SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Web Security Gateway




                                 Websense

                                 Web Security Gateway
                                 Control and Secure Web 2.0
                                 Web 2.0 is profoundly changing the way we work and interact. More than 90
                                 of the top 100 Web sites are categorized as social networking or search sites,
 “In the second half of 2008,    supporting dynamic or user-generated content. Many organizations are embracing
  70 percent of the top 100      the Web as a business platform, but Web 2.0 technologies, such as blogs, wikis,
                                 social networking sites, and RSS feeds, render traditional security technologies
sites either hosted malicious    such as antivirus, Web reputation, and basic URL filtering ineffective.
     content or contained a      Web 2.0 can yield enormous benefits for organizations, including improving
      masked redirect to an      customer intimacy and satisfaction, and building a competitive advantage.
       illegitimate Web site.”   Web 2.0, however, also bears new risks—to security, to productivity, and to legal
                                 liability. Nevertheless, organizations can significantly benefit from Web 2.0
                                 technologies and, whether they like it or not, their employees are using these
        Websense Security Labs
                                 new tools and Web-based applications under the radar of IT and network
                                 security teams.
                                 The Websense® Web Security Gateway is the industry’s most accurate and
                                 effective solution for Web 2.0 content filtering and threat protection, enabling
                                 organizations to accelerate business without having to worry about security,
                                 productivity, and liability threats such as malicious, inappropriate content,
                                 and data loss.


                                 The Websense Web Security Gateway offers:
                                  • Visibility and control over dynamic Web content and outbound data loss,
                                    including SSL encrypted traffic
                                  • Protection against Web 2.0 threats such as dynamic scripts
                                  • Advanced application controls for IM, P2P, and more
                                  • Easy-to-use, centralized management and reporting
                                  • Integrated Web proxy and caching


                                 Protection against Dynamic Web 2.0 Threats
                                 Today’s Web is rich with dynamic content. Real-time content scanning is the only
                                 way to effectively control dynamic Web threats that are designed to circumvent
                                 traditional security methods. The Websense Web Security Gateway uses proprietary
                                 analytic engines developed by the Websense Security Labs to analyze Web content
                                 as it is requested by an end-user. This advanced control augments the use of
                                 multiple security techniques included with the gateway, including antivirus,
                                 Websense Web antivirus, Web reputation analysis, behavioral analysis, and Web
                                 filtering using the Websense market-leading URL database. This advanced protection
                                 from Websense provides the most coverage and the greatest accuracy, enabling
                                 customers to securely leverage the benefits of Web 2.0.

                                 Control over Dynamic and User-generated Content
                                 Websense has embedded advanced analytics and real-time content inspection and
                                 classification technologies from the Websense ThreatSeeker™ Network into the
                                 Websense Web Security Gateway. These embedded technologies offer protection
                                 from previously uncategorized or unknown Web content “on the fly.” The Websense
                                 Web Security Gateway is the only solution that categorizes specific content on
                                 Web pages, such as mashups, rather than just the Web pages themselves. This
“With the real-time         allows IT managers to provide access to Web 2.0 sites while their organizations are
                                 protected from sections of sites that contain inappropriate or unwanted content.
scanning provided by the
                                 Websense analyzes content posted to Web 2.0, social networking, and blogger
 Websense Web Security           networks as it’s posted, using the industry’s first and only Web 2.0 early threat out-
   Gateway, we open up           break detection and protection system. This provides customers with protection
                                 from risks before they propagate.
 access to Web 2.0 sites
      while ensuring that
malicious content cannot
      get in and that our
        confidential data
        does not go out.”

                Henry Parker
     Senior Security Architect
             Addison Avenue




                                 Websense Policy Management


                                 Advanced Application Controls
                                 The growth of network applications such as IM and P2P provides hackers with a means
                                 to disrupt business and steal confidential data. The Websense Web Security Gateway
                                 provides control of over 130 network protocols for thousands of applications,
                                 mitigating security risks, and preventing data loss from unauthorized applications.

