62*14"-$7"8*9":"-$ 51)"*%.%!607% 8*"90:)%/2.2;0<0.)% 5<24%/2.2;0<0.)% g APRIL 2009 November 2008 January 2009 ADAPTATION ISSUE EDITORS CORNER IT BUDGETING ISSUE EDITORS CORNERTHE WEBSENSE V10000 EDITORS CORNERWorms, Threats, & the Economy— Fools Rush In Toxic Toad, Crafty Crow and Cant Always Get New Years Tips to Squeeze Look on the BrightHow to Secure an Insecure World? April Fools Day has come and gone, The Wild World of Web 2.0 What You Want? More from Tight IT Budgets Side of Life and the dreaded Conficker worm has Management of IT security is ever-The Internet is arguably todays most crucial enterprise productivity tool. At the The law of unintended consequences is a powerful one, and in our modern world The global economy is in a downturn, and its no secret that companies are yet to deliver its payload. Or has it? changing, with new challenges every Its a new year, but many of thesame time, with new technologies introduced with Web 2.0, unfettered use of the of rapid communication, consequences can spread faster than ever imagined looking for ways to cut costs. According to some reports, U.S. corporate IT Security specialists around the world day. If youre having trouble keeping problems of 2008 have followed us intoInternet at work can endanger your most critical business assets—your essential before. The impact of one careless action can be swift and difficult to contain. spending will plummet as much as 20 percent in 2009. With massive layoffs in have taken up arms against the up, maybe its your approach. Try 2009. All indications are that this yearinformation. Along with that, the economy is in a shambles, leaving companies at The story of the cane toad and its introduction to Australia is a classic tale of the works and disgruntled employees on the loose, security is more important terrorizing Conficker worm. Experts something new, adapt to your will be a tough one for manyrisk from the misbehavior of disgruntled employees as well as the unintended solving one problem while unknowingly creating a passel of new ones. than ever. How can IT managers make the most out of shrinking budgets? have been skeptical but cautious surroundings. Thats the lesson companies, and tough times can bringerrors of overworked staff. Hackers are getting better and better at what they do, MORE MORE about the date of destruction offered of this months newsletter. out the worst in people. We canrelentlessly nipping at the heels of security professionals. Whats a security EMPLOYEE TRENDS BUSINESS TRENDS ECONOMIC TRENDS SECURITY TRENDS up by the Conficker worm and, as is MORE anticipate that cybercrime will increaseprofessional to do? MORE often the case, the worm did not Real Employees, Social Networking QUICK LINKS Big Get Bigger, Lousy Economy as desperate people become more activate its mighty botnet on theSECURITY TRENDS THREAT TRENDS promised trigger date of April first. Virtual Problems Around the Office PRODUCT TIP OF THE MONTH Others Go Away Increases Risk vulnerable to scams and other "too good to be true" offers. But history has Young workers entering the market Businesses are discovering ways toRelentless Botnets Crazy Economy CUSTOMER TRAINING The business world is in the midst of Did you know that significant plans to Although that date is behind us, shown that times of great challenge are are bringing social networking at boost productivity with social SUPPORT great change, with many predicting secure private information have been vigilance must be maintained as theWork While We Creating Criminals worm now resides on millions of work to a unimagined new level. networking, often beginning WEBSENSE NEWS that in the upcoming year well see an waylaid, with the culprit being the also times a great opportunity. Are you an optimist or a pessimist?Sleep A recent survey shows that e-crime computers around the world and there While some CIOs worry about internally. USA Today tells how one SUCCESS STORY increase in mergers and acquisitions lousy state of the economy? With MORE has tripled this last year, and points security, others find that educating tactic has companies clearing the like never before. But when the dust costs of cybercrime running as highResearchers recently discovered a is likely a new date already scheduled QUICK LINKSWeb site operating from a server in the finger at the recession and the for the attack. workers and changing the way they clutter of long email strings by School District settles and a new business steps in, as $4.7 billion per year, this may not Learns a Lesson resultant loss of jobs, bonuses, and secure and share data may provide creating a common forum for sharing just how secure is your sensitive be the time to cancel or delay IT PRODUCT TIP OF THE MONTHthe Ukraine, using botnets to MORE stock value. Beware that employees the secret to protecting data in the information and ideas among financial data? security projects. CUSTOMER TRAININGruthlessly suck up data from 5,000 QUICK LINKS Bellevue School District is located near who know of companys security Web 2.0 world. employees. MORE MORE SUPPORTinfected computers each day. With a PRODUCT TIP OF THE MONTH the Microsoft offices in Redmond, weaknesses may be tempted for MORE MORE LATEST NEWS WEBSENSE NEWSlousy economy and powerful Trojans CUSTOMER TRAINING Washington, and has a student reasons of retaliation or gain to take LATEST NEWSgoing for under $1000, its easy to SUPPORT population that tends to be very TOUGH TIMES BOOST INTERNET CRIME SUCCESS STORY the low road.enter the information-stealing WEBSENSE NEWS US PRESIDENTIAL MALWARE—BARACK OBAMA INTERVIEW LURE technologically savvy. The IT SECURITY PREDICTIONS FOR 2009 PODCASTbusiness these days. MORE ROLLING REVIEW: WEB 2.0 TOOLS DEMAND A CAUTIOUS APPROACH department knew they needed SCRIPT FRAGMENTATION ATTACK MAY ASSIST HACKERS Accountants Act MORE