Please choose a white paper from the list below.

Actionable intelligence and guidance in dealing with existing and emerging threats

Download the Report to gain executive visibility of key security trends and specific guidance in optimising processes, policies and security tool usage.

Download

Can Your Organization Brave The New World of Advanced Cyber Attacks?

find out how Websense® TRITON APX protects your critical data from criminal intent outside your organization, as well as from insiders that may intentionally or accidentally put your information assets at risk.

Download

ITAR Compliance with Technical Controls

This whitepaper covers how Data Loss Prevention solutions, such as Websense’s Data Security Suite, can mitigate the risk of accidental or intentional transmission of Technical Data.

Download

Continuous Diagnostics and Monitoring

While supporting numerous CDM tools functional areas, Websense solutions can serve several critical roles.

Download

2015 Security Predictions

Websense Security Labs present the threats they anticipate in 2015. Are you prepared for the year ahead?

Download

Defending Against Big Data and IoT Threats webcast transcript

This whitepaper is the transcript for the Big Data and the "Internet of Things" webcast recorded in September 2014.

Download

Websense’s response to the 2014 Ponemon Report

This new whitepaper highlights why cybersecurity professionals feel “deficient, disconnected and in the dark.”

Download

The Seven Stages of Advanced Threats:

Understanding the Cyber Attack Kill Chain

Download

2014 Ponemon Report Part 2

Roadblocks, Refresh and Raising the Human Security IQ

Download

Office 365 Technical Brief

Enhance Microsoft Office 365 with Websense® Email Security and Data Protection Solutions

Download

2014 Ponemon Report

Security deficits and disconnects plague security professionals.

Download

Simplifying Compliance and Data Security for Health Providers

Data protection is critical for healthcare organizations.

Download

Websense® 2014 Threat Report

Apply the seven-stage "kill chain" and attack model to your cybersecurity strategy.

Download

Windows Error Reporting (WER)

In an industry first, Websense® Security Labs™ researchers used Windows Error Reporting (WER) crash reports to detect zero-day exploits in the wild.

Download

Why Java Exploits Remain a Top Security Risk

The huge number of Java versions in active use makes it vulnerable to attack. We illustrate the risks from the use of Java and alternatives on how to address these risks.

Download

Five Essentials for Protecting Against APTs

Advanced persistent threats (APTs) have become a major concern for IT security professionals worldwide, and for good reason. Recent attacks have targeted a multitude of diverse companies.

Download

Enabling Fast Responses to Security Incidents With Threat Monitoring

To combat today's cybercriminals, IT need a tool that can provide visibility into infected systems, blended attacks, call-home communications, data exfiltration and other advanced threats via network threat monitoring and file sandboxing. Websense® TRITON® RiskVision™ is that tool.

Download

Protecting IP Data From Loss and Theft: The Shortest Path to Prevention and Risk Reduction

Deploying data security need not be complex, expensive or ineffective. In just six steps, your organization can be preventing the loss or theft of its IP and other sensitive data.

Download

Security Overview: Websense® ACE (Advanced Classification Engine)

Websense ACE is the real-time defense engine at the core of our web, email, data, and mobile security solutions.

Download

Next Generation Secure Web Gateways: The Case and Criteria for Embedded Data Loss Prevention

This white paper outlines the need for data loss prevention (DLP) embedded within secure web gateways and defines what to look for in a solution.

Download

The Practical Executive's Guide to Data Loss Prevention

Get guidance and clarity to help implement a DLP control that is practical, efficient and effective.

Download

Defending Against Today's Targeted Phishing Attacks

Read this whitepaper to learn how to recognize advanced threats and defend against them.

Download

A 3-Step Plan for Mobile Security

This article identifies mobile threats and risks and suggests a mobile security solution tailored to your needs.

Download