                                 Integrated Web Proxy and Cache
                                 The Websense Web Security Gateway is built on an enterprise-class Web proxy
                                 and cache platform. This platform provides enhanced management and control,
                                 enabling real-time content analysis for Web traffic. The integrated proxy and cache
                                 can be utilized by customers to consolidate existing Web proxy deployments,
                                 increasing response time and performance while saving time and resources over
                                 purchasing and maintaining separate systems.

                                 Visibility and Control for Secure Web Communications
                                 The Websense Web Security Gateway provides inspection for secure Web communications.
                                 The increasing use of SSL traffic and FTP over HTTP has created blind spots for
                                 legacy URL filters and opens backdoors for threats and data loss. The Websense
                                 Web Security Gateway provides complete visibility and control for SSL traffic,
                                 allowing organizations to apply effective policy for all Web communications.

                                 Intuitive Management and Reporting Interface
                                 The Websense Web Security Gateway provides a centralized, task-based
                                 management and reporting interface that integrates granular policy control with
                                 in-depth reporting. The intuitive, easy-to-use dashboard empowers customers to
                                 easily create actionable reports, and includes over 55 built-in reports to report
                                 on user activity and risk reduction. The gateway requires less time and effort
                                 to manage than competitive solutions, saving time and money while providing
                                 greater visibility and control, as well as more accurate and granular policy controls.
“Over 45 percent of
     the top 100 Web sites
  support dynamic or user-
       generated content.”

   “As much as 39 percent
  of malicious Web attacks
include data-stealing code.”

       Websense Security Labs




                                Websense Management and Reporting



                                  Features                              Benefits

                                                                        • Enables safe use and control of the latest
                                                                          Web 2.0 technologies
                                                                        • Provides the ability to use new Web 2.0 technologies
                                                                          while protecting against both legacy and
                                                                          emerging threats
                                  Real-time Web 2.0                     • Increases employee productivity and extends
                                  content control                         Web usage policies to unknown and dynamic
                                                                          sites in real time
                                                                        • Lowers IT costs and increases efficiency by
                                                                          consolidating multiple point products into one,
                                                                          easy-to-use solution that protects against both
                                                                          known threats and new emerging threats



                                  Real-time Web 2.0 security            • Prevents potential infection and data loss by
                                  scanning using analytics, including     identifying and blocking dynamic threats, such
                                  antivirus, Web antivirus, Web           as cross-site scripting, designed to evade legacy
                                  reputation, behavioral analysis,        protection
                                  and more to detect and block          • Gives you the accuracy and granularity required to
                                  dynamic threats                         manage and secure your organization for Web 2.0




                                  Comprehensive application             • Reduces risk from security and data loss by
                                  controls: Hybrid proxy and network      preventing employees from using unauthorized
                                  protocol engine controls over 130       applications
                                  protocols and thousands of            • Lowers network infrastructure costs by controlling
                                  individual applications                 the type and amount of network traffic




                                                                        • Enables control of inbound and outbound content,
                                                                          even SSL encrypted traffic
                                  Enterprise-class Web proxy and
                                                                        • Improves Web performance and Internet
                                  cache to inspect, optimize, and         response time
                                  control Web traffic, including SSL
                                                                        • Reduces the cost and management of legacy
                                                                          proxy solutions




                                                                        • Saves time and money managing Web security
                                                                        • Increases visibility and reporting for Web security
                                  Centralized, easy-to-use              • Resolves Web security incidents faster and
                                  management and reporting                more easily
                                                                        • Implements controls with the click of a mouse and
                                                                          without complicated scripting
Websense, Inc.                         Deployment Options with Freedom of Choice
San Diego, CA USA
tel 800 723 1166                       The Websense Web Security Gateway is available as software or on the Websense
tel 858 320 8000                       V10000™ appliance. The software-only solution is available for organizations that
www.websense.com
                                       standardize on specific hardware platforms. For organizations that prefer an
Websense UK Ltd.
Reading, Berkshire UK                  appliance, the Websense V10000 offers simplified deployment, easy management,
tel 0118 938 8600                      automatic updates, and future-proofing for the Websense Web Security Gateway.
fax 0118 938 86981
www.websense.co.uk

