SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
web security




                               Secure Web Gateway
                               Buyer’s Guide:
                               How Websense exceeds Gartner’s recommended buying criteria

                               In August 2008, Gartner published “A Buyers Guide to Secure Web Gateways”.
                               This guide lists the most advanced features buyers should consider to help them
                               select the best solution.

                               When the buyers guide selection criteria are applied to the Websense® Web Secu-
                               rity Gateway, Websense clearly exceeds all of Gartner’s requirements and delivers
                               the most powerful solution available today.


                               Definition:
                               A secure Web gateway (SWG) is a product that filters unwanted software or malware from
                               endpoint Web/Internet traffic and enforces corporate and regulatory policy compliance.
                               SWGs generally protect employees while they surf the Internet; they do not protect Web
                               applications, which is the role of Secure Sockets Layer (SSL) virtual private networks
                               (VPNs) or application firewalls. To achieve this goal, SWGs must, at a minimum, include
                               URL filtering, as well as malicious-code detection and filtering. Leading solutions will also
                               be able to provide Web application-level controls for at least some of the more popular
  “Virus detection and         applications, including instant messaging (IM). SWGs should integrate with directories to
removal capabilities in        provide authentication and authorization, along with group- and user-level policy enforce-
                               ment. An SWG must bring together all these functions, without compromising perfor-
      SWGs are critical        mance for end users, which has been a challenge for traditional antivirus Web filtering.1
    as more and more
   malware moves to a          Websense Web Security Gateway allows organizations to secure Web traffic ef-
 Web distribution and          fectively while still enabling the latest Web-based tools and applications. Through
                               a multi-vector traffic scanning engine, Websense Web Security Gateway analyzes
       control method”         Web traffic in real-time, instantly categorizing new sites and dynamic content,
                               actively discovering security risks, and blocking dangerous malware.
      Peter Firstbrook and
            Lawrence Orans     Backed by the powerful ThreatSeeker™ Network, Websense Web Security Gateway
 Gartner: A Buyer’s Guide to   provides advanced analytics—including rules, signatures, heuristics and applica-
     Secure Web Gateways1      tion behaviors—to detect and block proxy avoidance, hacking sites, adult content,
                               botnets, keyloggers, phishing attacks, spyware, and many other types of unsafe
                               content. Websense Web Security Gateway also closes a common security gap:
                               decrypting and scanning SSL traffic before it enters the network.

                               Websense integrates these real-time capabilities with its industry-leading Web
                               security platform to provide Web filtering with over 90 URL categories, Web repu-
                               tation, management of 120 network and application protocols, instant messaging
                               attachments, Websense Web Protection Services™, and more.

                               •	 Effective protection against Web 2.0 threats – Unique insight into the dynamic
                                  nature of Web 2.0 enables organizations to securely embrace the new technology
                               •	 Clear visibility into all Web traffic – Reliable content analysis, including SSL
                                  encrypted content
                               •	 Simplified control – State-of-the-art, Web-based GUI allows you to enforce poli-
                                  cies and reduce management costs
Secure Web Gateway Buying Criteria
Manageability and scalability:                              “Reduced administration overhead is a top concern of SWG administrators.”


Gartner Key Requirements                                         Websense Solution
“A task based management GUI”                                    Industry’s only single-click access to top five admin tasks

“Home page dashboard of real-time events”                        “Today” dashboard with real-time health, load, and custom policy charts provide unique one-
                                                                 click drill-down capabilities

“Granular role-based administration”                             Delegated roles for user, policy, reporting, or configuration tasks set a new benchmark for
                                                                 scalability and ease of use

“Centralized management…in multibox deployments.”                Central dashboard for management of all deployed servers

“Native load balancing”                                          Industry’s only truly distributed architecture with proven ability to scale. Supports built-in
                                                                 load balancing and fully modular deployments to handle the largest customer


Policy Interface:               “An SWG’s policy interface should be user-friendly and intuitive for nontechnical personnel”


Gartner Key Requirements                                         Websense Solution
“Policy should be all in single page”                            Three-click graphical policy engine eliminates complexity

“An easy-to-read printable policy summary”                       Results-focused layout with no arcane technical jargon

“Reusable policy objects”                                        More than 270 objects in 54 categories and custom object support with the unique ability
                                                                 to share category objects for data loss prevention policies to deliver a truly integrated
                                                                 solution

