Connect with us

Hi, what are you looking for?


Network Security

Websense Enhances TRITON Security Platform

Websense released the latest version of its TRITON security platform on Tuesday, which includes new features designed to more effectively thwart targeted attacks.

Websense released the latest version of its TRITON security platform on Tuesday, which includes new features designed to more effectively thwart targeted attacks.

The new Websense TRITON 7.8 enhancements include advanced threat protection with expanded ThreatScope inline sandboxing, malware isolation to heighten data loss prevention, end-user phishing education and new platform support for pervasive deployment, the company said.

TRITON ThreatScope Web and Email Sandboxing Expanded in ACE

Websense TRITONWebsense ACE (Advanced Classification Engine) delivers real-time security ratings to all Websense TRITON products. The predictive security engines can see developing trends and use contextual assessments to ensure accuracy and counter evasion techniques. With more than 10,000 analytics, ACE provides deep inspection and composite scoring to support effective decision-making.

TRITON ThreatScope enables an additional capability within ACE to automatically intercept files for behavioral sandboxing and forensic reporting. Organizations can also manually upload files to the on-demand sandbox and input links to a cloud-based URL analysis service. Each action generates detailed reports to support forensic investigations and threat mitigation. ThreatScope also marks suspicious email links for supplemental scrutiny through email URL sandboxing. Real-time analysis of links occurs at point-of-click, which in some cases, can be long after the initial email arrives.

The Websense TRITON product portfolio provides integrated web, email and data protection. To access these new sandboxing and other enhancements, organizations can add TRITON ThreatScope to their existing TRITON solutions. 

Malware Isolation, Phishing Education and New Platform Support

In addition to the inline ThreatScope sandboxing enhancements to ACE, Websense TRITON 7.8 includes advancements to data loss prevention identification, phishing education and amplifies deployment pervasiveness.

Advertisement. Scroll to continue reading.

Data Loss Prevention Stops Advanced Low and Slow Exfiltration: To isolate potentially malware-infected systems, the new Websense TRITON data loss prevention enhancements further analyze the type of data moving into and out of an organization. Low and slow data exfiltration is stopped based on Websense analysis and machine learning, which determines data movement within complex obfuscation techniques to isolate threats.

End-User Phishing Education: Educating end-users about phishing attacks is vital to corporate security strategy and long-term success. Websense TRITON allows phishing messages, where the malicious link has been rewritten and disarmed, to be delivered to end-users. This process shows employees that even a legitimate looking email can be harmful. Users can click the disarmed URL to view a customizable block page that further reinforces end-user education. Added profiling also helps organizations identify potentially targeted users.

New Platform Support: Websense offers its technology to be deployed on-premise, through the cloud and via hybrid options.

More information on Websense TRITON is available here.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

Our networks have become atomized which, for starters, means they’re highly dispersed. Not just in terms of the infrastructure – legacy, on-premises, hybrid, multi-cloud,...