Australia           Italy
websense.com.au     websense.it
Brazil              Japan
portuguese.         websense.jp
websense.com                                          Clients                                                                                   Internet
                    Malaysia
Colombia            websense.com
websense.com.es     Mexico
France              websense.com.es
websense.fr         PRC
Germany             prc.websense.com                                             Sample Network Diagram
websense.de         Singapore
Hong Kong           websense.com
websense.cn         Spain
India               websense.com.es
websense.com        Taiwan
Ireland             websense.cn
websense.co.uk      UAE
Israel              websense.com
websense.co.uk
                                                                              Web Security Gateway




                                       Websense Web Security Gateway
                                       Technical Specifications
                                       Websense Web Security Gateway can be deployed as a software or appliance-based solution.

                                       Appliance:
                                       Websense V10000

                                       General purpose server minimum requirements:
                                       Operating System                                                       High availability
                                       Red Hat Linux v4,                                                      WCCP, External Load Balancer
                                       update 5* or Windows Server 2003/
                                                                                                              Proxy Support
                                       Server 2008†
                                                                                                              Transparent, Explicit
                                       CPU: 2 x Dual-core 2.8GHz processors
                                                                                                              SSL
                                       Memory
                                                                                                              Full SSL proxy with integrated
                                       4GB RAM
                                                                                                              certificate management
                                       Hard Disk Drive
                                                                                                              Authentication
                                       Two physical disks:
                                                                                                              Active Directory, LDAP, RADIUS, Novell,
                                       – 100GB for OS and application and
                                                                                                              NTLM v2
                                       temporary data, 100GB for cache*
                                       – 100GB (recommended RAID 1)†                                          * For Websense Content Gateway and/or
                                                                                                              Websense Web Filter/Web Security v7
                                       Network interfaces                                                     † For Websense Web Filter/Web Security
                                       Two x 10/100/1000 Ethernet interfaces                                  v7 and/or reporting




                                       For more information, visit www.websense.com/evaluations.

                                       © 2009 Websense, Inc. All rights reserved. Websense is a registered trademark of Websense, Inc. in the United States and
                                       certain international markets. Websense has numerous other registered and unregistered trademarks in the United States and
                                       internationally. All other trademarks are the property of their respective owners. 04.28.09

Contenu connexe

Tendances

Msft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksMsft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksAkram Qureshi
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awarenessJanagi Kannan
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSDavid J Rosenthal
 
4 Modern Security - Integrated SecOps and incident response with MTP
4  Modern Security - Integrated SecOps and incident response with MTP4  Modern Security - Integrated SecOps and incident response with MTP
4 Modern Security - Integrated SecOps and incident response with MTPAndrew Bettany
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityIBM Security
 
Microsoft Advanced Security & Compliance
Microsoft Advanced Security & ComplianceMicrosoft Advanced Security & Compliance
Microsoft Advanced Security & ComplianceChris Genazzio
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonAdam Levithan
 
Protecting Against Web Attacks
Protecting Against Web AttacksProtecting Against Web Attacks
Protecting Against Web AttacksAlert Logic
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud securityDavid De Vos
 
How to get deeper administration insights into your tenant
How to get deeper administration insights into your tenantHow to get deeper administration insights into your tenant
How to get deeper administration insights into your tenantRobert Crane
 
The Cloud Security Rules
The Cloud Security RulesThe Cloud Security Rules
The Cloud Security RulesKai Roer
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Symantec Brasil
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistJignesh Solanki
 
Remote Access and Dual Authentication for Cloud Storage
Remote Access and Dual Authentication for Cloud StorageRemote Access and Dual Authentication for Cloud Storage
Remote Access and Dual Authentication for Cloud StorageIJMER
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security IntroductionGLC Networks
 
