Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Advanced Threats

1/13/2015
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Websense Transformation Delivers New TRITON APX 8.0 Platform

Websense Addresses Skills Gap with TRITON APX 8.0, the Result of 18 Months of Business Transformation & Innovation.

AUSTIN, Texas—January 13, 2014 — Websense, Inc. a global leader in protecting organizations from the latest cyber attacks and data theft, today announced the availability of Websense® TRITON APX 8.0. The new modular platform provides advanced threat and data theft prevention for companies that embrace new technologies and working practices. TRITON APX provides protection across the kill-chain, reveals actionable intelligence, and enables real-time feedback to educate and motivate end-users to avoid risky behavior. Designed to help organizations grow and embrace new technologies, such as cloud-based services, TRITON APX offers unparalleled protection for advanced attacks that exploit the threat kill chain. With five unique data-aware defenses necessary to prevent data theft, it brings together advanced threat protection, and an enhanced customer experience. This release is the culmination of eighteen months of business transformation and innovation.

While organizations are not short of security data, they lack contextual information on security risks; what might happen next and how they should act. TRITON APX enables security professionals to reduce remediation as it surfaces attacks and prevents advanced attacks. Furthermore, TRITON APX does not contribute to security noise, helping security professionals focus on their most important tasks.

The unprecedented change in the technological landscape has seen the wide-scale adoption of cloud and mobile and a greater distributed workforce. These changes are compounded by a deficit in cyber security skills and personnel. To address this, Websense has bolstered its services offerings through rapid deployment packages that combine skilled resources, best practices, learnings and expertize from a significant number of previous implementations, enabling customers to maximize the unparalleled protection of Websense TRITON APX solutions.

“It has been a transformative period for Websense, including moving our company from California to Texas, where we have tapped into the deep cyber security talent, and where we are closer to our customers,” said John McCormack, Websense CEO. “Enhancing our customer experience is paramount to us, as the security industry has a responsibility to ensure that companies investing in solutions not only gain intelligence, but are able to highlight and interpret risks that could lead to data theft. TRITON APX 8.0 represents the beginning of the next generation in cyber security, as it is the platform for future innovation and growth. Most importantly, TRITON APX surfaces attacks, allowing cyber security professionals with little time on their hands, to act quickly and efficiently.”

 “The challenge of securing an organization against sophisticated, advanced attacks, coupled with the cyber security skills shortage creates a difficult scenario for organizations,” said Charles Kolodgy, Research Vice President, Security Products at IDC. “TRITON APX takes strong steps to address this issue through the use of one management console, enabling companies to surface actionable intelligence. The new modular platform provides companies the choice they desire alongside advanced data theft prevention capabilities that are unique to the market.”
 
Features included in TRITON APX 8.0 include:
UNIQUE: Advanced threat protection across the kill chain: Through integrated web, email and data solutions, Websense provides deep analysis across the threat kill chain to detect and stop APT’s and advanced malware that are designed to evade point solutions. 
Effective and easy to deploy data theft prevention: A fully contextually-aware data theft engine that is integrated with Web and email gateways. Features include:
 
-          UNIQUE: Drip DLP shows how the cumulative analysis of content over time is used to identify “low and slow” data theft where a small but consistent flow of sensitive data is leaked over an extended period of time e.g. sending 20 credit cards during an hour, one by one, in order to avoid detection.
-          UNIQUE: Optical Character Recognition allows embedded text to be identified within screenshots, photographs and image-based documents.
-          Mobile DLP monitors and blocks sensitive data stored in messages being downloaded onto mobile devices running iOS; Android; Windows Phone mobile OS.
 
UNIQUE: Safe adoption of cloud services: Provides visibility and control over what documents employees can share, using authorized and unauthorized cloud storage services such as Microsoft Office 365, Dropbox; iCloud Drive, OneDrive and Box.
UNIQUE: Remote Intellectual Property (IP) protection: Enforced IP protection policies on both Microsoft Windows and Mac OS X operating systems. Confidential documents, designs, customer records and products formulas can all be protected from data loss or data theft when employees are working outside the corporate network.
Access to advanced skills for rapid deployment: TRITON QuickStart Implementation packages bring together skilled resources, best practices, learnings and expertize from  previous implementations to maximize the unparalleled protection of Websense® TRITON solutions.
Actionable Intelligence: Dashboard that provides intelligent prioritization of incidents, empowering IT staff to focus, rapidly respond, and resolve critical issues. Detailed information guides less experienced security staff to take appropriate actions.
-          Machine learning (ML) usually requires a labor-intensive process involving the provision of large positive and negative document sets. Using algorithms that enable the creation of machine learning classifiers without the need to supply a negative document set, TRITON APX significantly lowers the barrier to ML adoption.
Employee data theft risk indicators : Pre-defined policies that look for sensitive content coupled with behavior suggestive of high-risk employee activity, indicative of data theft.
 
Employee education: Real-time feedback options to educate and motivate end users to identify and avoid risky behavior. Built-in reports proactively identify ‘high risk users’ based on their experience in engaging with phishing emails. 
For more details click here: Websense TRITON APX 
To learn how Websense provides the industry's most advanced threat identification capabilities please visit www.websense.com/triton.
###
About Websense, Inc.
Websense, Inc. is a global leader in protecting organizations from the latest cyber attacks and data theft. Websense TRITON comprehensive security solutions unify web security, email security, mobile security and data loss prevention (DLP) at the lowest total cost of ownership. More than 11,000 enterprises rely on Websense TRITON security intelligence to stop advanced persistent threats, targeted attacks and evolving malware. Websense prevents data breaches, intellectual property theft and enforces security compliance and best practices. A global network of channel partners distributes scalable, unified appliance- and cloud-based Websense TRITON solutions.
Websense TRITON stops more threats; visit www.websense.com/proveit to see proof. To access the latest Websense security insights and connect through social media, please visit www.websense.com/smc. For more information, visit www.websense.com andwww.websense.com/triton.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Cloud Security Threats for 2021
Or Azarzar, CTO & Co-Founder of Lightspin,  12/3/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27772
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could po...
CVE-2020-27773
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to appli...
CVE-2020-28950
PUBLISHED: 2020-12-04
The installer of Kaspersky Anti-Ransomware Tool (KART) prior to KART 4.0 Patch C was vulnerable to a DLL hijacking attack that allowed an attacker to elevate privileges during installation process.
CVE-2020-27774
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but co...
CVE-2020-27775
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but c...