SUCCESS STORY OTTAWA BUILDS ONLINE COMMUNITY OUT OF IGLOO powerful network control to protect FINANCIAL "FIRE SALE" ECONOMY: PROTECTING DATA DURING M & A to Eradicate SpamLATEST NEWS Aussies Throw the SPAMMERS ABUSING GOOGLES WEB 2.0 SERVICES students from inappropriate material WHITE PAPERS, WEBCASTS, AND MORE Accounting firm Smith Marion & Co. and to guard against security risks. discovered employees were spending WEBSENSE LAUNCHES NEW, STATE-OF-THE-ART SECURITY APPLIANCE Wrench at Threats WHITE PAPERS, WEBCASTS, AND MORE They did their homework and Websense Security Labs Second Half 2008 Threat Report countless hours wading through risky JOIN US AT RSA WITH FREE TICKETS FROM WEBSENSE Salmat, an Australian sales tool Enabling Enterprise 2.0 Is your 2009 security plan ready for the New Year? Review the threats that and inappropriate spam —hours that discovered a Websense solution to do GLOBE AND MAIL—STEALING FROM THE HAND THAT FEEDS company, wanted to allow staff to use Learn from Charles Renert, principal researcher for Websense Security Labs, emerged in 2008, take a look forward to 2009, and receive a research report would be better spent providing the job. BBC NEWS: CRIME TO BOOM AS DOWNTURN BLOOMS Web 2.0 tools to drive business how Websense discovers, identifies, classifies and adapts to content trends on a highlighting the latest threat trends. Jan 21, 9:00 am PT. services to customers They needed a MORE DLP: AN IMPORTANT TOOL IN PROTECTING DATA DURING M & A growth without having to worry about global scale with the Websense Content Research Cortex white paper. REGISTER FOR THE WEBCAST proven security solution to stop spam increasingly dynamic and virulent READ THE WHITE PAPER and bolster security. In less than anWHITE PAPERS, WEBCASTS, AND MORE Secure Essential Data against Loss Web-based security threats. The hours time they deployed WebsenseThe Executive Guide to DLP White Paper The 2008 Email Security Report by the Aberdeen Group Can sensitive and regulated data be identified and loss prevented? Data within solution needed to provide controlled Hosted Email Security and immediately Research by the Aberdeen Group reveals that email security issues are causing companies is often stored, used and exchanged inappropriately. Find out how toRich Mogull of Securosis.com explores the business value of data loss access to Web 2.0 content to ensure reduced spam, saved time, and lost productivity for many and discusses steps for successful remediation. discover, monitor and protect your essential information.prevention, who needs it, how it works, and what are best practices for enterprise productivity at the same time. They protected employees from unsuitable REGISTER FOR THE REPORT WATCH THE VIDEOimplementation. found the solution in Websense Web images and content. READ THE WHITE PAPER Security Gateway with real-time Introduction to Websense Web Filter v7 Interface and Utilities scanning capabilities, unmatched
5>0.)%?*2#6:(% 6.4<.&+,$ !".:0#)% !"#$% =;0.:$%/2.2;0<0.)% When your essential information is protected, you get to say Yes! to a whole new business environment. Say Yes! to Websense Web 2.0 Business Protection DLP atworry? InfoSec Yes! World without boundaries? # Yes! Booth 502 without without without paralysis? Yes! drama? Yes! This copy is for placement This copy is for placement This copy is for placement This copy is for placement only, it is not meant to be only, it is not meant to be only, it is not meant to be only, it is not meant to be read. This copy is for read. This copy is for read. This copy is for read. This copy is for 8*.)%=1% placement only, it is not placement only, it is not placement only, it is not placement only, it is not meant to be read. This meant to be read. This meant to be read. This meant to be read. This copy is for placement only, copy is for placement only, copy is for placement only, copy is for placement only, it is not meant. it is not meant. it is not meant. it is not meant. Get the Essential Information Protection White Paper Find out how to stop inadvertent data loss and other threats to your business while harnessing the full potential of your employees and the Web. @.4.0%
0%)1/#&!*$2%$23%)4%5 !".,+#(% 4(1(+5$% !"#$% ",-./ 01 2-3,/ 4 Keep energy flowing Get smart about using !" # & ! $ %& %( )* )* &-5 6. $9,,7: 7/8 + ; with notification notification on campus "::9 =35 6:5- 63/79 <-:/ >>> : Energy producers, suppliers and the businesses that work closely with them have complicated Ten tips on getting the most out of your campus notification system. networks in place to manage the distribution of gas, oil, coal and electricity. They also have Colleges and universities nationwide have embraced notification to quickly communicate to campus a huge commitment to employees as well as to public safety, environmental stewardship and populations in times of crisis. It’s clear that mass notification is the fastest and most efficient way to deliver an regulatory compliance. If systems fail, the damage and associated costs can be catastrophic. important message when danger threatens, but it can also be used in many other ways. Many schools and Wise use of notification can help mitigate loss caused by unexpected interruptions. districts rely on mass notification for streamlined, day-to-day communications with students, faculty, staff and visitors, and as institutions face shrinking budgets, it makes sense to incorporate cost-effective notification for a variety of uses. Here’s how energy producers use notification to keep energy flowing: Following are ten tips on using your notification system effectively on campus: 1 Unauthorized activity or intruders – Drilling sites and power generation plants are beehives of activity, and it’s easy for unsavory types to take advantage of the level of activity and cause problems. 