Web, Data & Messaging Security
Web Security products allow organizations to secure Web traffic effectively while still enabling the latest Web-based tools and applications. These products analyze Web traffic in real-time, instantly categorizing new sites and dynamic content, proactively discovering security risks, and blocking dangerous malware. They also protect against spyware, malicious mobile code, phishing attacks, bots, keylogger backchannel communications from reaching host servers and other threats. They also help in filtering and controlling the content that can be viewed on a network.
Messaging Security products filter spam and viruses in the cloud, providing bandwidth and administrative resource savings. They usually reside at the gateway to provide granular outbound email protection, allowing for finely tuned policies and an optional second layer for inbound filtering.
A few benefits of using these products are listed below:
• Improved network and cost efficiency – Increase bandwidth and reduce administrative time while keeping email policy control within the network.
• Mitigate risk and realize ROI – Definitive levels of protection and visibility with drill-down, delegated policy and user-based reporting.
• Use a single trusted vendor – Consolidate Email Security through Websense and receive support from a single point of contact.
Data loss prevention is the keyword today in most organizations since it is the key to competitive advantage in today's world. Securing data from internal threats is the utmost concern today for organizations. DLP is nothing but the use of various techniques to prevent critical data from unnecessarily leaving the organization.
DLP products can be defined as:
"Products that, based on central policies, identify, monitor, and protect data at rest, in motion, and in use, through deep content analysis."
Some of the most common techniques used in these products to detect and prevent unauthorized extrusion of data are:
1. Rule bases/ Regular expressions.
2. Database fingerprinting.
3. Exact File Matching.
4. Partial Document Matching.
5. Statistical Analysis.
7. Predefined Categorization.