The 15 best cloud security practices
The 15 best cloud security practices The 15 best cloud security practices
The 15 best cloud security practices Cloudride LTD
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIOSR Journals
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
 

Tendances (19)

Msft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksMsft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacks
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awareness
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 
4 Modern Security - Integrated SecOps and incident response with MTP
4  Modern Security - Integrated SecOps and incident response with MTP4  Modern Security - Integrated SecOps and incident response with MTP
4 Modern Security - Integrated SecOps and incident response with MTP
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
Microsoft Advanced Security & Compliance
Microsoft Advanced Security & ComplianceMicrosoft Advanced Security & Compliance
Microsoft Advanced Security & Compliance
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
Protecting Against Web Attacks
Protecting Against Web AttacksProtecting Against Web Attacks
Protecting Against Web Attacks
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud security
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
How to get deeper administration insights into your tenant
How to get deeper administration insights into your tenantHow to get deeper administration insights into your tenant
How to get deeper administration insights into your tenant
 
The Cloud Security Rules
The Cloud Security RulesThe Cloud Security Rules
The Cloud Security Rules
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
 
Remote Access and Dual Authentication for Cloud Storage
Remote Access and Dual Authentication for Cloud StorageRemote Access and Dual Authentication for Cloud Storage
Remote Access and Dual Authentication for Cloud Storage
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security Introduction
 
The 15 best cloud security practices
The 15 best cloud security practices The 15 best cloud security practices
The 15 best cloud security practices
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 

En vedette

Creating Value
Creating Value Creating Value
Creating Value ashokcare
 
Mkt 4596 heroic-2
Mkt 4596 heroic-2Mkt 4596 heroic-2
Mkt 4596 heroic-2shelly_bai
 
Easy may Diificult
Easy may DiificultEasy may Diificult
Easy may Diificultashokcare
 
Idiosyncratic risk matter chinbat
Idiosyncratic risk matter chinbatIdiosyncratic risk matter chinbat
Idiosyncratic risk matter chinbatchinbast
 
Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01Chindala Murali
 
O level Business studies
O level Business studiesO level Business studies
O level Business studiesMuhammad Talha
 
O LEVEL ACCOUNTING SHORT HANDOUTS
O LEVEL ACCOUNTING SHORT HANDOUTSO LEVEL ACCOUNTING SHORT HANDOUTS
O LEVEL ACCOUNTING SHORT HANDOUTSMuhammad Talha
 
Style effects in the cross section of stock returns
Style effects in the cross section of stock returnsStyle effects in the cross section of stock returns
Style effects in the cross section of stock returnschinbast
 
Plano de Negocio Multinivel Forever Living 2012
Plano de Negocio Multinivel Forever Living 2012Plano de Negocio Multinivel Forever Living 2012
Plano de Negocio Multinivel Forever Living 2012Forever Living Products
 
False discoveries in mutual fund performance presentation by me
False discoveries in mutual fund performance presentation by meFalse discoveries in mutual fund performance presentation by me
False discoveries in mutual fund performance presentation by mechinbast
 
False discoveries in mutual fund performance presentation by me
False discoveries in mutual fund performance presentation by meFalse discoveries in mutual fund performance presentation by me
False discoveries in mutual fund performance presentation by mechinbast
 

En vedette (16)

Creating Value
Creating Value Creating Value
Creating Value
 
Mkt 4596 heroic-2
Mkt 4596 heroic-2Mkt 4596 heroic-2
Mkt 4596 heroic-2
 
Easy may Diificult
Easy may DiificultEasy may Diificult
Easy may Diificult
 
Idiosyncratic risk matter chinbat
Idiosyncratic risk matter chinbatIdiosyncratic risk matter chinbat
Idiosyncratic risk matter chinbat
 
Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01
 
Accounting Ratios
Accounting RatiosAccounting Ratios
Accounting Ratios
 
Presentation on Pot Bearings
Presentation on Pot BearingsPresentation on Pot Bearings
Presentation on Pot Bearings
 
Medida
MedidaMedida
Medida
 
Nozick k
Nozick kNozick k
Nozick k
 
O level Business studies
O level Business studiesO level Business studies
O level Business studies
 
O LEVEL ACCOUNTING SHORT HANDOUTS
O LEVEL ACCOUNTING SHORT HANDOUTSO LEVEL ACCOUNTING SHORT HANDOUTS
O LEVEL ACCOUNTING SHORT HANDOUTS
 
Accounting concepts
Accounting conceptsAccounting concepts
Accounting concepts
 
Style effects in the cross section of stock returns
Style effects in the cross section of stock returnsStyle effects in the cross section of stock returns
Style effects in the cross section of stock returns
 
Plano de Negocio Multinivel Forever Living 2012
Plano de Negocio Multinivel Forever Living 2012Plano de Negocio Multinivel Forever Living 2012
Plano de Negocio Multinivel Forever Living 2012
 
False discoveries in mutual fund performance presentation by me
False discoveries in mutual fund performance presentation by meFalse discoveries in mutual fund performance presentation by me
False discoveries in mutual fund performance presentation by me
 
False discoveries in mutual fund performance presentation by me
False discoveries in mutual fund performance presentation by meFalse discoveries in mutual fund performance presentation by me
False discoveries in mutual fund performance presentation by me
 

Similaire à Wsg datasheet

Finjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheetFinjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheetElliott Lowe
 
Gartner Buyers Guide Summary
Gartner Buyers Guide SummaryGartner Buyers Guide Summary
Gartner Buyers Guide SummaryKim Jensen
 
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)DnaSylCotter
 
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS WorkloadsAmazon Web Services
 
50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02Bố Su
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Securitycrussell79
 
FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010Andris Soroka
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersCloudflare
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageINSPIRIT BRASIL
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3webhostingguy
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochureGeorge Wainblat
 
What is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdfWhat is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdfAngelicaPantaleon3
 
VMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware
 
201002 vdr-brochure-international
201002 vdr-brochure-international201002 vdr-brochure-international
201002 vdr-brochure-internationalEthosData
 
20100420 ethosdata brochure
20100420 ethosdata brochure20100420 ethosdata brochure
20100420 ethosdata brochureEthosData
 

Similaire à Wsg datasheet (20)

Finjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheetFinjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheet
 
Gartner Buyers Guide Summary
Gartner Buyers Guide SummaryGartner Buyers Guide Summary
Gartner Buyers Guide Summary
 
Secure Web Gateway Ds Lr[1]
Secure Web Gateway Ds Lr[1]Secure Web Gateway Ds Lr[1]
Secure Web Gateway Ds Lr[1]
 
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)Dna
 
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS Workloads
 
50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantage
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
 
What is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdfWhat is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdf
 
375 378
375 378375 378
375 378
 
VMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats new
 
201002 vdr-brochure-international
201002 vdr-brochure-international201002 vdr-brochure-international
201002 vdr-brochure-international
 
20100420 ethosdata brochure
20100420 ethosdata brochure20100420 ethosdata brochure
20100420 ethosdata brochure
 
Web Application Solutions
Web Application SolutionsWeb Application Solutions
Web Application Solutions
 

Dernier

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Dernier (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Wsg datasheet