1 Class or building closings – When storms hit, use notification to alert of canceled classes or building Using notification you can send an alert to all personnel, no matter where they are, and get the word out, closures caused by unsafe conditions, flooded parking lots or power outages. Deliver alerts to students, staff and making it difficult for an interloper to escape without notice. faculty, no matter where they are, and direct them to alternative sites. 2 Evacuations – Use notification to alert everyone at a job site or facility of dangerous situations like 2 On-campus and off-campus alerts – When students become the target of thieves and cons, or gas leaks or chemical spills. Direct them to avoid the area of impact and even notify police and emergency are at risk of assault, use notification to direct security teams to unsafe areas of campus. Whether on campus or responders. By requesting responses, you’ll know which employees may be in danger and need help. off, alert students to travel in pairs through certain parts of town after dark, and if there is a suspicious character on the loose, notify everyone on campus to be on the lookout. 3 Customers first – If you have people in the field most of the day, keep them updated by sending important messages via voice, text, and email. The real-time alerts ensure that your representatives always 3 Unplanned staffing changes – Use notification to put out the call for qualified alternates to step in know the most important business news and answers to customers’ questions. when teachers are unable to make it to class. Using your database, target a message to just those with the proper credentials. Once a teacher responds, he or she can be connected with you quickly using the call bridge to 4 Keep execs in the loop – When the earthquake and tsunami in Japan interrupted business, many discuss details. companies used notification to alert energy executives at locations around the world and request they join immediate conference calls to prepare for potential impact to operations. 4 Faculty and student updates – When you need to get an important message to faculty quickly, but find them difficult to track down on a busy campus, use notification to alert them no matter where they are. Direct 5 Don’t leave customers in the dark – In preparation to conduct maintenance, one power company teachers to use notification to reach students as well, alerting them if a class venue has changed, reminding them uses notification as a way to alert customers of impending outages. Alerts can be sent via landline, cell, text, of approaching or shifting deadlines, special events or a change in office hours. and email to increase the likelihood of receipt; the alerts can be repeated until recipients acknowledge receipt. 5 Security team management – Use notification to alert your security team of potential incidents, 6 IT management – IT operations are essential in supporting the infrastructure and functioning of most requesting a quick location response from each guard to help you better manage a situation. Use notification energy suppliers and downtime can cause costly delays. Use notification to alert the right staff and get help when you want to avoid your message being broadcast over a loud radio that most security guards carry. quickly when IT systems lag. Is the business of healthcare slowing you down? Ten powerful ways that notification can help streamline the business of managing healthcare. Healthcare professionals are responsible for managing a lot of things, including staff, providers, patients, con- tractors, compliance issues, response teams, medications and more. When this carefully balanced system gets interrupted, communication is the key to getting things back on track. But communication is not always easy in a mobile and fast-moving hospital setting where most people spend their time on the floor helping patients rather than at desks. That’s where notification can help. Here are ways healthcare administrators can use notification for increased efficiency and productivity: 1 Epidemic or pandemic alerts – When a patient presents with a virulent infectious disease, notify providers and hospital staff to take proper precautions. Use a call bridge to alert decision-makers and invite them to join an immediate conference call to decide how to best handle the situation and how to share information with the public and press. 2 Emergency staffing – When earthquakes, hurricanes or other emergencies hit, use notification to mo- bilize staff quickly to deal with the influx of patients that comes with large-scale disasters. Use your notification system along with your database to determine which staff is on or off duty, and instantly deliver urgent messages to appropriate workers. 3 Inventory and event alerts – Use notification for interdepartmental alerts when hospital departments are in a crunch, with beds or supplies running low. Quickly deliver a request to on-duty nurses to initiate a bed count and inventory levels; responses can be tabulated in just moments. 4 Patient pre-admission and follow-up – Reduce hospital re-admissions and overall costs by using notification to assist with patient care during the critical pre-admission and outpatient stages. Deliver alerts to patients about preparations like fasting, requisite forms and pre-admission blood tests, and to share medication instructions. You can even use notification to alert them of upcoming appointments after they’ve been released. 5 Tracking service levels – Use notification to track follow-up and help meet your service level agree- ments (SLAs), making sure that patients are being adequately cared for. Sophisticated notification technology will close the loop, tracking patient requests through service desks, housekeeping, nursing staff, and back to patients, noting timeliness of response and completion of service.