“The ability to run reports on hit rates for each policy”        Three clicks to 54 pre-defined and custom presentation reports

“Complete audit log of policy changes”                           Secure log of policy changes: who, what, when, and where


Reporting capabilities:                      “Reporting capabilities are an important differentiator and can make a significant difference in
                                              the usability of SWG solutions”

Gartner Key Requirements                                         Websense Solution
“Dashboards should be configurable for                           Views are automatically adjusted by assigned roles
different roles”

“Good solutions will offer drill-down decorated hyper-           One-click drill down to reports appropriate to assigned role
links than enable administrators to create the detailed
historic report”

“Case management capability that can be used by                  Exclusive investigative reports with 13 categories and 18 detailed data fields in addition to
one or more investigators to collect data related to an          20 predefined templates
incident”

“It should have the ability to create custom reports…”           Simple and powerful five-step custom report wizard

“All information related to individual surfing habits is         Role-based administration provides controlled access to user data
highly sensitive and needs to be carefully protected”


URL Filtering:              “A vendor’s ability to rapidly re-categorize Web sites that have been infected with malware is an
                             important differentiator”

Gartner Key Requirements                                         Websense Solution
“An optional dynamic categorization engine that will             Real Time Content Categorization provides the industry’s first on-premise inspection and
attempt to review uncategorized sites for content”               categorization capability

“Ability to apply URL filtering policies when a laptop is        Offers both on-premise or hosted (off-network) policy enforcement for users or
“off network””                                                   remote offices

“Ability to block proxy anonymizer services…”                    Blocks 10 proxy avoidance protocols; the best in the industry

“Options to limit bandwidth for particular                       Block, allow, throttle, or set quota by protocol or URL
content types”


Malware detection:                   “Virus detection and removal capabilities in SWGs are critical as more and more malware moves to a
                                      Web distribution and control method”

Gartner Key Requirements                                         Websense Solution
“Proactive virus detection methods that do not rely              Real-time security scanning engine is the only solution that extends antivirus and
on signatures”                                                   reputation technology to provide a solution that goes beyond signatures

“Users should look for SWG devices that have proxy               Only solution integrating proxy/cache capabilities for full Web control, optimization, and
and network scanning components”                                 decryption with network scanning and blocking capabilities for scalability and coverage

“Ability to inspect traffic on all ports and protocols”          Network Agent scans and manages 125+ protocols and associated ports including controls
                                                                 for malicious traffic like bot networks or email-borne worms

“High-severity security risks should trigger                     Fully customizable alerting speeds incident resolution
administrator alerts”
Application Control:                   “Web application-level controls enable businesses to carefully manage the adoption and use of
                                        public Internet-based applications”


Gartner Key Requirements                                     Websense Solution
“The number of named applications that can be               Detects and controls more than 1.9 million applications ensuring customers complete
detected and blocked”                                       coverage

“Categorization of applications is also important”          Over 50 different application categories provide the industry’s most comprehensive and
                                                            granular capability

“P2P applications are a separate class of applications      Uses four different techniques to deliver complete P2P coverage and granular control at
that need to be blocked or monitored”                       the gateway


Delivery Model and Implementation:                               “Optimal solutions will likely offer a blend of both proxies and some type
                                                                  of network monitor”


Gartner Key Requirements                                    Websense Solution
“Hybrid solution with both on-premise and in-the-cloud      ThreatSeeker Network, the most advanced cloud based security service, is integrated with
service”                                                    local analytics

“Software for Windows, Unix, Linux”                         Supports all popular software platforms for easy integration into customer networks

““In the cloud” SaaS offerings”                             Seamlessly integrated on-premise or full SaaS hosted offering


Data Loss Protection:                    “The ability to monitor Web traffic to detect noncompliance with corporate or regulatory policy is
                                          an increasingly important concern for enterprises”


Gartner Key Requirements                                    Websense Solution
“Large predefined dictionaries and lexicons”                Fully integrates with Websense Data Security Suite, delivering a single vendor solution

“Predefined number templates”                               Delivers predefined dictionaries, lexicons, and over 600 templates for easy implementation
                                                            and quick results

““Smart” number identifiers”                                Incorporates multiple detection techniques like “Smart” identifiers and advanced
                                                            fingerprinting technologies

