February 16, 2012
SAN DIEGO, Feb. 14, 2012 /PRNewswire/ -- Large enterprises and service providers urgently need a scalable way to stop advanced malware and data theft that is easily evading first-generation web proxies. Content security leader Websense has the answer--the new Websense' X10G model. It is a highly available and scalable system with critical real-time data-aware contextual defenses, which are applied to all inbound and outbound requests, and that defend against advanced malware and prevent intellectual property theft.
"The new Websense X10G will be well received by Fortune 500 customers because it has the performance and scale that they need to be secure given the realities of today's threats," said Jeff Wilson, principal security analyst for Infonetics Research. "Websense is improving security technology by examining web and data content as it attempts to enter and leave an organization. The company continues to innovate and deliver security technology that protects organizations from the latest malware while proving its proficiency in data theft protection. Real-time malware security that isn't based on static updates is a must-have to combat today's cybercriminals."
In the new Websense X-Series product line, the Websense X10G modular chassis architecture goes beyond traditional legacy web gateways that rely on antivirus (AV) and static URL filtering. Through the Websense TRITON architecture, the X10G is unmatched in its ability to correlate unified security intelligence in real time for multiple classifiers such as security, data, and content for all requests. It also allows IT to set policies once across platforms and provides a "single pane of glass" for management and reporting.
"Websense is the established leader in web and data security and the X10G is targeted to address the unique security needs of large enterprises and service providers with its market-leading performance, linear scalability, and aggressive real-time security that is unmatched," said John McCormack, president, Websense. "First generation proxies and firewalls are no match for the targeted attacks and dangerous malware that cybercriminals unleash against organizations. The Websense X10G and TRITON architecture gives you the unique choice to deploy on-premise appliances and leverage cloud security services to protect against the latest threats and keep confidential data safe. Aggressive security on all requests, with unique security intelligence from the Websense ThreatSeeker' Network, and industry-leading performance and availability isn't something our competitors can offer."
Before the X10G, organizations with a large volume of users and network traffic had to settle on a reduced security posture to not jeopardize network availability. Now, any global organization can use the X10G in their headquarters, and protect remote workers and small branch offices with a unified cloud delivery capability. The X10G model supports up to 16 blades, so it can scale from 10,000 to 100,000 users per chassis. No other solution:
-- provides real-time composite risk scoring of security, data, and content classifiers combined with real-time cloud security intelligence and analytics -- embeds enterprise-class DLP for data-aware contextual security policies -- classifies individual social networking and other web 2.0 pages in real time across all policy categories -- unifies management of cloud and on-premise deployment options for a "single pane of glass" administration experience with policy re-use The new Websense X10G supports the award-winning Websense TRITON architecture, which over the past three years has unified web, email, and data security across cloud, on-premise, and unique hybrid deployments. Websense technology innovation and leadership has also been recognized by numerous industry analysts. For example, Gartner, Inc. positioned Websense as a leader in its "Magic Quadrant for Content-Aware Data Loss Prevention"(i)and "Gartner Magic Quadrant for Web Security Gateway."(ii)
The proven security effectiveness of the TRITON solution is based on ACE (the Websense Advanced Classification Engine). ACE integrates real-time security, data, and content analysis into composite assessments. These assessments are based on real-time security intelligence and analytics from the Websense ThreatSeeker' Network--which contains more than 850 million end points covering social networking, blogs, email, and web traffic. It is the largest security intelligence network on the web.
The X10G model and the TRITON architecture are also backed by Websense support services, which have won numerous awards, including Association of Support Professionals (ASP) 2011 and 2010 awards for "The Year's Ten Best Support Web Sites", plus Service Capability & Performance (SCP) Support Standard certification.
Learn more about the Websense X10G model and Websense TRITON solution.
(i) Source: Gartner, Inc. "Magic Quadrant for Content-Aware Data Loss Prevention" by Eric Ouellet and Rob McMillan, August 10, 2011. (ii) Source: Gartner, Inc. "Magic Quadrant for Secure Web Gateway" by Lawrence Orans and Peter Firstbrook, May 25, 2011.
About Websense, Inc.
Websense, Inc. (NASDAQ: WBSN), a global leader in unified web security, email security, and data loss prevention (DLP) solutions, delivers the best content security for modern threats at the lowest total cost of ownership to tens of thousands of enterprise, mid-market and small organizations around the world. Distributed through a global network of channel partners and delivered as appliance-based software or Security-as-a-Service (SaaS), Websense content security solutions help organizations leverage web 2.0 and cloud-based communication, collaboration, and social media, while protecting from advanced persistent threats and modern malware, preventing the loss of confidential information, and enforcing internet use and security policies. Websense is headquartered in San Diego, California with offices around the world. For more information, visit www.websense.com.
Read more about:2012
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
AI in Cybersecurity: Using artificial intelligence to mitigate emerging security risks
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
Managed Security and the 3rd Party Cyber Risk Opportunity Whitepaper