Developers: | Forcepoint (before Websense) |
Last Release Date: | August, 2012 |
Technology: | Cybersecurity - Information loss preventions |
Content |
The Websense TRITON system solves the main IT tasks facing the organizations:
- Personal data protection.
- Risks.
- Date leaks.
- Productivity.
We prevent leak of confidential information
- Differentiation and access control of employees during the work in the Internet, the analysis of HTTPS of traffic
- Filtering of undesirable mail and malware filtering
- Control of all channels of leak: copying on external carriers, network storage, printing, sending for e-mail and loading on web - services
- Fixing of the confidential data which are stored on the PC, external carriers, the general network resources
- Search in digital fingerprints of data, indexes of tables of databases, text recognition by optical methods (OCR)
- Support of the Russian coding and interface
- Automatic formation of the reporting under work of users and current threats
2012
Websense TRITON 7.7
The Websense company released in the summer of 2012 the next version of the complex gateway for regulation of an Internet access from corporate networks under the name TRITON 7.7. The new version of the gateway TRITON offers the improved protection against theft of data and the directed phishing. Besides, the gateway can distinguish and block harmful data transmission in encrypted form now – you cannot decode secretly sent information, but can block such transfer.
As representatives of Websense company consider, the main attention of security experts should be riveted on the slow and imperceptible attacks which showed the efficiency on the example of the Stuxnet, Duqu and Flame viruses. Such attacks meet long ago, but only recently found importance in the opinion of the potential victims. The similar attacks are characterized by very small speed of leak because of what the systems of prevention of leaks do not work. If the department of security does not sound the alarm because of leakage of the only card of the client out of limits protective perimeter, then leak turns into "open doors" for hackers. To cope with such problems, the new version of Websense TRITON Unified Security Center 7.7 offers special mechanisms of detection of small, but regular leaks.
In the new version of the gateway TRITON are also implemented the function of optical recognition of data for information search leaving the organization not in electronic documents, and in a graphic format. For example, leaks can be detected in screenshots using which the insider information is transmitted outside through a corporate box of e-mail.
The gateway Websense TRITON 7.7 is able to trace one more attack vector connected with implementation of links absolutely innocent at first sight in letters in the HTML format. Originally security systems do not perceive such links as threat, but further the link automatically changes on harmful. It occurs when malefactors receive control over a certain website, but not at once begin to extend through it a virus. Thus, links to this website are perceived as harmless. If to send letters with such links at the right time, for example, on Friday evening, there will be enough time to flood the taken website with viruses – the receiver comes to work on Monday, opens a link from the checked letter and infects the computer. For fight against such attacks the gateway TRITON 7.7 supports a mark of letters for the analysis of links in real time in the isolated test environment. Moreover, the this isolated environment is in a private cloud of Websense company so mobile users of the customer receive protection on an equal basis with users at office.
At last, the gateway Websense TRITON 7.7 provides protection against one more type of the attacks connected with plunder of passwords as it happened in last year with companies Sony, Stratfor, e-Harmony, LinkedIn and others. The new version of TRITON is able to define type of the enciphering used when sending data from the organization outside now. If a system considers that in the file the enciphering which was still not mentioned in this network is used (usually it occurs if the malicious code is used own means of enciphering), on a control panel warning of threat of the high level of danger is displaid.
Websense TRITON Mobile Security
The Websense company released in the summer of 2012 the new product TRITON Mobile Security which combines instruments of protection of web access, data and mobile systems with functions of the centralized control of office and personal mobile devices.
Technically Websense TRITON Mobile Security represents cloud service, expected service of devices with the operating system Apple iOS in the wireless networks. Four key components for effective mobile security are a part of this product: data protection taking into account a context, protection against harmful content of the websites, protection against the malware and mobile device management.
The release of TRITON Mobile Security is the third phase in deployment of the complex Websense platform for mobile security. To a great extent this product serves as continuation of recently provided TRITON 7.7 platform. Besides, in this solution functions of earlier released products for protection against date leak via mobile e-mail and for security of WiFi networks on places are saved. The architecture of Websense TRITON is complemented with 10 protective modules against plunder and date leak, including the module of optical recognition for identification of the text in pictures which are taken with the built-in cameras of mobile devices.
The TRITON Mobile Security system offers unique protection for data which travel together with employees of customers. Data security provision taking into account a context helps to protect the intellectual property of the customer. Besides, this cloud technology with VPN tunneling at the request of the client provides the analysis of all entering and outbound traffic.
Administrators of the organizations customers can unroll the Websense TRITON Mobile Security system, just installing a special profile on IOS-DEVICES and selecting the corresponding policy for protection of personal and office mobile devices which are used by employees. Distribution of policy on protection of web access to mobile devices takes several minutes. The built-in functions of mobile device management help to control observance of standards of security completely. Additional protection in real time is provided by technology of classification of threats of Websense ACE (Advanced Classification Engine) which is applied in all protective systems from the Websense TRITON series.