“The ability to search for registered data”                 Only industry solution linking destination and user awareness for visibility and control over
                                                            data events by the user and the destination URL or content category


Integration with Other Solutions:                           “May offer significant strategic benefits, by reducing management complexity,
                                                             lowering total cost of ownership and providing better protection…”


Gartner Key Requirements                                    Websense Solution
Firewalls                                                   Integrates with all leading firewalls and Web caches for maximum flexibility

Web cache

DLP solutions                                               Only vendor to offer a fully integrated solution for Web security and data loss prevention

Secure e-mail gateways                                      Advanced phishing protection integrates with any solution


Service and Support:                    “Service and support are essential concerns for SWGs as they are for any business-critical technology”


Gartner Key Requirements                                    Websense Solution
“Dedicated support resources”                               Maintains a large, highly trained support staff

“Global support footprint”                                  With a global presence, Websense support offers true follow-the-sun capabilities for
                                                            customers worldwide

“High SLAs for callback and Web responses”                  Strict SLAs are offered including one-hour response for priority-one support issues

“Support resources, including user forums, best-practices   Offers a wealth of resources to ensure customers get the most from their investment
guidance and white papers”
Websense, Inc.
San Diego, CA USA
                                        Solution Overview
tel 800 723 1166                        Websense offers more Web security offerings than anyone in the industry and is
tel 858 320 8000
www.websense.com                        the only vendor to offer both on-premise and hosted Web security solutions.
Websense UK Ltd.                        Websense Web Security analyzes and secures Web traffic in real-time, enabling
Chertsey, Surrey UK                     safe use of the latest Web 2.0 sites and tools.
tel +44 (0) 1932 796300
fax +44 (0) 1932 796601
www.websense.co.uk                      Websense Web Security Gateway adds on-premise, proxy-based content analysis
Australia            Italy              of Web and SSL traffic to the robust Websense Web Security and Websense Web
websense.com.au      websense.it        Filter platform to deliver unmatched accuracy and control.
Brazil               Japan
portuguese.          websense.jp
websense.com         Mexico             Websense delivers the industry’s only instant categorization of new sites and
Colombia             websense.com.es    dynamic content, which proactively discovers security risks and blocks dangerous
websense.com.es      PRC
France               prc.websense.com   malware more accurately than products that use AV or reputation services alone.
websense.fr          Spain
Germany              websense.com.es    Websense Web Security Gateway includes:
websense.de          Sweden
Hong Kong            websense.co.uk
websense.cn          Taiwan
                                        •	 The Active Security module: A recent independent test2 proved that Websense
India                websense.cn           successfully detected and blocked 37 percent more Web exploits and drive-by
websense.com
Ireland
                                           downloads and two and one-half times more malware infected files than the
websense.co.uk                             nearest competitor. This test confirms that a reliance on AV technology and
                                           Web reputation services alone no longer works against today’s rapidly evolving
                                           threats.
                                        •	 The Content Gateway module: Independent testing2 shows that Websense ac-
                                           curately classifies more than twice the amount of content on Web 2.0 sites than
                                           the nearest competitor.
                                        Websense Web Security Gateway seamlessly integrates with the Websense Data
                                        Security Suite to provide the industry’s only fully integrated full featured Data Loss
                                        Prevention and Web Security solution delivered and supported by a single vendor.

                                        Say Yes To Websense
                                        After 15 years of Internet experience, nobody knows the Web—and its risks—like
                                        Websense. Websense Web, data, and messaging security products work together
                                        to give customers an integrated data-centric security solution that allows
                                        organizations to safely leverage all the benefits of the Internet and Web 2.0 while
                                        protecting their most critical data assets.

                                        Websense has unprecedented visibility into the internal and external movement of
                                        information in the Web 2.0 world. As the leader in integrated Web, data, and email
                                        security, Websense protects the essential information of more than 50 thousand
                                        organizations and 42 million people around the world. Websense software and
                                        hosted security solutions help organizations block malicious code, prevent the loss
                                        of confidential information, and enforce Internet use and security policies.