  • 1. Web Security Gateway Websense Web Security Gateway Control and Secure Web 2.0 Web 2.0 is profoundly changing the way we work and interact. More than 90 of the top 100 Web sites are categorized as social networking or search sites, “In the second half of 2008, supporting dynamic or user-generated content. Many organizations are embracing 70 percent of the top 100 the Web as a business platform, but Web 2.0 technologies, such as blogs, wikis, social networking sites, and RSS feeds, render traditional security technologies sites either hosted malicious such as antivirus, Web reputation, and basic URL filtering ineffective. content or contained a Web 2.0 can yield enormous benefits for organizations, including improving masked redirect to an customer intimacy and satisfaction, and building a competitive advantage. illegitimate Web site.” Web 2.0, however, also bears new risks—to security, to productivity, and to legal liability. Nevertheless, organizations can significantly benefit from Web 2.0 technologies and, whether they like it or not, their employees are using these Websense Security Labs new tools and Web-based applications under the radar of IT and network security teams. The Websense® Web Security Gateway is the industry’s most accurate and effective solution for Web 2.0 content filtering and threat protection, enabling organizations to accelerate business without having to worry about security, productivity, and liability threats such as malicious, inappropriate content, and data loss. The Websense Web Security Gateway offers: • Visibility and control over dynamic Web content and outbound data loss, including SSL encrypted traffic • Protection against Web 2.0 threats such as dynamic scripts • Advanced application controls for IM, P2P, and more • Easy-to-use, centralized management and reporting • Integrated Web proxy and caching Protection against Dynamic Web 2.0 Threats Today’s Web is rich with dynamic content. Real-time content scanning is the only way to effectively control dynamic Web threats that are designed to circumvent traditional security methods. The Websense Web Security Gateway uses proprietary analytic engines developed by the Websense Security Labs to analyze Web content as it is requested by an end-user. This advanced control augments the use of multiple security techniques included with the gateway, including antivirus, Websense Web antivirus, Web reputation analysis, behavioral analysis, and Web filtering using the Websense market-leading URL database. This advanced protection from Websense provides the most coverage and the greatest accuracy, enabling customers to securely leverage the benefits of Web 2.0. Control over Dynamic and User-generated Content Websense has embedded advanced analytics and real-time content inspection and classification technologies from the Websense ThreatSeeker™ Network into the Websense Web Security Gateway. These embedded technologies offer protection from previously uncategorized or unknown Web content “on the fly.” The Websense Web Security Gateway is the only solution that categorizes specific content on Web pages, such as mashups, rather than just the Web pages themselves. This
  • 2. “With the real-time allows IT managers to provide access to Web 2.0 sites while their organizations are protected from sections of sites that contain inappropriate or unwanted content. scanning provided by the Websense analyzes content posted to Web 2.0, social networking, and blogger Websense Web Security networks as it’s posted, using the industry’s first and only Web 2.0 early threat out- Gateway, we open up break detection and protection system. This provides customers with protection from risks before they propagate. access to Web 2.0 sites while ensuring that malicious content cannot get in and that our confidential data does not go out.” Henry Parker Senior Security Architect Addison Avenue Websense Policy Management Advanced Application Controls The growth of network applications such as IM and P2P provides hackers with a means to disrupt business and steal confidential data. The Websense Web Security Gateway provides control of over 130 network protocols for thousands of applications, mitigating security risks, and preventing data loss from unauthorized applications. Integrated Web Proxy and Cache The Websense Web Security Gateway is built on an enterprise-class Web proxy and cache platform. This platform provides enhanced management and control, enabling real-time content analysis for Web traffic. The integrated proxy and cache can be utilized by customers to consolidate existing Web proxy deployments, increasing response time and performance while saving time and resources over purchasing and maintaining separate systems. Visibility and Control for Secure Web Communications The Websense Web Security Gateway provides inspection for secure Web communications. The increasing use of SSL traffic and FTP over HTTP has created blind spots for legacy URL filters and opens backdoors for threats and data loss. The Websense Web Security Gateway provides complete visibility and control for SSL traffic, allowing organizations to apply effective policy for all Web communications. Intuitive Management and Reporting Interface The Websense Web Security Gateway provides a centralized, task-based management and reporting interface that integrates granular policy control with in-depth reporting. The intuitive, easy-to-use dashboard empowers customers to easily create actionable reports, and includes over 55 built-in reports to report on user activity and risk reduction. The gateway requires less time and effort to manage than competitive solutions, saving time and money while providing greater visibility and control, as well as more accurate and granular policy controls.
