITON® RiskVision™ combines unmatched insight into advanced threats and data loss with actionable reporting and malware analysis.

Office of the CSO: Quick Wins and Tips for DLP Success
Watch

In this webcast our expert panel offers an insider's perspective on how to approach data loss prevention (DLP) projects while avoiding the traditional pitfalls of implementation.

Deploying data security: Six steps to data protection
Watch

Deploying data security need not be complex, expensive or ineffective. In just six steps, your organization can be preventing the loss or theft of its IP and other sensitive data.

Office of the CSO: Rethinking Your Security Strategy
Watch

Join top security executives from leading organizations in a frank discussion about how to identify your greatest vulnerabilities and deploy new tactics that stop advanced attacks in their tracks.

Threat defenses: Before, during and after the point of click
Watch

Learn how to get protection from malware, advanced threats and data theft with continuous defenses before, during and after the point of click.

Why Java Exploits Remain a Top Security Risk
Watch

This webinar will explain Java's exposure to being compromised, plus offer a variety of alternatives and best practices you can employ to mitigate risks.

2013 Threat Report
Watch

Analyze threats and trends of 2012, and how they might affect your organization in the coming year.

Seven Stages of Advanced Threats and Data Theft
Watch

Learn how to protect your organization against the seven stages of advanced threats and data theft.