3#&%56#A&%!#)95 !"#$% )+<*5.% SALES BATTLE CARD Gartner MQ for EMNS Partner Profile MIR3 The News How to Use the Report Press Release What is Intelligent Notification? Markets SHANGHAI, ATLANTA, Jan. 08, 2011 — CDC Intelligent Notification™ is an important message CRISIS MANAGEMENT Software Corporation (NASDAQ: CDCS), a hy- delivery platform that lets you notify the people Business continuity and disaster recovery (BC/ brid enterprise software provider of on-premise you need to, when you need to, on the commu- DR) planning are a critical part of modern busi- and cloud deployments, today announced that nication devices they choose, and get meaning- ness procedures. Today, virtually every company it has signed a reciprocal original equipment ful responses quickly. requires business continuity planning and manufacturer (OEM) agreement with MIR3, Inc., employee accountability to mitigate risk and a developer of real-time Intelligent Notifica- WHAT YOU NEED TO KNOW ABOUT ensure the safety of their staff. tion software. Under this OEM agreement, it MIR3 INTELLIGENT NOTIFICATION: is expected that both companies will offer an When interruptions threaten to take business Can notify individuals or groups in any order end-to-end monitoring, alert/notification and offline, Intelligent Notification provides a solution Works when email and phones are down for organizations of any size to share information resolution solution, in on-premise, software-as- Reaches staff when away from desks, and mobilize teams quickly, keeping business on a-service (SaaS) or hybrid deployments, to mar- travelling or out of office track and systems running. kets that include IT service management (ITSM), crisis management and supply-chain operations Elicits response from those receiving focused on healthcare, finance, energy, govern- notifications IT SERVICE MANAGEMENT ment, retail, logistics, and manufacturing. Allows multiple ways to respond to IT teams are responsible for keeping business What the Report Says notifications processes and technology running around the Has enhanced support for BlackBerry PIN-to- clock. When systems fail or problems linger, PIN time is wasted and money is lost. This OEM partnership is expected to open up Monitors and tracks activity with real-time and new markets for CDC Software in the ITSM and archived reports Intelligent Notification helps keep systems work- crisis management sectors, and help to expand Ensures continuity of communication with a ing smoothly by making it easy to quickly alert CDC Software’s footprint in the government fault-tolerant infrastructure the staff that can fix problems to keep your busi- sector, especially in state and local municipalities. ness on track. Can deliver notifications to email, SMS, SMTP, phone, cell, fax, pager, TTY SUPPLY CHAIN MANAGEMENT Supply chain logistics requires a seamless Why MIR3 products are best integration between production, planning and MIR3 OVERVIEW sourcing. Reputation – Many of the global FORTUNE Talking Points MIR3 is the premiere SALES BATTLE CARD provider of Intelligent Notification and response software. MIR3 100 are customers; more than 5,000 installations worldwide MIR3 Enterprise Service Bus Intelligent Notification helps by providing a means for any supply chain operation to share mission-critical information along the value chain, What it Means to Customers solutions help organizations deliver important Reliability – More than ten years of proven messages to groups from a few to hundreds MIR3 ESB? What is of reliability Top Features reducing operational customer satisfaction. is it for? times and increasing costs, lowering response Who thousands on a wide variety of communication The MIR3 Enterprise phone Redundancy – Redundant global devices including email, landline, mobile Service Bus (ESB) is a runbook The MIR3 ESB is for any user of MIR3 products and SMS. infrastructure and rigorous securityon more meaningful tasks automation toolset that makes it easy to integrate their attention who wants to integrate the features of Intelligent the notification capabilities of inEnterprise, in- Notification into existing or legacy applications. TechCenter and TelAlert into existing applications The MIR3 ESB is commonly purchased and de- without custom coding, scripting or significant ployed within corporate IT departments. Response is Everything ™ data configuration professional services. CONFIDENTIAL - FOR MIR3 PARTNER USE ONLY - The MIR3 ESB allows for an easy way to integrate flow tools Why they need it? notification with major ITSM tools and other enter- prise and legacy applications allowing for two-way More companies are realizing the value of notifica- when an alert is responded to communications between applications and on-call tion software as a business tool for communicat- personnel. ing, whether during times of disruption or any time they want to reach a group of people with It has an uncomplicated point-and-click data con- an important message. However, most companies figuration for seamless implementation of escala- How does it work? are already standardized on software platforms tion rules without custom coding or scripting. The MIR3 ESB gives users a complete set of flex- that don’t include notification. Integration is often It provides a complete set of flexible, pre-defined ible, pre-defined building blocks for integrateing complicated and time-consuming, requiring lots of building blocks for intelligent workflow, rule-based notification with existing applications through intel- custom coding and complicated scripting. The MIR3 logic flow control and branching, as well as process ligent workflow, rule-based logic flow control and ESB provides an easy way for these companies toResponse is Everything ™ and workflow logic to fine-tune the interactions be- branching. Process and workflow logic allows users integrate notification, whether using inEnterprise, CONFIDENTIAL - INTERNAL USE ONLY tween applications and notification to communicate to fine-tune the interactions between systems and more effectively. notification to communicate effectively. existing applications. Discovery Questions Do you need to integrate data with—or automate information traveling in one direction. If the data or Do you add new or modify existing workflows fre- workflow from—any of your existing software sys- process flow is bi-directional, these scripts becomes quently? tems with the notification system? very difficult to develop and maintain. The MIR3 ESB drag-and-drop GUI for process flow design makes it a drag-and-drop GUI is much easier than writing easy to build and maintain process flows. subsequent questions, a case can be made to offer scripts or custom programs. the MIR3 Enterprise Service Bus (ESB). How many specific business processes (work flows) Do you have more than one person responsible for do you need to automate? integrations or do you have frequent turnover in no need to recommend the MIR3 ESB. - that job function? plexity of an integration exponentially. MIR3 ESB Do you need bidirectional updates between the inherently manages multiple data flows ensuring that existing system and the notification system? maintain for everyone but the person who originally events are timed properly and that data does not get wrote them. The MIR3 ESB standard interface makes - mixed up between different processes. all integrations and work flows maintainable by any- plications. This is fine for simple integrations with body who is trained on ESB. Response is Everything ™ CONFIDENTIAL - INTERNAL USE ONLY
