2About WebsenseLeading Provider of Web, Messaging and Data Security SolutionsAnnual Billings: $356m +Employees: 1,25044 million subscription seats5,000 value-add resellers, worldwideAward-winning partner programGlobal development with ~5 sitesGlobal security research with >80 dedicated content researchersGlobal support and services“Today’s enterprises require a more holistic and integrated approach for Internet security—a Web security ecosystem—to combat emerging threats from the Internet… Websense is the worldwide leading vendor in the Web Security market.”-Brian Burke, Program Director Security Products, IDC
4Forrester Wave™: Content Security Suites, Q2 2009 “Websense alone leads the content security suite market because of its current functionality and suite-oriented product strategy.”****DO NOT ALTER SLIDE**** NOTE: Any alterations require prior approval by Forrester.Leading industry analyst firm Forrester agrees. In their recently published Content Security wave they examined companies with , web and data security solutions and ranked Websense as the clear leader.In fact Websense is the only company that is named as a leader in all three of their separately published , Web and Data security waves.The Forrester Wave is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.
5Websense core differentiator Security2+M postsper dayWebsense Hosted Customers50M real-timedata collecting systems10+M sper hourWebsense core differentiation is its broad and deep visibility into the Web. It is based on the analysis done by Websense security lab, threat seeker network, Defensio and the feedback from 35 m+ web, and DLP users.Scans more than 40 million Web sites for malicious code every hourAssigns more than 2 million domains, networks, IPs and hosts with reputation every hourScans nearly 10 million s for unwanted content and malicious code every hourUses more than 50 million real-time data collecting systems to parse one billion pieces of content dailyMines and analyzes more than 100 million Web sites with Honeyclients dailyCaptures spam, phishing or exploit campaigns with Honeypots and Spamtraps for more than 10 million unsolicited attacks dailyDynamically classifies structured and unstructured data to enforce data standards and regulations and prevent loss of sensitive data on internal endpoint systems100+M Websitesper dayURL & Security DatabaseWebsenseSecurity LabsWebsenseHosted SecurityThreat detection/ probesShared analytics/ feedbackSecurity updatesThreatSeeker®TECHNOLOGY
6Why does this matter?Websense Security Labs research enables our products to protect against the rapidly changing web threat environmentWebsense security research is focused on new threats that traditional security research methods aren’t designed forWebsense is the recognized worldwide leader in Web security researchWebsense products protect over 50,000 organizations and 50 million employees worldwideWebsense has been researching web based threats for 6+ years
8Benefits of Websense Hosted Security Stop Threats in the CloudReduce Business Costs and ComplexityNo equipment to purchase or maintainEased administrative overheadIncrease ProtectionLeading security from converged and Web 2.0 threatsPowered by the ThreatSeeker NetworkBacked by industry-leading SLAsRetain ControlFlexible customization of policies, configuration settings, quarantine management, and reporting24 x 7 AccessSo here are some of the reasons why you should consider hosted security.First, it reduces the cost and complexity of managing your security since there is no equipment or software to install, maintain, upgrade, or throw away. This reduces administrative burden so your IT staff can focus on projects with higher strategic importance to the business.Second, Websense Hosted Security provides an increased level of protection with leading protection against converged and web threats and the power of the ThreatSeeker Network. In addition, we provide contractual commitments in the form of Service Level Agreements for the level of spam and virus detection.Third, because unlike some managed services, Websense Hosted Security allows you to retain the access and control you need in managing your security.And, let me explain each of these in bit more depth…
10What is Websense Hosted Security? Web security delivered from the ‘cloud’No on-site equipmentCustomers have full policy controlQuality ensured through Service Level AgreementsRoaming Users & Remote OfficesSo, from a high level, let’s go over what exactly Hosted Security is.1. First, nothing whatsoever is installed at the customer’s site: no software, appliance, client, equipment, installation, or anything.2. Many sales people use the phrase “virtual appliance” to describe how it works, because customer still have…3. Full policy control. This isn’t managed by the reseller or by us. Customers log onto a secure web-based portal and administer the product themselves. We do have some resellers set up to administer policy, but this is not the norm.4. Another key attribute of Hosted Security is that levels of protection are backed and guaranteed through SLAs or “service level agreements,” meaning that we provide clearly defined minimum levels of virus protection, spam protection, uptime, etc., as part of the customer’s service contract.5. Finally, another part of the definition is that the filtering and takes place at Websense datacenters, which come built with failover, load-balancing, and high availability.Data CentersFilter and block web trafficHQ Internal Users
