TRITON - Data Security Help/content/support/library/data/v753/help/protection_options.aspx
* Who can move and receive data
* What data can and cannot be moved
* Where the data can be sent
* How the data can be sent
* What action to take in case of a policy breach
Websense Data Security secures:
* Network printers
- You can monitor or prevent sensitive data from being printed on any printer in your network.* Endpoint applications - You can monitor or prevent sensitive data from being copied and pasted from one application to another on endpoint clients. This is desirable, because endpoint clients are often disconnected from the corporate network and can pose a security risk.
* Endpoint removable media - You can monitor or prevent sensitive information from being written to a removable device such as a USB flash drive, CD/DVD, or external hard disk.
* Endpoint LANs - Users commonly take their laptops home and then copy data through a LAN connection to a network drive/share on another computer.
* You can specify a list of IPs, hostnames or IP networks of computers that are allowed as a source or destination for LAN copy.
* You can intercept data from an endpoint client.
* You can set a different behavior according to the endpoint type (laptop/other) and location (connected/not connected).
Note that Endpoint LAN control is applicable to Microsoft sharing only.
* Email systems - You can monitor or prevent sensitive information from being emailed in or outside of your domain.
* Web channels
* FTP - You can monitor or prevent sensitive information from being uploaded to file transfer protocol (FTP) sites.
* Chat - You can monitor sensitive information going out via instant messenger applications such as Yahoo! Messenger.
* Plain text -You can monitor or prevent sensitive information from being sent via plain text (unformatted textual content).
* HTTP/HTTPS - You can monitor or prevent sensitive information from being posted to a Web site, blog, or forum via HTTP. You can also prevent users from downloading sensitive data from the Web.
* Endpoint HTTP/HTTPS - You can monitor or protect endpoint devices such as laptops from posting or downloading sensitive data over the Web.
By such comprehensive monitoring of these channels, you can prevent data from leaving your organization by the most common means.
Click View Complete Document for more.