                                        See the Websense Web Security Gateway in action. To register for a
                                        free evaluation or online demo, visit www.websense.com/evaluations


                                        1
                                            Gartner: “A Buyer’s Guide to Secure Web Gateways”, by Peter Firstbrook and Lawrence Orans, 15 August
                                            2008 [Gartner ID Number G00159669]
                                        2
                                            Tolly Group November 2008
                                        All statements in this report attributable to Gartner represent Websense, Inc.’s interpretation of data, research
                                        opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not
                                        been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of
                                        the date of this [presentation/report]). The opinions expressed in Gartner publications are not representations
                                        of fact, and are subject to change without notice. If clients desire Gartner to verify that quotes are accurate
                                        and comply with our Copyright and Quote Policy, Gartner provides a service that verifies quote accuracy and
                                        appropriateness. Clients wishing to take advantage of this service should contact Gartner Vendor Relations at
                                        vendor.relations@gartner.com.

                                        © 2008 Websense, Inc. All rights reserved. Websense and Websense Enterprise are registered trademarks of Websense, Inc.
                                        in the United States and certain international markets. Websense has numerous other unregistered trademarks in the United
                                        States and internationally. All other trademarks are the property of their respective owners. 11.18.08

Mais conteúdo relacionado

Mais procurados

A Tale of Software-Defined & Adaptive Security
A Tale of Software-Defined & Adaptive SecurityA Tale of Software-Defined & Adaptive Security
A Tale of Software-Defined & Adaptive SecuritySébastien Tandel
 
Security for cloud native workloads
Security for cloud native workloadsSecurity for cloud native workloads
Security for cloud native workloadsRuncy Oommen
 
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Government Technology & Services Coalition
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
Alternatives and Enhancements to CAs for a Secure Web
Alternatives and Enhancements to CAs for a Secure WebAlternatives and Enhancements to CAs for a Secure Web
Alternatives and Enhancements to CAs for a Secure WebCASCouncil
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Andris Soroka
 
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...Micro Focus
 
CSA SV Threat detection and prediction
CSA SV Threat detection and predictionCSA SV Threat detection and prediction
CSA SV Threat detection and predictionVishwas Manral
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecRobb Boyd
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloudAjay Rathi
 
#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and security#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and securityMicro Focus
 
BeyondTrust PowerBroker Privileged Access Management Platform
BeyondTrust PowerBroker Privileged Access Management PlatformBeyondTrust PowerBroker Privileged Access Management Platform
BeyondTrust PowerBroker Privileged Access Management PlatformSAYGIN SAMAN
 
How Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & AccessHow Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & AccessIvan Dwyer
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk M sharifi
 
Workshop: Threat Intelligence - Part 1
Workshop: Threat Intelligence - Part 1Workshop: Threat Intelligence - Part 1
Workshop: Threat Intelligence - Part 1Priyanka Aash
 

Mais procurados (20)

A Tale of Software-Defined & Adaptive Security
A Tale of Software-Defined & Adaptive SecurityA Tale of Software-Defined & Adaptive Security
A Tale of Software-Defined & Adaptive Security
 
Security for cloud native workloads
Security for cloud native workloadsSecurity for cloud native workloads
Security for cloud native workloads
 
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
 
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
QualysGuard InfoDay 2012 - QualysGuard Suite 7.0
QualysGuard InfoDay 2012 - QualysGuard Suite 7.0QualysGuard InfoDay 2012 - QualysGuard Suite 7.0
QualysGuard InfoDay 2012 - QualysGuard Suite 7.0
 
Alternatives and Enhancements to CAs for a Secure Web
Alternatives and Enhancements to CAs for a Secure WebAlternatives and Enhancements to CAs for a Secure Web
Alternatives and Enhancements to CAs for a Secure Web
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
 
CSA SV Threat detection and prediction
CSA SV Threat detection and predictionCSA SV Threat detection and prediction
CSA SV Threat detection and prediction
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
 
#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and security#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and security
 
BeyondTrust PowerBroker Privileged Access Management Platform
BeyondTrust PowerBroker Privileged Access Management PlatformBeyondTrust PowerBroker Privileged Access Management Platform
BeyondTrust PowerBroker Privileged Access Management Platform
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
How Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & AccessHow Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & Access
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
Workshop: Threat Intelligence - Part 1
Workshop: Threat Intelligence - Part 1Workshop: Threat Intelligence - Part 1
Workshop: Threat Intelligence - Part 1
 

Semelhante a Gartner Buyers Guide Summary

Federated Identity Architectures Integrating With The Cloud
Federated Identity Architectures   Integrating With The CloudFederated Identity Architectures   Integrating With The Cloud
Federated Identity Architectures Integrating With The Cloudrsnarayanan
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Zeeve
 