!#5%32.94%5 !".,+#(% !"#$%;0*-.5% &(%)*+,-".%Customer Success: Crouse Hospital Customer Success: Drexel UniversityPatients profit when nurses use notification Drexel University learns how rapid communication can safeguard students and staff Central New York’s Crouse Hospital has found a way to fill open staffing positions quickly, freeing nurses to spend more time on patient care. Drexel University’s Department of Public Safety uses Intelligent Notification to alert the University community during emergencies and help its responders quickly manage incidents. Customer Profile: The hospital environment Once the notification system was installed, Crouse Hospital is a not-for- No matter what’s going on outside the building, Christopher pulled together a multi-depart- profit, acute-care hospital with once you walk through the doors of a hospital ment team to come up with creative ways Customer Profile: A hard lesson learned The Solution: Intelligent Notification the mission to provide the best to use the technology to streamline all sorts Drexel University, founded In the wake of the April 2007 shooting on After conducting an exhaustive evaluation the most important thing becomes patient in patient care and to promote of processes. When it was explained to the in 1891, is a private university care. When outside distractions threaten to the Virginia Tech campus that left 32 people process in cooperation with the Drexel community health. nursing staff that Intelligent Notification located in Philadelphia, PA. interfere with that care, all efforts must be dead and 25 injured, universities and colleges community, the University chose the MIR3 SM could easily send an alert to many people Drexel has several campuses Problem: focused on regaining hospital equilibrium reexamined their emergency planning and Intelligent Notification platform. on a variety of communication devices, in Philadelphia and a graduate Staffing changes with a and keeping systems humming smoothly. reaching anyone on staff no matter where response plans to improve communication studies center in Sacramento, Drexel was able to implement the emergency fluctuating patient load were they happened to be, they shared an idea CA. The school is home to nearly and keep their communities safe. Schools notification system quickly because MIR3 had cumbersome, time consuming The Problem: Managing the ratio with Hines. If they could use the notification 23,000 students plus more than realized it was necessary to implement rapid expertise in working with schools. According and increasingly inefficient. of staff to patient solution to call for substitute nurses, it could 5,000 faculty and staff. mass notification systems that could reliably to Dominic Ceccanecchio, senior associate Crouse Hospital’s 5 South Irving medical/ save them over an hour every day, and they reach their entire community on multiple Solution: Problem: VP of public safety, “MIR3 provided a lot of surgical unit employs 49 registered nurses, could get back to doing what they do best— devices to guide people out of harm’s way Using a mass notification In the wake of the 2007 shooting experience with the systems they installed 19 nursing assistants, three health unit caring for patients. After a short trial period, before incidents escalated. solution from MIR3, nurses have at Virginia Tech, Drexel sought at other universities. They brought to the coordinators and one ambulator. With an the new way of calling for substitute staff has freed administrative time become a way of life at Crouse, and patients a mass notification solution to The Problem: Alerting thousands table solutions to challenges other universi- average daily census of 39 patients and a ties had faced, shortening our own learning to spend more quality time are reaping the benefits. quickly communicate with its of people immediately bed capacity of 41, the staff care for roughly curve.” MIR3 also provided the redundancy with patients. community in case of emergency 10,500 patients annually. Nurses like the system because everyone After the Virginia Tech incident, Drexel’s to ensure public safety. Drexel required, with data replicated among Benefit: gets the message at the same time, so Department of Public Safety implemented an multiple data centers, removing the risk of a Before adopting a notification system, Patients are receiving improved everyone gets an equal opportunity to pick Solution: in-house communication system that could single point of failure. when hospital staff called in sick and more care, staffing issues are quickly up extra time. This is not only a more equi- By implementing Intelligent notify the community by email and SMS. The help was needed, a nurse would have to step table way of calling for additional help, but Notification, the University’s Equally important to Drexel was the MIR3resolved and the hospital system system was a temporary measure, however, is saving time and money. a way from patients and start dialing the satisfies union requirements as well. Department of Public Safety infrastructure, which allocates a minimum as it did not have the required speed, reli- phone, looking for substitutes. To find a can reach tens of thousands of number of telephony ports to each client, As nurse manager Laurie Fegley, RN, BSN ability and redundancy to ensure that all MIR3 Partner: substitute with all the right skills took at people in minutes by email, SMS preserving high bandwidth when multiple says, “This is a great tool for nurses because people would be reached within a certain BroadBlast, Inc., authorized least 45 minutes and sometimes as long as and voicemail. clients use the system simultaneously. when they are short staffed they don’t really timeframe without fail. Along with those reseller of leading incident two hours. That’s two hours that could be have time to make calls for additional help.” Benefit: concerns, Drexel did not want to carry the management, mass notification better spent with patients. This was critical because two other and emergency alert systems. This system allows them to focus more on Drexel students, parents, faculty burden of housing and maintaining a notifica- universities in Philadelphia—University of The solution: Intelligent Notification patient care rather than on the phone. Staff and staff have peace of mind tion system. The Department conducted an +1 (877) 363-9673 Pennsylvania and Temple University—also use As the supervisor of telecommunications for appreciate that they get to choose how they knowing that they can extensive search to find a robust solution that broadblastonline.com the MIR3 system. A regional incident could Crouse Hospital, Christopher Hines is respon- want to receive the message, with younger be notified of any urgent would meet its needs. staff members preferring text messages, result in all three universities using Intelligent sible for processing over a million calls per situation in minutes. and other staff members voice calls. The Notification at the same time to contact month along with 4,500 phones, voicemails, their communities. MIR3 demonstrated that and a conference bridge. When he had to system does both, along with email if that is indicated. Plans include making notification in such a scenario, Intelligent Notification fulfill a state mandate for an emergency available to supervisors as well. could handle the load and continue to notification system, he worked closely with his technology partner, BroadBlast Inc., and quickly got Intelligent Notification up and running. Response is Everything ™Response is Everything ™ INTELLIGENT NOTIFICATION INTELLIGENT NOTIFICATION
