Go to the table of contents Go to the previous page Go to the next page View or print as PDF
TRITON Mobile Security Evaluation Guide
TRITON Mobile Security Evaluation Guide
Why TRITON Mobile Security
Evaluation Guide | Mobile Security Solutions
Websense® TRITON® Mobile Security enables the safe and secure use of mobile devices in your organization. It helps protect against data loss and the theft of intellectual property. Mobile Device Management features let you control mobile devices to keep them secure, minimize risk, and maintain compliance. It extends your Web Security policies to mobile devices whether they are used on your network or outside your corporate network on 3G/4G and wireless networks you don't own. And you get real-time contextual security provided by Websense Advanced Classification Engine (ACE), the technology that powers all TRITON security solutions.
Key Features
*
*
*
*
*
*
During Your Evaluation
In this guide, you will be introduced to the key features of the TRITON Mobile Security solution. The purpose of this guide is not to provide instructions on how to administrate Mobile Security, but to highlight the value of the Mobile Security solution, and to ensure you get the most out of your evaluation.
For detailed information on how to get started with your evaluation, refer to the TRITON Mobile Security Getting Started Guide.
About Websense
www.websense.com
About Websense, Inc.
Websense, Inc. is a global leader in protecting organizations from advanced cyberattacks and data theft. Websense TRITON APX comprehensive security solutions unify web, email, data and endpoint security at the lowest total cost of ownership. Tens of thousands of enterprises rely on Websense TRITON security intelligence to stop advanced persistent threats, targeted attacks and evolving malware. Websense prevents data breaches, intellectual property theft and enforces security compliance and best practices. A global network of channel partners distributes scalable, unified appliance- and cloud-based Websense TRITON APX solutions.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
TRITON Mobile Security Evaluation Guide
Copyright 2016 Forcepoint LLC. All rights reserved.