Datasheet: WebSphere DataPower Service Gateway XG45
Datasheet: WebSphere DataPower Service Gateway XG45Datasheet: WebSphere DataPower Service Gateway XG45
Datasheet: WebSphere DataPower Service Gateway XG45Sarah Duffy
 
DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513Tiffeny Price
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestAdrian Dumitrescu
 
Report Gartner Magic Quadrant For Security Web Gateway 2011 En
Report Gartner Magic Quadrant For Security Web Gateway 2011 EnReport Gartner Magic Quadrant For Security Web Gateway 2011 En
Report Gartner Magic Quadrant For Security Web Gateway 2011 EnRiccardoPelliccioli
 
Bc product overview_v2c
Bc product overview_v2cBc product overview_v2c
Bc product overview_v2cSaurav Aich
 
Wsg datasheet
Wsg datasheetWsg datasheet
Wsg datasheetamingslip
 
AlertSite Slideshow for the Booth at Web 2.0 Expo 2009
AlertSite Slideshow for the Booth at Web 2.0 Expo 2009AlertSite Slideshow for the Booth at Web 2.0 Expo 2009
AlertSite Slideshow for the Booth at Web 2.0 Expo 2009AlertSite
 
AlertSite Slideshow at Web 2.0 Expo 2009
AlertSite Slideshow at Web 2.0 Expo 2009AlertSite Slideshow at Web 2.0 Expo 2009
AlertSite Slideshow at Web 2.0 Expo 2009AlertSite
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 
EastNets Compliance Solutions
EastNets Compliance SolutionsEastNets Compliance Solutions
EastNets Compliance SolutionsEastNets
 
Trusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tipsTrusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tipsKaspersky
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
 
Brocade Software Networking Presentation at Interface 2016
Brocade Software Networking Presentation at Interface 2016Brocade Software Networking Presentation at Interface 2016
Brocade Software Networking Presentation at Interface 2016Scott Sims
 

Semelhante a Gartner Buyers Guide Summary (20)

Federated Identity Architectures Integrating With The Cloud
Federated Identity Architectures   Integrating With The CloudFederated Identity Architectures   Integrating With The Cloud
Federated Identity Architectures Integrating With The Cloud
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
 
Datasheet: WebSphere DataPower Service Gateway XG45
Datasheet: WebSphere DataPower Service Gateway XG45Datasheet: WebSphere DataPower Service Gateway XG45
Datasheet: WebSphere DataPower Service Gateway XG45
 
DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical Quest
 
Report Gartner Magic Quadrant For Security Web Gateway 2011 En
Report Gartner Magic Quadrant For Security Web Gateway 2011 EnReport Gartner Magic Quadrant For Security Web Gateway 2011 En
Report Gartner Magic Quadrant For Security Web Gateway 2011 En
 
Bc product overview_v2c
Bc product overview_v2cBc product overview_v2c
Bc product overview_v2c
 
Wsg datasheet
Wsg datasheetWsg datasheet
Wsg datasheet
 
AlertSite Slideshow for the Booth at Web 2.0 Expo 2009
AlertSite Slideshow for the Booth at Web 2.0 Expo 2009AlertSite Slideshow for the Booth at Web 2.0 Expo 2009
AlertSite Slideshow for the Booth at Web 2.0 Expo 2009
 
AlertSite Slideshow at Web 2.0 Expo 2009
AlertSite Slideshow at Web 2.0 Expo 2009AlertSite Slideshow at Web 2.0 Expo 2009
AlertSite Slideshow at Web 2.0 Expo 2009
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
EastNets Compliance Solutions
EastNets Compliance SolutionsEastNets Compliance Solutions
EastNets Compliance Solutions
 
Trusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tipsTrusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tips
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
Ixia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution BriefIxia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution Brief
 
2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
 
Segmentation on azure platform
Segmentation on azure platformSegmentation on azure platform
Segmentation on azure platform
 
G3sixty Overview
G3sixty OverviewG3sixty Overview
G3sixty Overview
 
Brocade Software Networking Presentation at Interface 2016
Brocade Software Networking Presentation at Interface 2016Brocade Software Networking Presentation at Interface 2016
Brocade Software Networking Presentation at Interface 2016
 