!"#$$%&()*+)#, !"#$% )+<*5.% Our Mission Websense is committed to supporting its ChannelConnect Partners worldwide. We are dedicated to creating new business opportunities in the security market- place and to increasing our ChannelConnect Partner’s proﬁtability. To support this commitment, Websense has designed the Websense ChannelConnect Global Partner Program as a single uniﬁed program. Team with Websense for success ChannelConnect Partner Types in the security market The Websense ChannelConnect Global Partner Program is designed to meet the needs of our various growing partner communities and address innovative routes to market as new ChannelConnect Partner types emerge. We empower “Websense ChannelConnect ChannelConnect Partners through a unique and efficient approach to business The Websense® ChannelConnect Global Partner Program was designed to grow reseller that balances proﬁtability, go-to-market strategies, and customer satisfaction. Partners are critical to our revenue in the Web security, data security, and email security markets. The ChannelConnect strategy. We are committed The enhanced Websense ChannelConnect Global Partner Program has been Partner Program provides the infrastructure, tools, resources, and support ChannelConnect expanded to address the strategic value of our six ChannelConnect Partner types. to working with our Partners need to drive security-related revenue and increase proﬁtability. This enhanced ChannelConnect PartnersWebsense ChannelConnect program also makes it easier to do business with us, identify customer opportunities, and sell and support Websense solutions. The program provides a framework that enables Authorized Training Partners are a global network of training providers ready to deliver to create unprecedented opportunities for revenueGlobal Partner Program Overview ChannelConnect Partners to create and manage opportunities through such tools as lead superior classroom training on Websense products. Their instructors are thoroughly growth and maximized distribution, deal registration, referral registration and pipeline management—all from the trained and certiﬁed to deliver superior proﬁtability.” centralized, secure ChannelConnect Partner Portal. classroom or online training on Websense products. For more information please go to David Roberts The ChannelConnect Global Partner Program is designed to nurture proﬁtable partner www.websense.com/watp. SVP, Americas sales and channel Websense, Inc. relationships based on seven guiding principals: Systems Integrator Partners are global service delivery partners focused on security integration and support delivery to customers in the enterprise market. They support various lines of business with a signiﬁcant services practice worldwide. Managed Service Provider Partners are service delivery focused partners that provide cost-effective managed security solutions to end-users. They can help customers to focus on their core business goals by providing additional security expertise and resources. Solution Provider Partners are sales oriented and technically sophisticated channel resellers that offer value-added security expertise when positioning and selling Websense solutions and services. For more information, please go to websense.com/partner. Service Provider Partners are consulting partners with the skills to deliver services that support the Websense solutions they sell. Authorized Websense Service Providers provide implementation and integration services based on Websense service offerings and best practices. This is currently a pilot program. Technology Alliance Partners are security and networking technology provid- ers that enable easy deployment, interoperability and/or integration of Websense solutions in enterprise environments. These relationships are based on speciﬁc conditions that might include product integration requirements, innovative solution creation, or business development.
="42%>#>%) !".,+#(% !"#$%;0*-.5% &(%)*+,-".%
B#2#3"%%25 !".,+#(% !"#$%;0*-.5% &(%)*+,-".% Websense Express Hosted Web Security Messaging Security Websense Websense Websense Express Hosted Web Security Email Security Unmanaged Internet access presents many challenges to organizations that rely Today’s Internet threats are more invasive and abundant than ever before, and the Websense® is known for safeguarding the Web with best-in-class Web security. on the Web for day-to-day business. Even seemingly harmless Internet use opens nature of attacks is constantly changing. In fact, according to Websense® Security Now, the same research and intelligence that made Websense a recognized leader the door to productivity loss and threat exposure. While large organizations may Labs, over 60 percent of the top 100 sites have either hosted malicious content or in Web security forms the backbone of powerful email security. “Of all the Web content- have access to expensive, sophisticated security solutions, smaller organizations “One of the best things contained a masked redirect to an illegitimate site. “We chose Websense may not have the budgets or staffing required to protect against these threats. Today’s Web and email threats are more invasive and abundant than ever with The most popular sites are becoming Web 2.0 enabled, bypassing legacy securityﬁltering solutions I’ve ever about Websense is its Email Security because of attack volumes surging to new heights. Threats are also becoming more complex, systems. Websense Hosted Web Security understands the dynamic nature of the and converging with over 85 percent of unwanted emails now containing a evaluated, this could be Websense® Express delivers the industry’s most respected content ﬁltering and continued investment in new Web, enabling businesses to build enforceable usage policies without having its phenomenal granular Internet security solution optimized for mid-sized and smaller organizations. URL link.