Please choose a white paper from the list below.

2014 Ponemon Report Part 2

Roadblocks, Refresh & Raising the Human Security IQ

Download
2014 Ponemon Report Part 2

The Seven Stages of Advanced Threats:

Understanding the Cyber Attack Kill Chain

Download
Understanding the Cyber Attack Kill Chain

Office 365 Technical Brief

Enhance Microsoft Office 365 with Websense® Email Security and Data Protection Solutions

Download
Office 365 Technical Brief

2014 Ponemon Report

Security deficits and disconnects plague security professionals.

Download
2014 Ponemon Report

Enabling Fast Resources To Security Incidents with Threat Monitoring

Download
Enabling Fast Resources To Security Incidents with Threat Monitoring

Simplifying Compliance and Data Security for Health Providers

Data protection is critical for healthcare organizations.

Download
Simplifying Compliance and Data Security for Health Providers

Websense® 2014 Threat Report

Apply the seven-stage "kill chain" and attack model to your cybersecurity strategy.

Download
Websense® 2014 Threat Report

Windows Error Reporting (WER)

In an industry first, Websense® Security Labs™ researchers used Windows Error Reporting (WER) crash reports to detect zero-day exploits in the wild.

Download
Using Anomalies in Crash Reports to Detect Unknown Threats

Websense® 2014 Security Predictions Report

Every fall, Websense® Security Labs™ researchers predict the key threats your organization should prepare for in the coming year.

Download
Websense® 2014 Security Predictions Report

Why Java Exploits Remain a Top Security Risk

The huge number of Java versions in active use makes it vulnerable to attack. We illustrate the risks from the use of Java and alternatives on how to address these risks.

Download
Why Java Exploits Remain a Top Security Risk

Five Essentials for Protecting Against APTs

Advanced persistent threats (APTs) have become a major concern for IT security professionals worldwide, and for good reason. Recent attacks have targeted a multitude of diverse companies.

Download
Five Essentials for Protecting Against APTs

Enabling Fast Responses to Security Incidents With Threat Monitoring

To combat today's cybercriminals, IT need a tool that can provide visibility into infected systems, blended attacks, call-home communications, data exfiltration and other advanced threats via network threat monitoring and file sandboxing. Websense® TRITON® RiskVision™ is that tool.

Download
Enabling Fast Responses to Security Incidents With Threat Monitoring

Protecting IP Data From Loss and Theft: The Shortest Path to Prevention and Risk Reduction

Deploying data security need not be complex, expensive or ineffective. In just six steps, your organization can be preventing the loss or theft of its IP and other sensitive data.

Download
Protecting IP Data From Loss and Theft: The Shortest Path to Prevention and Risk Reduction

Seven Stages of Advanced Threats

How does one distinguish advanced threats from traditional?

Download
Seven Stages of Advanced Threats

Next Generation Threats: The Best Defense

Is the cyber-criminals' desire to steal critical data greater than our abilities to protect it?

Download
Next Generation Threats: The Best Defense

Websense 2013 Security Predictions

These predictions have been collected from the global Websense® Security Labs™ team to provide insight into key threats you should prepare for in 2013.

Download
Websense 2013 Security Predictions

Websense® 2013 Threat Report

Find out why your trust in traditional security measures might be misplaced.

Download
Websense® 2013 Threat Report

Security Overview: Websense® ACE (Advanced Classification Engine)

Websense ACE is the real-time defense engine at the core of our web, email, data, and mobile security solutions.

Download
Security Overview: Websense® ACE (Advanced Classification Engine)

Next Generation Secure Web Gateways: The Case and Criteria for Embedded Data Loss Prevention

This white paper outlines the need for data loss prevention (DLP) embedded within secure web gateways and defines what to look for in a solution.

Download
Next Generation Secure Web Gateways: The Case and Criteria for Embedded Data Loss Prevention

The Practical Executive's Guide to Data Loss Prevention

Get guidance and clarity to help implement a DLP control that is practical, efficient and effective.

Download
The Practical Executive's Guide to Data Loss Prevention

Defending Against Today's Targeted Phishing Attacks

Read this whitepaper to learn how to recognize advanced threats and defend against them.

Download
Defending Against Today's Targeted Phishing Attacks

A 3-Step Plan for Mobile Security

This article identifies mobile threats and risks and suggests a mobile security solution tailored to your needs.

Download
A 3-Step Plan for Mobile Security

How to choose a Data Loss Prevention (DLP) Solution

Explore the different types of DLP solutions and evaluate how they meet your needs.

Download
How to choose a Data Loss Prevention (DLP) Solution

Bailing Out Your Budget

How Websense Lowers Your TCO

Download
Bailing Out Your Budget: How Websense Lowers Your TCO

A Practical Executive's Guide to Data Loss Prevention

Populus macto abbas nulla exerci quod esca similis, vicis dolor epulae refoveo. Diam, tincidunt, virtus commodo sino ad. Ulciscor delenit, nimis tum, dignissim, pala, enim at torqueo adipiscing populus lobortis saepius.

Download
Seven Criteria for Evaluating Security-as-a-Service (SaaS) Solutions

Lowering Total Cost of Ownership With Hybrid Web Security

Hybrid deployments provide the best modern security while lowering TCO. This paper highlights the cost savings of a hybrid web security and data loss prevention solution.

Download
Lowering Total Cost of Ownership With Hybrid Web Security