Presentation is loading. Please wait.

Presentation is loading. Please wait.

Websense Web Security Gateway Product Overview. Agenda  About Websense  The Changing Security Landscape  The ThreatSeeker Network  Web Security Products.

Similar presentations


Presentation on theme: "Websense Web Security Gateway Product Overview. Agenda  About Websense  The Changing Security Landscape  The ThreatSeeker Network  Web Security Products."— Presentation transcript:

1 Websense Web Security Gateway Product Overview

2 Agenda  About Websense  The Changing Security Landscape  The ThreatSeeker Network  Web Security Products Overview  Takeaways 2

3 3 About Websense Leading Provider of Web, Messaging and Data Security Solutions Annual Billings: $356m + Employees: 1,250 43 million subscription seats 5,000 value-add resellers, worldwide Award-winning partner program Global development with ~5 sites Global security research with >80 dedicated content researchers Global support and services “Today’s enterprises require a more holistic and integrated approach for Internet security—a Web security ecosystem—to combat emerging threats from the Internet… Websense is the worldwide leading vendor in the Web Security market.” -Brian Burke, Program Director Security Products, IDC “Today’s enterprises require a more holistic and integrated approach for Internet security—a Web security ecosystem—to combat emerging threats from the Internet… Websense is the worldwide leading vendor in the Web Security market.” -Brian Burke, Program Director Security Products, IDC

4 Websense Integrated Solutions

5 The Changing Security Landscape

6 Desktop of Yesterday Local applications and data Network applications and data Basic Web Applications Static Websites

7 Desktop of Today Local applications and data Network applications and data       Corporate Webmail       Instant Messaging       Hosted Applications Blogs       Local Weather             Hosted Security Email Security YouTube Videos             Networking User Generated Applications Hosted Security Hosted Applications and Data User Generated Content Web-Based Mashup

8 Today’s Webscape 8 Top 100 sites Next 1 million sitesNext 100 million sites THE DYNAMIC WEB Constantly changing content Millions of varied pages per site Legitimate sites compromised Legacy security systems obsolete Requires real-time content analysis THE KNOWN WEB Current events, regional, genre sites Less user-generated content Reputation, URL databases fairly effective THE UNKNOWN WEB Junk, personal, scam, adult, etc. Million of new sites appear daily Reputation and URL databases can’t keep up Requires real-time categorization and real-time security scanning Web Traffic 77 percent of Web sites with malicious code are legitimate sites that have been compromised

9 The Truth About Web 2.0  The Web is changing dramatically affecting how people work, communicate, and collaborate – End-users and business units increasingly demand access to Web 2.0 tools and applications – Many organizations now view Web 2.0 as “mission critical”  Lack of visibility and policy control over Web 2.0 – Legacy security controls don’t protect against new threats – IT cannot safely support new business initiatives – Monolithic ON/OFF policies for the most widely used and dynamic sites are rarely satisfactory  User-generated content multiplies chances of data loss – Data leaks on the web are irreversible, and can rapidly spread to enormous proportions 9

10 Web Security Gateway

11 WEBSENSE CONFIDENTIAL Websense Web Security Gateway 11

12 WEBSENSE CONFIDENTIAL Websense Web Security Gateway  Websense Web Security Gateway allows you to:  Take advantage of Web 2.0 technologies –Improve productivity/collaboration –Foster closer customer relationships –Optimize business processes –Improve employee satisfaction  And do it securely –Implement effective policy control over user generated content –Control dynamic threats –Manage the use of unsanctioned network applications –Provide visibility and control over inbound and outbound communications 12 70 percent of the top 100 sites either hosted malicious content or contained a masked redirect

13 WEBSENSE CONFIDENTIAL Effective Control of Dynamic Content  Control “personalized content” such as iGoogle –Content only visible once user logs in –Multiple sources/categories of data on a single web page  Websense can securely enable benefits of Web 2.0 –Allow appropriate content, block unwanted or malicious content 13

14 WEBSENSE CONFIDENTIAL Dynamic threat protection  Threats designed to evade anti-virus detection –Active scripts, obfuscated code –Converged threats –Social Engineering  ThreatSeeker prevents zero-day and dynamic threats –Dynamic threat identification and protection –Integrated anti-virus protection (available in v7.1) 14 JavaScript Active X Executable Files Applets Code analyzed – malicious intent blocked Active X Executable Files Applets

15 WEBSENSE CONFIDENTIAL Advanced Protocol Control  Huge growth in development and use of network protocols for applications –IM, P2P etc can be implemented using SSL to create invisibility –Growing security concern for inbound and outbound communications  Websense Web Security Gateway can control over 130 network protocols –Prevent threats from entering the network –Prevent confidential data from leaving your business –Preserve bandwidth for business critical applications 15