11Hosted Web Security Package Options Hosted Web Security GatewayIncludes:Inbound + OutboundReal-time scanningSecurity FilteringStandard URL FilteringHosted Web Security GatewayReal-time Virus and malware scanningBacked by 100% of known virus protection SLAAnd all functionality included in Hosted Web SecurityHosted Web Security:Leading protection and control over unwanted and malicious web contentLeverages real-time ThreatSeeker security updates for zero day detection of malicious web contentHosted Web SecurityIncludes:Security FilteringStandard URL Filtering
12Hosted Service Delivery Hosted from 8 globally distributed data centersSan Jose and Ashburn, United StatesHeathrow and Feltham, UKDusseldorf, GermanyParis, FranceHong KongSydney, AustraliaResilient processing clustersAutomatic data center allocation and fail-overDirects travelling users to nearest geographical data centerRedirects to nearest alternate in case of failurePerformanceService Level Agreements:100% protection against known viruses99.99% service availabilityNo noticeable latency: < 60ms average processing timeAccredited to ISO27001Global in 10 geographic locationsTop-tier, physically secure facilitiesInfinitely scalableMultiple power feeds & internet connectionsRedundantAutomatic failover between locationsBuilt to capacity even if one datacenter fails99.99% uptime backed by SLAISO accredited8 currently provide Hosted Web Service.Data Centers9 facilities operated by Equinix, 1 by Verizon (Feltham)24x7 onsite securityCCTVBiometric access controlFlood controlEarthquake resistantAdvanced fire suppressionRedundant powerMultiple circuitsBackups generatorsRedundant coolingMultiple, diverse high-capacity network feedsProvide “remote hands”
13Hosted Service Data Centers How it worksChained ProxyPort 8081Hosted Service Data CentersPort 8081PAC FilePAC FileWeb traffic is re-directed to nearest data centerPAC file or Chained proxy serverGeographic datacenter allocation for minimal latencyBuilt-in scalability and resilienceProxies in the data center apply filtering policyWebsense URL database with extensive security categoriesUpdated by ThreatSeeker > 300 times per dayReal-time scanning for malwareAV tools scan page content for inbound and outbound web trafficSame URL database as used by the on-premise products
14How it works Configure and report using the services portal No software installation requiredAuthentication/identification optionsTransparent identificationManual/basic authenticationSynchronize with local directoriesMS Active Directory, Novell eDirectorySmall footprint clientService scales
15Where would you use it? Where ease of deployment is key Remote sites/branch officesRoaming usersLarge distributed environmentsWhere IT shop is small or refocusingNo equipment/software maintenanceEasy to deploy new sitesWhere traffic is being backhauledSave bandwidth with local internet break-outIn conjunction with on-premise web security
16Product Tour Dashboard Filtering policy creation Content control Notification pagesReportingTools
17DashboardWeb Security and Security through one integrated management consoleEasy administration, simplified securityAlso for many small and medium-sized businesses, there is a real advantage to having a consolidated dashboard and management interface for Web and security. Often, it is the same administrator managing policy for both types of security. And sometimes by gaining visibility through Web trends, it becomes clear that policy needs to be tweaked on the side, or vice-versa. Websense Hosted Security gives you a complete picture of your security, and a single place to implement changes or do a little investigating. This provides greater ease-of-use and improves administrative efficiency, and ultimately, this results in a tangible cost savings.
18Filtering Policy Creation Define acceptable use policyGranular control with Security categoriesEnable control for groups and individual usersPolicy exceptions by user, group or time periodCreate custom categories and blacklist/whitelistsObjective:Illustrate filtering configuration interfacev7 DBSecurity categories
19Content Control Control inbound and outbound content Prevent threats from entering the networkControl what information leavesPrevent the further spread of malwarePrevent infected computers from leaking data over the web
20Notification pages Customizable content, look and feel Alternative page optionsRoaming user:Common look and feel to v7+ on-premise productAccess to HTML to customize pages, look and feel, logos etc.
21Reporting Easy to use reporting via services portal Analyse browsing behaviour and traffic volumesIdentify malware detectionsTabular and graphical presentationExport to CSV format fileSchedule account summary reports & delivery by
22Tools Assistance for Administrators and users Query page Am I using the service?Performance monitor toolcompare to direct connectContext Sensitive Help
24Deployment Scenarios PAC File Chained Proxy Stored at data centers Centrally configuredChained ProxyLocal proxy serverMinimal access to client settingsBrowser configuration settings.Best practice lock-down desktop.