How to achieve a more agile and dynamic IT environment
How to achieve a more agile and dynamic IT environmentHow to achieve a more agile and dynamic IT environment
How to achieve a more agile and dynamic IT environment
 

Mais de Kim Jensen

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsKim Jensen
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter packKim Jensen
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedKim Jensen
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Kim Jensen
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003Kim Jensen
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Kim Jensen
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportKim Jensen
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat ReportKim Jensen
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UKKim Jensen
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Kim Jensen
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012Kim Jensen
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Kim Jensen
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Kim Jensen
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011Kim Jensen
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Kim Jensen
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web SecurityKim Jensen
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Kim Jensen
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011Kim Jensen
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Kim Jensen
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Kim Jensen
 

Mais de Kim Jensen (20)

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter pack
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web Security
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010
 

Último

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Gartner Buyers Guide Summary

  • 1. web security Secure Web Gateway Buyer’s Guide: How Websense exceeds Gartner’s recommended buying criteria In August 2008, Gartner published “A Buyers Guide to Secure Web Gateways”. This guide lists the most advanced features buyers should consider to help them select the best solution. When the buyers guide selection criteria are applied to the Websense® Web Secu- rity Gateway, Websense clearly exceeds all of Gartner’s requirements and delivers the most powerful solution available today. Definition: A secure Web gateway (SWG) is a product that filters unwanted software or malware from endpoint Web/Internet traffic and enforces corporate and regulatory policy compliance. SWGs generally protect employees while they surf the Internet; they do not protect Web applications, which is the role of Secure Sockets Layer (SSL) virtual private networks (VPNs) or application firewalls. To achieve this goal, SWGs must, at a minimum, include URL filtering, as well as malicious-code detection and filtering. Leading solutions will also be able to provide Web application-level controls for at least some of the more popular “Virus detection and applications, including instant messaging (IM). SWGs should integrate with directories to removal capabilities in provide authentication and authorization, along with group- and user-level policy enforce- ment. An SWG must bring together all these functions, without compromising perfor- SWGs are critical mance for end users, which has been a challenge for traditional antivirus Web filtering.1 as more and more malware moves to a Websense Web Security Gateway allows organizations to secure Web traffic ef- Web distribution and fectively while still enabling the latest Web-based tools and applications. Through a multi-vector traffic scanning engine, Websense Web Security Gateway analyzes control method” Web traffic in real-time, instantly categorizing new sites and dynamic content, actively discovering security risks, and blocking dangerous malware. Peter Firstbrook and Lawrence Orans Backed by the powerful ThreatSeeker™ Network, Websense Web Security Gateway Gartner: A Buyer’s Guide to provides advanced analytics—including rules, signatures, heuristics and applica- Secure Web Gateways1 tion behaviors—to detect and block proxy avoidance, hacking sites, adult content, botnets, keyloggers, phishing attacks, spyware, and many other types of unsafe content. Websense Web Security Gateway also closes a common security gap: decrypting and scanning SSL traffic before it enters the network. Websense integrates these real-time capabilities with its industry-leading Web security platform to provide Web filtering with over 90 URL categories, Web repu- tation, management of 120 network and application protocols, instant messaging attachments, Websense Web Protection Services™, and more. • Effective protection against Web 2.0 threats – Unique insight into the dynamic nature of Web 2.0 enables organizations to securely embrace the new technology • Clear visibility into all Web traffic – Reliable content analysis, including SSL encrypted content • Simplified control – State-of-the-art, Web-based GUI allows you to enforce poli- cies and reduce management costs
