Stop advanced targeted attacks, identify high risk users and control Insider Threats

Stop APT and other Advanced Targeted Threats

The Websense ACE (Advanced Classification Engine) is at the heart of all TRITON solutions and identifies malicious lures, exploit kits, emerging threats, botnet communications and other advanced threat activity across the Kill Chain. This enables TRITON AP-EMAIL to identify the early stages of an attack. With its powerful malware assessment capabilities that include a fully-integrated, file behavioral sandboxing, it can even identify Zero-day malware threats

Secure sensitive data against external attacks and Insider Threats

To prepare for a malicious Insider Threat or the potentially successful cyber-attack, it’s vital that outbound communications be monitored. This is also necessary both for data theft compliance needs as well as for business requirements. Only Websense provides the technology to stop data infiltration and exfiltration, with capabilities such as:

  • OCR (Optical Character Recognition) scanning to identify sensitive data hidden in images such as scanned documents or screen shots.
  • Encrypted file detection to recognize custom encrypted files designed to defy identification.
  • Drip DLP monitoring to identify where sensitive data is leaked in small quantities over time.

Safely adopt new technologies like Microsoft Office 365 and Box while supporting your roaming workforce

IT departments are strained to maintain current systems while supporting an increasingly mobile workforce and the demands to adopt new technologies like Microsoft Office 365. TRITON AP-EMAIL provides industry-leading capabilities that leverage systems and other information to control communications, such as preventing total access to sensitive email attachments on vulnerable mobile devices, while permitting full access on fully secured laptops. These inbound and outbound defenses are all supported on Microsoft Office 365.

Identify ‘high-risk’ user behavior and educate users to improve awareness

The rich data collections in TRITON AP-EMAIL are used by a number of policies to report and identify systems that may require special IT attention. They generate a report on a number of Indicators of Compromise to identify infected systems and more proactive reports on suspicious behavior, or even ‘disgruntled employee’ activity as potential Insider Threats. User feedback capabilities help educate employees as mistakes are made, helping them to better learn and understand safe email best practices.