Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


06:12 AM

Websense Unveils Security Software

Websense Wireless protects minors from inappropriate content and bolsters smartphone security

ORLANDO, Fla. -- Websense® Wireless, a division of Websense, Inc. (NASDAQ: WBSN), today unveiled new software that allows wireless operators and service providers to provide advanced security features to protect both end-users and the network from malicious Web content and to adhere to regulatory, industry and government regulations designed to protect minors from inappropriate Internet content.

The new software – the Websense Wireless URL Categorization Engine – allows operators to increase revenue streams by deploying value-added services such as customized parental controls, premium content offerings for subscribers, enhanced wireless security identification offerings, as well as mobile advertising and marketing capabilities.

The Websense Wireless URL Categorization Engine uses Websense technology that collects URLs from Internet sites and classifies them. Depending on the content filters installed with the individual wireless service provider, access to Internet sites can be allowed, blocked, or allowed only after a “continue” option is presented to the subscriber. Wireless operators, or their subscribers, can set filtering policies for more than 90 categories of Web sites, ranging from adult content to spyware.

Websense is the first company to offer reputation-based Web security protection to wireless operators and service providers through its patent-pending ThreatSeeker™ malicious content identification and categorization technology. ThreatSeeker’s Web Reputation Scoring capability provides enhanced security intelligence to the Websense Wireless URL Categorization Engine by discovering and classifying Web sites based on reputation scores and suspicious characteristics. These high-risk sites are added to a threat “watch list,” so operators can block access to those sites, helping to improve an operator’s security coverage against external Web-based threats.

Websense ThreatSeeker scans more than 600 million Web sites per week to give Websense the power to protect operators’ mobile networks before they are compromised by security threats. With this technology, operators can provide preemptive protection from Web-based security threats – threats typically missed by antivirus systems. Unlike approaches to wireless security that use signature-based technology, Websense seeks out threats on the Internet before customers are compromised and protects customers before patches and signatures are created.

“The increasing availability of Internet-enabled wireless devices such as SmartPhones, most of which now feature broadband connectivity, is making it easier for wireless subscribers to enjoy a similar online experience that they have on their desktops. Unfortunately that also means increased exposure to online security threats and content unsuitable for minors,” said Kian Saneii, general manager, Websense Wireless. “Wireless operators and Internet service providers are now seeking a reliable, proven content filtering solution to deliver parental controls while also effectively protecting their subscribers from Web-based security threats.”

Websense Inc. (Nasdaq: WBSN)

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-13
A UXSS was discovered in the Thanos-Soft Cheetah Browser in Android 1.2.0 due to the inadequate filter of the intent scheme. This resulted in Cross-site scripting on the cheetah browser in any website.
PUBLISHED: 2021-04-13
The Motorola MH702x devices, prior to version, do not properly verify the server certificate during communication with the support server which could lead to the communication channel being accessible by an attacker.
PUBLISHED: 2021-04-13
A privilege escalation vulnerability in Lenovo Power Management Driver for Windows 10, prior to version, that could allow unauthorized access to the driver's device object.
PUBLISHED: 2021-04-13
A null pointer dereference vulnerability in Lenovo Power Management Driver for Windows 10, prior to version, that could cause systems to experience a blue screen error.
PUBLISHED: 2021-04-13
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.