  • 2. Secure Web Gateway Buying Criteria Manageability and scalability: “Reduced administration overhead is a top concern of SWG administrators.” Gartner Key Requirements Websense Solution “A task based management GUI” Industry’s only single-click access to top five admin tasks “Home page dashboard of real-time events” “Today” dashboard with real-time health, load, and custom policy charts provide unique one- click drill-down capabilities “Granular role-based administration” Delegated roles for user, policy, reporting, or configuration tasks set a new benchmark for scalability and ease of use “Centralized management…in multibox deployments.” Central dashboard for management of all deployed servers “Native load balancing” Industry’s only truly distributed architecture with proven ability to scale. Supports built-in load balancing and fully modular deployments to handle the largest customer Policy Interface: “An SWG’s policy interface should be user-friendly and intuitive for nontechnical personnel” Gartner Key Requirements Websense Solution “Policy should be all in single page” Three-click graphical policy engine eliminates complexity “An easy-to-read printable policy summary” Results-focused layout with no arcane technical jargon “Reusable policy objects” More than 270 objects in 54 categories and custom object support with the unique ability to share category objects for data loss prevention policies to deliver a truly integrated solution “The ability to run reports on hit rates for each policy” Three clicks to 54 pre-defined and custom presentation reports “Complete audit log of policy changes” Secure log of policy changes: who, what, when, and where Reporting capabilities: “Reporting capabilities are an important differentiator and can make a significant difference in the usability of SWG solutions” Gartner Key Requirements Websense Solution “Dashboards should be configurable for Views are automatically adjusted by assigned roles different roles” “Good solutions will offer drill-down decorated hyper- One-click drill down to reports appropriate to assigned role links than enable administrators to create the detailed historic report” “Case management capability that can be used by Exclusive investigative reports with 13 categories and 18 detailed data fields in addition to one or more investigators to collect data related to an 20 predefined templates incident” “It should have the ability to create custom reports…” Simple and powerful five-step custom report wizard “All information related to individual surfing habits is Role-based administration provides controlled access to user data highly sensitive and needs to be carefully protected” URL Filtering: “A vendor’s ability to rapidly re-categorize Web sites that have been infected with malware is an important differentiator” Gartner Key Requirements Websense Solution “An optional dynamic categorization engine that will Real Time Content Categorization provides the industry’s first on-premise inspection and attempt to review uncategorized sites for content” categorization capability “Ability to apply URL filtering policies when a laptop is Offers both on-premise or hosted (off-network) policy enforcement for users or “off network”” remote offices “Ability to block proxy anonymizer services…” Blocks 10 proxy avoidance protocols; the best in the industry “Options to limit bandwidth for particular Block, allow, throttle, or set quota by protocol or URL content types” Malware detection: “Virus detection and removal capabilities in SWGs are critical as more and more malware moves to a Web distribution and control method” Gartner Key Requirements Websense Solution “Proactive virus detection methods that do not rely Real-time security scanning engine is the only solution that extends antivirus and on signatures” reputation technology to provide a solution that goes beyond signatures “Users should look for SWG devices that have proxy Only solution integrating proxy/cache capabilities for full Web control, optimization, and and network scanning components” decryption with network scanning and blocking capabilities for scalability and coverage “Ability to inspect traffic on all ports and protocols” Network Agent scans and manages 125+ protocols and associated ports including controls for malicious traffic like bot networks or email-borne worms “High-severity security risks should trigger Fully customizable alerting speeds incident resolution administrator alerts”
  • 3. Application Control: “Web application-level controls enable businesses to carefully manage the adoption and use of public Internet-based applications” Gartner Key Requirements Websense Solution “The number of named applications that can be Detects and controls more than 1.9 million applications ensuring customers complete detected and blocked” coverage “Categorization of applications is also important” Over 50 different application categories provide the industry’s most comprehensive and granular capability “P2P applications are a separate class of applications Uses four different techniques to deliver complete P2P coverage and granular control at that need to be blocked or monitored” the gateway Delivery Model and Implementation: “Optimal solutions will likely offer a blend of both proxies and some type of network monitor” Gartner Key Requirements Websense Solution “Hybrid solution with both on-premise and in-the-cloud ThreatSeeker Network, the most advanced cloud based security service, is integrated with service” local analytics “Software for Windows, Unix, Linux” Supports all popular software platforms for easy integration into customer networks ““In the cloud” SaaS offerings” Seamlessly integrated on-premise or full SaaS hosted offering Data Loss Protection: “The ability to monitor Web traffic to detect noncompliance with corporate or regulatory policy is an increasingly important concern for enterprises” Gartner Key Requirements Websense Solution “Large predefined dictionaries and lexicons” Fully integrates with Websense Data Security Suite, delivering a single vendor solution “Predefined number templates” Delivers predefined dictionaries, lexicons, and over 600 templates for easy implementation and quick results ““Smart” number identifiers” Incorporates multiple detection techniques