16 WEBSENSE CONFIDENTIAL Visibility into all traffic  Volume of SSL traffic has rapidly increased –Rising adoption by web-applications –Can circumvent defined policy by making content “invisible” –Used by proxy avoidance sites  Complete visibility helps eliminates “blind spots” –Control over inbound and outbound content –Integration with Data Security Module enables inbound and outbound control over content 16

17 WEBSENSE CONFIDENTIAL Integrated Web Proxy and Cache  Built on carrier-class proxy and cache platform –Enables visibility and management over web and SSL encrypted traffic –Decrease latency for Internet downloads –Increase performance  Consolidate existing web proxy deployments and projects –Save time, money, space and resources 17

18 WEBSENSE CONFIDENTIAL Control over outbound content  Limit risk of loss of revenue, regulatory penalties, lawsuits, brand reputation damage, and loss of good faith  Prevent confidential information from leaving your network –Analysis of all web and SSL encrypted traffic  Limit exposure to data loss through applications and spyware transmitting data out of the network –Broad control over network protocols –Allow only IT sanctioned protocols 18

19 Comprehensive Security Dashboard Fully customizable click-through reports Fully customizable click-through reports Security Stats Workflow Health check

20 Task-based Management  Common administration tasks available on all interface pages –Reduce learning curve to manage product –Save time and resources carrying out common tasks –Simplify troubleshooting without user involvement 20

21 System Health Reporting  Understand quickly any potential system issues –Get details of problem –See potential solutions  Save time and resources while maximizing system uptime and reducing issues 21

22 Flexible Policy Controls  Granular web policy creation –95 URL categories –Control to block, allow, confirm and use quota  Implement policy for groups and individuals –Integration with authentication services –Allows detailed policy and actionable reporting

23 World Class Reporting  Fully integrated management and reporting interface –55 built in reports –Drill-down reporting direct from the dashboard  Granular reporting –Build reports based on over 1200 elements –Create actionable reports to the group, of even individual user level –A wide choice of report output options to suit your needs including html and pdf with bar and pie chart options  Generate customized reports quickly and easily –View customized reporting directly from the main dashboard view –No external scripting or Command Line Interface access required 23

24 World Class Reporting 24 Integrated management and reporting interface Integrated management and reporting interface Numerous options for report output Numerous options for report output Drill-down reporting direct from dashboard Drill-down reporting direct from dashboard

25 WEBSENSE CONFIDENTIAL Web Security Gateway deployment 25 SSL Websense Security Labs ThreatSeeker ® TECHNOLOGY WEBSENSE Web Security Gateway Dynamic Content Control Dynamic Threat Protection ThreatSeeker ® TECHNOLOGY SSLSSL Web Security v7 Data Security Module 39 percent of malicious Web attacks included data- stealing code Threat Updates Analytic Updates

26 Web Security Gateway deployment 26 SSL Threat Updates Websense Security Labs ThreatSeeker ® TECHNOLOGY Data Security Module ThreatSeeker ® TECHNOLOGY WEBSENSE Web Security Gateway Analytic Updates

27 Introducing the Websense V10000 The world’s best Web Security Gateway

28 Enterprise & ISP grade proxy cache Passive traffic control Hardened & Secure Services Market leading price/performance Platform architecture for EIP Enterprise & ISP grade proxy cache Passive traffic control Hardened & Secure Services Market leading price/performance Platform architecture for EIP High Performance Networking & Extensible Platform

29 Web Security & URL Filtering Unique real-time content classification for Web 2.0 Market leading URL database Integrated anti-virus Advanced Web-Centric analytics for known and unknown threats Unique real-time content classification for Web 2.0 Market leading URL database Integrated anti-virus Advanced Web-Centric analytics for known and unknown threats

30 High Performance Networking & Extensible Platform Web Security & URL Filtering Application Control Monitor & Control 130+ protocols Automated updates for emerging and updated apps Control IM, P2P, etc. risks Monitor & Control 130+ protocols Automated updates for emerging and updated apps Control IM, P2P, etc. risks

31 High Performance Networking & Extensible Platform Web Security & URL Filtering Application Control Industries most robust policy management capabilities Unique scalable & distributed architecture Multi-admin control domains Industries most robust policy management capabilities Unique scalable & distributed architecture Multi-admin control domains Enterprise Class Policy Management

32 V10000 Appliance Management GUI Simplicity and Optimization Through Virtualization

33 Resource Monitoring  Clear visibility into resource management –CPU, memory, network bandwidth, disk usage  Easily see any potential issues  Enable pre-emptive resolution 33

