Please choose a white paper from the list below.
Data Theft Prevention: The Key to Success, Growth and Innovation
We examine the methods leading to and the impact of a data theft, the holistic approach to protecting critical data, and how this can enable the objectives of growth and innovation.
Actionable intelligence and guidance in dealing with existing and emerging threats
Download the Report to gain executive visibility of key security trends and specific guidance in optimising processes, policies and security tool usage.
Can Your Organization Brave The New World of Advanced Cyber Attacks?
find out how Websense® TRITON APX protects your critical data from criminal intent outside your organization, as well as from insiders that may intentionally or accidentally put your information assets at risk.
ITAR Compliance with Technical Controls
This whitepaper covers how Data Loss Prevention solutions, such as Websense’s Data Security Suite, can mitigate the risk of accidental or intentional transmission of Technical Data.
Continuous Diagnostics and Monitoring
While supporting numerous CDM tools functional areas, Websense solutions can serve several critical roles.
2015 Security Predictions
Websense Security Labs present the threats they anticipate in 2015. Are you prepared for the year ahead?
Defending Against Big Data and IoT Threats webcast transcript
This whitepaper is the transcript for the Big Data and the "Internet of Things" webcast recorded in September 2014.
Websense’s response to the 2014 Ponemon Report
This new whitepaper highlights why cybersecurity professionals feel “deficient, disconnected and in the dark.”
The Seven Stages of Advanced Threats:
Understanding the Cyber Attack Kill Chain
2014 Ponemon Report Part 2
Roadblocks, Refresh and Raising the Human Security IQ
Office 365 Technical Brief
Enhance Microsoft Office 365 with Websense® Email Security and Data Protection Solutions
2014 Ponemon Report
Security deficits and disconnects plague security professionals.
Simplifying Compliance and Data Security for Health Providers
Data protection is critical for healthcare organizations.
Websense® 2014 Threat Report
Apply the seven-stage "kill chain" and attack model to your cybersecurity strategy.
Windows Error Reporting (WER)
In an industry first, Websense® Security Labs™ researchers used Windows Error Reporting (WER) crash reports to detect zero-day exploits in the wild.
Why Java Exploits Remain a Top Security Risk
The huge number of Java versions in active use makes it vulnerable to attack. We illustrate the risks from the use of Java and alternatives on how to address these risks.
Five Essentials for Protecting Against APTs
Advanced persistent threats (APTs) have become a major concern for IT security professionals worldwide, and for good reason. Recent attacks have targeted a multitude of diverse companies.
Enabling Fast Responses to Security Incidents With Threat Monitoring
To combat today's cybercriminals, IT need a tool that can provide visibility into infected systems, blended attacks, call-home communications, data exfiltration and other advanced threats via network threat monitoring and file sandboxing. Websense® TRITON® RiskVision™ is that tool.
Protecting IP Data From Loss and Theft: The Shortest Path to Prevention and Risk Reduction
Deploying data security need not be complex, expensive or ineffective. In just six steps, your organization can be preventing the loss or theft of its IP and other sensitive data.
Security Overview: Websense® ACE (Advanced Classification Engine)
Websense ACE is the real-time defense engine at the core of our web, email, data, and mobile security solutions.
Next Generation Secure Web Gateways: The Case and Criteria for Embedded Data Loss Prevention
This white paper outlines the need for data loss prevention (DLP) embedded within secure web gateways and defines what to look for in a solution.
The Practical Executive's Guide to Data Loss Prevention
Get guidance and clarity to help implement a DLP control that is practical, efficient and effective.
Defending Against Today's Targeted Phishing Attacks
Read this whitepaper to learn how to recognize advanced threats and defend against them.
A 3-Step Plan for Mobile Security
This article identifies mobile threats and risks and suggests a mobile security solution tailored to your needs.