Websense announced a number of enhancements today to the latest version of its TRITON Web, email and data security product to help customers fight off attackers.
Websense’s Advanced Classification Engine (ACE) has been armed with 10 new defenses in TRITON 7.7, including: detecting criminal encrypted uploads, optical character recognition of text within images for data-in-motion and geo-location awareness.
“No matter what you are running — anti-virus, URL filtering, next generation firewalls — cybercriminals may find a way in and will establish command and control communication to steal your data,” said John McCormack, president of Websense, in a statement. “Our advanced malware and data theft protection measures set a heightened standard for security and forensic reporting. Our technology is designed to retain and contain your most sensitive data, while providing you with the visibility necessary to understand how significant the threat to your organization truly is and what cybercriminals are targeting.”
Websense has also included an email URL sandboxing capability that identifies suspicious links in emails for real-time analysis. When email recipients click on an embedded URL, Websense analyzes the website content and browser code in real time, in a cloud environment, to ensure safety in any location at any time, the company said.
Websense also updated the TRITON Advanced Malware Threat dashboard. The new dashboard profiles security incidents and features information such as severity levels and the ability to export incidents to SIEM solutions.
“With the enhancements, Websense TRITON raises the bar for security defenses,” said Christian Christiansen, an analyst with IDC, in a statement. “The new Websense advanced malware and data theft innovations address evolving threats from external and internal sources. Especially notable is the comprehensive approach that includes data loss prevention coupled to web-based malware mitigation and managed from a consolidated dashboard.”
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Patient Information Compromised in Data Breach at San Diego Healthcare Provider
- Germany Appoints Central Bank IT Chief to Head Cybersecurity
- OpenSSL Ships Patch for High-Severity Flaws
- Software Supply Chain Security Firm Lineaje Raises $7 Million
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Vulnerability Provided Access to Toyota Supplier Management Network
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- Linux Variant of Cl0p Ransomware Emerges