34 Enhanced Business Continuity  Ensure easy roll-back and remediation –Minimize system downtime in the event of a configuration error –Simplified recovery procedure 34

35 Scalability & Centralized Management  Easily enable configuration push to multiple V10000 appliances –Reduce time and effort to scale solution –Integrated centralized management 35

36 Management integration (Roadmap) Websense Hosted Web Security Websense Web Security Architecture 36 SSL Threat Updates Websense Security Labs Data Security Module ThreatSeeker ® TECHNOLOGY WEBSENSE Web Security Gateway Analytic Updates ThreatSeeker ® TECHNOLOGY

37 Websense V10000 Appliance  Performance numbers  Technical stats 37

38 V10000 Benefits In addition to the security benefits of WSG, V10000 offers:  Lower Total Cost of Ownership –Consolidate hardware requirements –Save resources for space, power and maintenance –3 year hardware warranty included  Increased Security –Hardened operating system  Simplified deployment and management –V10000 is pre-installed with all software –Elimination of OS patching/upgrades –All software upgrades managed by Websense –Ability to stop/start/restart application modules quickly & easily  High-Performance Architecture –Designed to be scalable, flexible and extensible 38

39 What would you do? 39

40 iGoogle – Websense View 40

41 What about this? 41

42 iGoogle – Websense View 42

43 How Competitors Deal with Web 2.0  Backwards-looking technology  Decisions on entire sites based on past reputation – not content  Web 2.0 sites content are considered all “good” or all “bad” –Facebook = BAD, block all pages –Wikipedia = GOOD, allow unrestricted access  Simplistic, non-granular policies can lead to over-blocking and frustration YES NO MAYBE WEBSITES IN THIS MIRROR ARE MORE DANGEROUS THAN THEY APPEAR ? ? ? ? ? ? ? ?

44 How Websense Deals with Web 2.0  Inline, real-time classification of all content, at any level within a site.  Comprehensive Web 2.0 malware protection –Dynamic threats, malicious scripts, infected Web objects, browser-based applications  Granular policy controls based on actual content – not past reputation  Enables organizations to allow access to large Web 2.0 sites without allow unwanted content or malware YES MAYBE YES NO YES MAYBE NO YES

45 The ThreatSeeker Network

46 46 Websense Security Labs and ThreatSeeker  Websense Security Lab updates –Provides automatic updates to WSG databases and rules –Defends against “zero-day” attacks –Updates provide links to additional threat / category details  Recognized leader in security research –Discovers and investigates Internet threats 24*7 –Publishes findings to the security community –Global operations (Americas, EMEA, APAC)  First to Market with –Phishing protection –Drive-by and backchannel spyware protection –Bot network protection –Crimeware/keylogger protection  First and most effective protection against –Storm attacks, ‘Italian Job’, Dept of Justice trojan –Super Bowl site Compromise + malicious code distribution –Samsung, Microsoft, Google compromise + malicious code distributio n

47 URL & Security Database Expanding the ThreatSeeker Network Websense Security Labs ThreatSeeker ® TECHNOLOGY ThreatSeeker ® TECHNOLOGY Threat detection / probes Shared analytics / feedback Real-time security updates Websense Hosted Security ThreatSeeker ® TECHNOLOGY WEBSENSE Web Security Gateway WEBSENSE Web Security Gateway Websense Customers Websense Hosted Customers 40+ million sites per hour 40+ million sites per hour 10+ million emails per hour 1 billion pieces of content per day Web 2.0 Sensor

48 48 Web 2.0 Effectiveness #1 Revolutionary performance  Websense dominates the test focused on blocking threats and categorizing dynamic content on Web 2.0 sites like BlogSpot, WordPress and other Web 2.0 sites  Most competitors simply block all access to these categories of sites or rely on Web Reputation systems that are ineffective for popular sites that contain a wide range of content  Secure Computing (now McAfee) finishes a distant second, well ahead of the rest of the pack

49 49 Key Take-Aways  Websense makes Web 2.0 work –Other vendors take blunt ON/OFF approach –Websense is unique in categorizing all content and malware in dynamic sites  We provide better, unified security –Unrivaled expertise in proactively finding threats –We don’t rely on collection of OEM components  Integrated inbound and outbound protection –Protecting your Essential Information requires contextual knowledge –No other vendors can build comprehensive policies around WHO, WHAT, WHERE, HOW  Websense is the clear market leader –By far the largest market share in Web security –Technology leadership in DLP –Comprehensive set of products covering Web, data, and messaging security Want a Product Demo? View online video demo Attend a weekly demo Webcast


Download ppt "Websense Web Security Gateway Product Overview. Agenda  About Websense  The Changing Security Landscape  The ThreatSeeker Network  Web Security Products."

Similar presentations


Ads by Google