Please choose a white paper from the list below.

Websense® 2014 Threat Report

Apply the seven-stage "kill chain" and attack model to your cybersecurity strategy.

Download
Websense® 2014 Threat Report

In an industry first, Websense® Security Labs™ researchers used Windows Error Reporting (WER) crash reports to detect zero-day exploits in the wild.

Download
Using Anomalies in Crash Reports to Detect Unknown Threats

Websense® 2014 Security Predictions Report

Every fall, Websense® Security Labs™ researchers predict the key threats your organization should prepare for in the coming year.

Download
Websense® 2014 Security Predictions Report

Why Java Exploits Remain a Top Security Risk

The huge number of Java versions in active use makes it vulnerable to attack. We illustrate the risks from the use of Java and alternatives on how to address these risks.

Download
Why Java Exploits Remain a Top Security Risk

Five Essentials for Protecting Against APTs

Advanced persistent threats (APTs) have become a major concern for IT security professionals worldwide, and for good reason. Recent attacks have targeted a multitude of diverse companies.

Download
Five Essentials for Protecting Against APTs

Enabling Fast Responses to Security Incidents With Threat Monitoring

To combat today's cybercriminals, IT need a tool that can provide visibility into infected systems, blended attacks, call-home communications, data exfiltration and other advanced threats via network threat monitoring and file sandboxing. Websense® TRITON® RiskVision™ is that tool.

Download
Enabling Fast Responses to Security Incidents With Threat Monitoring

Protecting IP Data From Loss and Theft: The Shortest Path to Prevention and Risk Reduction

Deploying data security need not be complex, expensive or ineffective. In just six steps, your organization can be preventing the loss or theft of its IP and other sensitive data.

Download
Protecting IP Data From Loss and Theft: The Shortest Path to Prevention and Risk Reduction

Seven Stages of Advanced Threats

How does one distinguish advanced threats from traditional?

Download
Seven Stages of Advanced Threats

Next Generation Threats: The Best Defense

Is the cyber-criminals' desire to steal critical data greater than our abilities to protect it?

Download
Next Generation Threats: The Best Defense

Websense 2013 Security Predictions

These predictions have been collected from the global Websense® Security Labs™ team to provide insight into key threats you should prepare for in 2013.

Download
Websense 2013 Security Predictions

Websense® 2013 Threat Report

Find out why your trust in traditional security measures might be misplaced.

Download
Websense® 2013 Threat Report

Security Overview: Websense® ACE (Advanced Classification Engine)

Websense ACE is the real-time defense engine at the core of our web, email, data, and mobile security solutions.

Download
Security Overview: Websense® ACE (Advanced Classification Engine)

Next Generation Secure Web Gateways: The Case and Criteria for Embedded Data Loss Prevention

This white paper outlines the need for data loss prevention (DLP) embedded within secure web gateways and defines what to look for in a solution.

Download
Next Generation Secure Web Gateways: The Case and Criteria for Embedded Data Loss Prevention

The Practical Executive's Guide to Data Loss Prevention

Get guidance and clarity to help implement a DLP control that is practical, efficient and effective.

Download
The Practical Executive's Guide to Data Loss Prevention

Defending Against Today's Targeted Phishing Attacks

Read this whitepaper to learn how to recognize advanced threats and defend against them.

Download
Defending Against Today's Targeted Phishing Attacks

Websense® 2012 Threat Report

This Websense Security Labs™ report summarizes what Websense researchers found when they analyzed results from the Websense ThreatSeeker Network.

Download
Websense® 2012 Threat Report

Global Study on Mobility Risks

This report summarizes mobile device security insights from more than 4,600 IT and IT security practitioners in 12 countries.

Download
Global Study on Mobility Risks

Websense Security Survey: Security Pros and Cons

How are IT managers coping with today's fast-changing threat landscape? Are they ahead of the confidence curve or driving round the bend to stress?

Download
Websense Security Survey: Security Pros and Cons

Ponemon Institute Research Report

This Ponemon Institute study, sponsored by Websense, outlines what global IT and IT security practitioners think about social media security risks.

Download
Ponemon Institute Research Report

A 3-Step Plan for Mobile Security

This article identifies mobile threats and risks and suggests a mobile security solution tailored to your needs.

Download
A 3-Step Plan for Mobile Security

Websense® Security Labs™ Security Predictions for 2012

Websense® Security Labs™ researchers compiled the events likely to be among those that drive your life—and ours—in 2012.

Download
Websense® Security Labs™ Security Predictions for 2012

Advanced Persistent Threats (APTs) and other Advanced Attacks

Advanced Persistent Threats (APTs) have become a major concern for IT security professionals around the world, and for good reason.

Download
Advanced Persistent Threats (APTs) and other Advanced Attacks

How to choose a Data Loss Prevention (DLP) Solution

Explore the different types of DLP solutions and evaluate how they meet your needs.

Download
How to choose a Data Loss Prevention (DLP) Solution

Advanced Persistent Threats: from FUD to FACTS

"APT" (Advanced Persistent Threat) is this year's hot-button term, but what exactly does it mean?

Download
Advanced Persistent Threats: from FUD to FACTS

Messaging and Web Security Best Practices for 2011 and Beyond

Knowing your risks is the first step in developing an effective security plan. Understanding your solution options is the next.

Download
Messaging and Web Security Best Practices for 2011 and Beyond

Securing the Social Enterprise

Along with the enormous popularity of social media come enterprise-size risks.

Download
Securing the Social Enterprise

Need for Unified Content Security

The dynamic nature of the web, email, mobile devices and other technologies have rendered single-solution security approaches ineffective.

Download
Need for Unified Content Security

Unified Content Security Defined

A unified content solution must have a unified architecture with unified content analysis and a single console.

Download
Unified Content Security Defined

Unified Content Security in Practice

This white paper explains why today's organizations need a unified content security solution.

Download
Unified Content Security in Practice