* to block these new revolutionary tools. the easiest to install and Simple and affordable, it protects against the dangers of unmanaged Internet access. innovative security. policy enforcement At the same time, preventing loss of conﬁdential information is one of the top As a result, Websense Hosted Web Security lets customers take full advantage conﬁgure with easy to I honestly can’t imagine of the power of Web 2.0 technology without sacriﬁcing security, productivity, capabilities that clearly challenges that many businesses face and managing data leaks via email is of How Is Websense Express Different? eminent concern. Insufficient outbound protection can result in legal liability, understand reports. Any what our security posture or control. The hosted security model provides reduced business costs and outshine other solutions Websense Express is engineered to meet the and Web security needs of mid-sized and damage to a company’s reputation, and violation of compliance regulations. complexity with centralized management for remote employees and distributedsmall to medium business needs of small to mid-sized organizations who smaller organizations. would be like if we office locations. With Websense Hosted Web Security, customers gain mission- on the market.” require a content ﬁltering and Web security Reduces added expenditures by leveraging Websense provides best-in-class Web 2.0 intelligence that is essential to email would do well to choose solution that works out-of-the-box, requires no your existing Windows® investment didn’t have products critical security while enabling a consolidated security strategy with the trusted security in the current complex threat landscape. With Websense Email Security specialized training, and delivers real value quickly. and expertise. leader in Essential Information Protection™. Jay Wessel Websense Express.” backed by the Websense customers are ensured leading protection from converged email and Web 2.0 Websense Express delivers enterprise-level Fast VP of technology threats, with security powered by the intelligence of the ThreatSeeker™ Network. functionality, optimized for the needs of mid-sized and smaller organizations. ThreatSeeker Network, How It Works Boston Celtics The software-based solution allows for sophisticated policy controls and reporting Matthew Sarrel productivity and bandwidth draining Internet Simple which is the best set of Acting as a proxy, Websense Hosted Web Security highest degree of security, privacy, and to manage outbound compliance and acceptable-use risk. With Websense Email use and Web-based threats. proactively discovers and blocks Internet threats conﬁdentiality, and is backed by industry-leading Security organizations receive powerful protection against complex inbound and into one solution that improves employee the software is set-up within 30 minutes. security categorization and helps enforce employee Internet usage with no need to deploy on-premise equipment. It’s SLAs to ensure uptime and availability. outbound threats while enabling a consolidated security strategy with the trusted productivity and protects against complex “Getting Started” tutorial helps administrators Websense Hosted Web Security works hand-in- and detection technologies easy to deploy for organizations of all sizes, and hand with Websense Hosted Email Security to leader in Essential Information Protection™. Internet threats. create customized policies quickly uses Websense global data centers, which are provide integrated email and Web protection, one-box management and reporting in a Easy we have seen available load-balanced, highly available clusters positioned in 10 locations worldwide. The hosted service is enabling organizations to optimize email use and Websense Email Security enables customers to: single server. to safely use Web 2.0 technology. Intuitive real-time monitoring shows on the market.” certiﬁed to ISO 27001 standards, providing the Increase protection with leading security from converged email and Web 2.0 database updates; requires little maintenance Internet usage and system status on one or updating. threats, backed by the power of the Websense ThreatSeeker Network dashboard screen. Beth Cannon Websense Hosted Web Security enables customers to: Enforce outbound compliance and data loss protection with granular drill down capabilities for easy and effective Affordable Chief security officer and highly accurate content ﬁltering to help organizations achieve better analysis of employee Internet use. Reduce business costs and complexity with no on-site equipment to install Integrates with Active Directory and NT Thomas Weisel Partners corporate governance for itself within 30 days with productivity domains for easy policy creation and or maintain, eased administrative overhead, and built-in scalability, enabling Gain visibility through powerful reporting that includes a customizable improvements alone. organizational reporting. Web gateway consolidation dashboard to monitor email usage, interactive drill-down reports, and are ill-designed to address the productivity Increase protection with the Websense ThreatSeeker Network™ and to safely automatic report scheduling and delivery leverage the power of Web 2.0 technology Beyond Simple, Affordable, Fast, and Easy Retain control with 24x7 access and ﬂexible customization of policies, How It Works Websense Express enables mid-sized and smaller organizations to efficiently and conﬁguration settings, and reporting Websense Email Security provides unparalleled real-time data collecting systems that effectively protect their users from productivity and Internet security risks by protection by means of the ThreatSeeker continuously monitor Internet content—including proactively blocking access to inappropriate content and security threats before Network—the technology foundation for new and dynamic content—for emerging threats. they have a chance to infect their systems. Websense Express helps organizations Websense Web, data, and email security solutions. That intelligence is fed into Websense Web The ThreatSeeker Network provides the security, messaging security, and data loss create a safe computing environment, enabling employees to productively use intelligence that underlies Essential Information prevention solutions. As a result, Websense is able the Internet without exposure to risks which are typically missed or too costly Protection by delivering real-time reputation to adapt to the rapidly changing Internet at to prevent using traditional security technologies such as antivirus and intrusion analysis, expanded behavioral analysis, and actual speeds not possible by traditional security prevention systems. data identiﬁcation. solutions and basic email ﬁltering solutions. The Websense ThreatSeeker Network adaptive Beneﬁts Better email security comes from security technology uses more than 50 million Websense Express helps improve Delivers “Instant Value” seeing the big picture. Websense employee productivity and Email Security provides the best protects organizations from organization is performing, the level of Internet activity, and where risks protection from today’s converged Web-based threats. exist—such as security threats and bandwidth usage. Web and email threats. Optimizes User Productivity and IT Resources Ensures employees work in an environment that is conducive for business. Websense Hosted Web Security provides centralized Web malware protection and Increases employee productivity and reduces IT staff diversions by granular Web