  • 3. “Over 45 percent of the top 100 Web sites support dynamic or user- generated content.” “As much as 39 percent of malicious Web attacks include data-stealing code.” Websense Security Labs Websense Management and Reporting Features Benefits • Enables safe use and control of the latest Web 2.0 technologies • Provides the ability to use new Web 2.0 technologies while protecting against both legacy and emerging threats Real-time Web 2.0 • Increases employee productivity and extends content control Web usage policies to unknown and dynamic sites in real time • Lowers IT costs and increases efficiency by consolidating multiple point products into one, easy-to-use solution that protects against both known threats and new emerging threats Real-time Web 2.0 security • Prevents potential infection and data loss by scanning using analytics, including identifying and blocking dynamic threats, such antivirus, Web antivirus, Web as cross-site scripting, designed to evade legacy reputation, behavioral analysis, protection and more to detect and block • Gives you the accuracy and granularity required to dynamic threats manage and secure your organization for Web 2.0 Comprehensive application • Reduces risk from security and data loss by controls: Hybrid proxy and network preventing employees from using unauthorized protocol engine controls over 130 applications protocols and thousands of • Lowers network infrastructure costs by controlling individual applications the type and amount of network traffic • Enables control of inbound and outbound content, even SSL encrypted traffic Enterprise-class Web proxy and • Improves Web performance and Internet cache to inspect, optimize, and response time control Web traffic, including SSL • Reduces the cost and management of legacy proxy solutions • Saves time and money managing Web security • Increases visibility and reporting for Web security Centralized, easy-to-use • Resolves Web security incidents faster and management and reporting more easily • Implements controls with the click of a mouse and without complicated scripting
  • 4. Websense, Inc. Deployment Options with Freedom of Choice San Diego, CA USA tel 800 723 1166 The Websense Web Security Gateway is available as software or on the Websense tel 858 320 8000 V10000™ appliance. The software-only solution is available for organizations that www.websense.com standardize on specific hardware platforms. For organizations that prefer an Websense UK Ltd. Reading, Berkshire UK appliance, the Websense V10000 offers simplified deployment, easy management, tel 0118 938 8600 automatic updates, and future-proofing for the Websense Web Security Gateway. fax 0118 938 86981 www.websense.co.uk Australia Italy websense.com.au websense.it Brazil Japan portuguese. websense.jp websense.com Clients Internet Malaysia Colombia websense.com websense.com.es Mexico France websense.com.es websense.fr PRC Germany prc.websense.com Sample Network Diagram websense.de Singapore Hong Kong websense.com websense.cn Spain India websense.com.es websense.com Taiwan Ireland websense.cn websense.co.uk UAE Israel websense.com websense.co.uk Web Security Gateway Websense Web Security Gateway Technical Specifications Websense Web Security Gateway can be deployed as a software or appliance-based solution. Appliance: Websense V10000 General purpose server minimum requirements: Operating System High availability Red Hat Linux v4, WCCP, External Load Balancer update 5* or Windows Server 2003/ Proxy Support Server 2008† Transparent, Explicit CPU: 2 x Dual-core 2.8GHz processors SSL Memory Full SSL proxy with integrated 4GB RAM certificate management Hard Disk Drive Authentication Two physical disks: Active Directory, LDAP, RADIUS, Novell, – 100GB for OS and application and NTLM v2 temporary data, 100GB for cache* – 100GB (recommended RAID 1)† * For Websense Content Gateway and/or Websense Web Filter/Web Security v7 Network interfaces † For Websense Web Filter/Web Security Two x 10/100/1000 Ethernet interfaces v7 and/or reporting For more information, visit www.websense.com/evaluations. © 2009 Websense, Inc. All rights reserved. Websense is a registered trademark of Websense, Inc. in the United States and certain international markets. Websense has numerous other registered and unregistered trademarks in the United States and internationally. All other trademarks are the property of their respective owners. 04.28.09