25Hosted Service Data Center PAC File DistributionPoint to PAC file in connections settingsAutomatically created by the serviceManual config or MS Group Policy ObjectsRequest forReply with proxy.pac specific to the customer and policyPAC File storePAC File storePAC File storePAC FileCan host locally but manual updates.May need to explain hotel billing system scenario – add notes.Client SystemHosted Service Data Center
26Deployment Types Internet Direct Connection Chained Proxy Roaming User WebsiteWebsiteHosted Service Data Center (Proxies, policy & reporting)ClientDirect ConnectionPAC File storePAC FileWebsiteInternetHosted Service Data CenterLocalProxy ServerClientChained ProxyPAC File storeLocal configHosted Service Data CenterRoaming UserClientPAC FilePAC File storeHWS supports 3 types of clients:Office-bound (behind a NAT’d firewall or some other fixed IP address or range).Office-bound behind a chained proxy.Roaming, e.g. a laptop on a coffee shop.Data Centers in 10 locations8 are for HWSGetting Started Guide provided guidance for setting up PAC files and proxy servers
27Hybrid – Future Deployments On-Premise DeploymentsHosted ServiceData CentersLogging and PolicyRemote/BranchOfficesHosted Deployments(in-the-cloud)HeadquartersWSGRoaming UsersV10000Logging and PolicyV10000Regional OfficesRationaleThe customer wishes to augment their current Web Security Gateway solution by extending protection to:Hard to reach/manage remote sitesSites where WSG is not available or not cost effective (< approx. 500 users)Roaming users as an alternative to Remote Filter that includes AVOn-PremiseNow we are considering a Web Security Gateway deployment that happens to be using the V10000 appliance.The on-premise WSG/V10000 deployment provides policy management, reporting/log storage, Filtering/security and real-time analytics.Network agent could also be implemented as an option to cover non HTTP protocols.Regional offices may also make use of the WSG/V10000 products either by backhauling traffic to the HQ or by having a local implementation of the gateway (V10000 shown) and connecting direct to the Internet.HybridWe now ‘add-on’ a hosted WSG component for the remote offices producing a hybrid WSG solution.For those remote offices, filtering/security and real-time AV scanning will take place in the cloud at our hosted service data centers.Policy management, reporting and log storage still occur on-premise.The on-premise Manager will push policy up to the hosted service data centers and log data will be fed down to the on-premise deployment for reporting and storage.Roaming Users- The hybrid offers a hosted WSG deployment option for roaming users and an alternative to Remote Filter for roaming users (RF requires a DMZ based gateway).InternetComponentOPCloudPolicy ManagementYReporting/log storageFiltering/SecurityReal-time AnalyticsAVNote: Web Security Gateway throughoutNo mixed deploymentsComponentOPCloudPolicy ManagementYReporting/log storageFiltering/SecurityReal-time AnalyticsAVNote: Web Security Gateway throughoutNo mixed deploymentsWebsites
28The Hybrid Web Security Advantage for Distributed Enterprises Real-timeContent and Threat AnalysisCorporate NetworkV10000InternetSSLApplication ControlAnti-VirusWebsenseSAASWeb 2.0Data Loss PreventionWebsense Virtual Application PlatformHybrid – Filtering in the cloudMobile WorkersCentralized policy management and reportingBranch Office 1Branch Office 2AdvantagesExtended security coverage with no additional infrastructure or complexityReduced capital and maintenance costs28
29Hybrid On-premise and hosted deployments Benefits Target Apply most appropriate deployment to each locationHosted for roaming users and remote officesOn-premise for HQ and regional officesPolicy management and reporting on-premiseBenefitsComprehensive coverage of customer environmentSimplified deployment and managementSingle point for Reporting/Policy managementReal-time analyticsControl of non HTTP protocol controls and applicationsExtended data retentionDelegated reporting and policy adminTargetEnhance WSG implementations - Remote office/roaming userWhen Hosted is attractiveDistributed environmentDiminished IT shopFocus on core business
30Customers Financial Services Transportation - Energy Government TechnologyTelecommunicationsHospitalityManufacturingRetailAgriculture & Construction30
31Why SaaS Security from Websense? Technology Expertise:Websense is the leader in protecting customers from converged and Web 2.0 threatsBudget Savings:Investing in the Websense Essential Information Protection enables a consolidated security strategyStrategic Partnership:The Websense Essential Information Protection portfolio delivers greater value and enables you to further leverage your investment from your trusted security partnerSo in summary Websense is able to provide better security because we are able to see the big picture.Through our combined Web and intelligence we provide more effective protection against emerging threats, and the converged and web threats that are commonplace today.Our hosted security solutions offer a much lower total cost of ownership compared to on-premise alternatives saving you time and money.And you’re able to leverage your trusted relationship with Websense with a one stop shop for your web, and data security needs.
32Evaluations & Demos Request free evaluation Live and Video demos If you’d like to find out more I encourage you to sign up for a free evaluation by going toYou can also download our whitepaper on the advantages of a Hosted Security Model.32
33Resources Hosted Web Security Getting Started Guide pdf Administrators guideFrom within the hosted services portal support pageSales PortalCase studiesData sheetsCustomer facing presentation