like “Smart” identifiers and advanced fingerprinting technologies “The ability to search for registered data” Only industry solution linking destination and user awareness for visibility and control over data events by the user and the destination URL or content category Integration with Other Solutions: “May offer significant strategic benefits, by reducing management complexity, lowering total cost of ownership and providing better protection…” Gartner Key Requirements Websense Solution Firewalls Integrates with all leading firewalls and Web caches for maximum flexibility Web cache DLP solutions Only vendor to offer a fully integrated solution for Web security and data loss prevention Secure e-mail gateways Advanced phishing protection integrates with any solution Service and Support: “Service and support are essential concerns for SWGs as they are for any business-critical technology” Gartner Key Requirements Websense Solution “Dedicated support resources” Maintains a large, highly trained support staff “Global support footprint” With a global presence, Websense support offers true follow-the-sun capabilities for customers worldwide “High SLAs for callback and Web responses” Strict SLAs are offered including one-hour response for priority-one support issues “Support resources, including user forums, best-practices Offers a wealth of resources to ensure customers get the most from their investment guidance and white papers”
  • 4. Websense, Inc. San Diego, CA USA Solution Overview tel 800 723 1166 Websense offers more Web security offerings than anyone in the industry and is tel 858 320 8000 www.websense.com the only vendor to offer both on-premise and hosted Web security solutions. Websense UK Ltd. Websense Web Security analyzes and secures Web traffic in real-time, enabling Chertsey, Surrey UK safe use of the latest Web 2.0 sites and tools. tel +44 (0) 1932 796300 fax +44 (0) 1932 796601 www.websense.co.uk Websense Web Security Gateway adds on-premise, proxy-based content analysis Australia Italy of Web and SSL traffic to the robust Websense Web Security and Websense Web websense.com.au websense.it Filter platform to deliver unmatched accuracy and control. Brazil Japan portuguese. websense.jp websense.com Mexico Websense delivers the industry’s only instant categorization of new sites and Colombia websense.com.es dynamic content, which proactively discovers security risks and blocks dangerous websense.com.es PRC France prc.websense.com malware more accurately than products that use AV or reputation services alone. websense.fr Spain Germany websense.com.es Websense Web Security Gateway includes: websense.de Sweden Hong Kong websense.co.uk websense.cn Taiwan • The Active Security module: A recent independent test2 proved that Websense India websense.cn successfully detected and blocked 37 percent more Web exploits and drive-by websense.com Ireland downloads and two and one-half times more malware infected files than the websense.co.uk nearest competitor. This test confirms that a reliance on AV technology and Web reputation services alone no longer works against today’s rapidly evolving threats. • The Content Gateway module: Independent testing2 shows that Websense ac- curately classifies more than twice the amount of content on Web 2.0 sites than the nearest competitor. Websense Web Security Gateway seamlessly integrates with the Websense Data Security Suite to provide the industry’s only fully integrated full featured Data Loss Prevention and Web Security solution delivered and supported by a single vendor. Say Yes To Websense After 15 years of Internet experience, nobody knows the Web—and its risks—like Websense. Websense Web, data, and messaging security products work together to give customers an integrated data-centric security solution that allows organizations to safely leverage all the benefits of the Internet and Web 2.0 while protecting their most critical data assets. Websense has unprecedented visibility into the internal and external movement of information in the Web 2.0 world. As the leader in integrated Web, data, and email security, Websense protects the essential information of more than 50 thousand organizations and 42 million people around the world. Websense software and hosted security solutions help organizations block malicious code, prevent the loss of confidential information, and enforce Internet use and security policies. See the Websense Web Security Gateway in action. To register for a free evaluation or online demo, visit www.websense.com/evaluations 1 Gartner: “A Buyer’s Guide to Secure Web Gateways”, by Peter Firstbrook and Lawrence Orans, 15 August 2008 [Gartner ID Number G00159669] 2 Tolly Group November 2008 All statements in this report attributable to Gartner represent Websense, Inc.’s interpretation of data, research opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this [presentation/report]). The opinions expressed in Gartner publications are not representations of fact, and are subject to change without notice. If clients desire Gartner to verify that quotes are accurate and comply with our Copyright and Quote Policy, Gartner provides a service that verifies quote accuracy and appropriateness. Clients wishing to take advantage of this service should contact Gartner Vendor Relations at vendor.relations@gartner.com. © 2008 Websense, Inc. All rights reserved. Websense and Websense Enterprise are registered trademarks of Websense, Inc. in the United States and certain international markets. Websense has numerous other unregistered trademarks in the United States and internationally. All other trademarks are the property of their respective owners. 11.18.08