ﬁltering. proactively managing Internet use and its associated risks. * Websense Security Labs Threat Report, July 2008 Security Solutions for Higher Education Mission Critical Support Web Security Websense Websense Websense case study: Kronos Security for Higher Education Mission Critical Support Security Labs Software Provider Makes Balance Academic Freedom with Security Websense® Security Labs discovers, investigates, and reports on advanced Internet Open Internet Workplace Safe In support of the First Amendment, students, staff, and faculty need to be able to exchange information safely, both inside and outside of the university’s network Your business is complex. You need to know that you are protected from zero-day threats that traditional security research methods miss. Recognized as a world leader in security research, Websense Security Labs publishes ﬁndings to hundreds and over email, IM, or the Web. Websense® is used by thousands of universities and threats and malicious or accidental data loss. And you need to be conﬁdent that of security partners, vendors, media outlets, the military, and other organizations research facilities worldwide to protect against malicious threats, inappropriate With Websense Mission Websense discovers, Overview you have the support processes in place to prevent downtime when issues arise to around the world 24 hours a day, 7 days a week. With a team of global threat email or Web usage, and to secure student, faculty, alumni, and other conﬁdential Critical Support, you are keep your business operational. Websense® Mission Critical Support, our highest identiﬁes, classiﬁes, and Kronos is a global provider of human capital management solutions. The experts and operations in the Americas, Europe, Middle East, Africa and Asia information against theft or unauthorized use. Websense solutions provide company delivers software and services that enable organizations to manage level of security protection, provides unlimited support and Essential Information Paciﬁc, Websense Security Labs provides continuous monitoring of all Internet education providers and research facilities with a secure environment that guaranteed our fastest adapts to content trends their workforce, reduce costs, increase productivity, and improve employee satis- Protection™ for your mission critical systems and is designed to minimize threats including Internet-borne threats, stemming from Web, email, instant promotes academic freedom and the safe exchange of information. faction. Its staff of 4,500 people worldwide serves customers in more than path to resolving production outages and ensure seamless version upgrades. With access to senior on a global scale to messaging, and peer-to-peer ﬁle-sharing. 60 countries. engineers that understand your environment, you always receive proactive and Proﬁle Challenges Facing Universities and Research Facilities your most pressing protect customers and expedited support to keep your business running, around the clock. Research facilities and universities require an open environment that promotes the Websense Security Labs Firsts Global provider of human capital support issues. their essential information. management solutions that enable The Problem “We needed a solution collaboration of information and ideas. With mobile students, laptops, and Web 2.0 Pioneer in Emerging Threat Protection Developed Patent-Pending Websense ThreatSeeker Network organizations to manage their Employee access to the Internet is essential to Kronos’ business, but potential devices, administrators need to enforce the same policies and level of protection First to Market Websense Mission Critical Support combines workforces better security issues, increasing bandwidth demands on its network, and employee that offered us more for users whether they are outside or inside of the organization’s network. Failure all the beneﬁts of Premium Support with a who is focused on your business - Phishing protection First to pioneer Web attack identiﬁcation with to mitigate inbound threats, like spam and malware, as well as prevent outbound - Drive-by and backchannel - Web classiﬁcation and security intelligence Customer community includes tens productivity were concerns. ﬂexible and granular superior level of technical response Proactive, personalized service spyware protection - First to develop HoneyJax, the next phase of leaks of student, faculty, or research information can jeopardize student privacy, coordinated by a highly proactive Technical of thousands of organizations across - Bot network protection Web security intelligence which ﬁnds security control over how the funding for research grants, and donations that are critical to ensuring success. Account Manager (TAM). You need Websense attacks launched within Web 2.0 applications many industries technical issues by senior technical - Crimeware/keylogger protection Known for its open culture, Kronos wanted employees to have access to new Web Mission Critical Support to protect your - Real-time adaptive ability to respond to threats support engineers. More than 4,500 employees with 2.0 technologies and the Internet, but couldn’t risk exposing itself to Web-based students and staff use essential information and maximize your in a Web 2.0 world security threats such as spyware, malware, and phishing scams. Additionally, the Manage Security Risks While Enabling Educators Websense investment. customers in more than 60 countries the computing facilities, Unlimited 24x7 support from our centers of For more than 12 years, Websense has been dedicated to researching Web-based company recognized the need to ensure a safe and appropriate work environ- University IT administrators must learn universities must ratchet up their ability What You Receive: technical excellence around the world. Industry ment for employees. which we recognize how to counter threats to their networks to stay ahead of the students they are threats. Unlike other research labs, Websense has an unparalleled visibility and Technology from increasingly computer-savvy teaching. Unlike traditional security or discovery of malware and where it resides on the Web. This allows Websense as a valuable students. Threats include the basic URL ﬁltering solutions, the to enable organizations to protect their essential information from theft, Websense Solution “While limiting access to inappropriate sites like gambling and pornography Dedicated, Personalized Service was important to us, it was not our chief concern,” said Doug Tamasanis, chief learning resource.” introduction of viruses into university Websense ThreatSeeker™ Network compromise, or inappropriate use, wherever it resides—in an email, on the Web or Websense Web Filter networks, improper use of ﬁle sharing provides unparalleled visibility into the A TAM is assigned to your account and works closely with your organization along even an application. information technology architect and director, Networks and Security at Kronos. services, outright theft of university state of content on the Internet to with other senior technical support engineers to ensure maximum performance, “Our primary goal in adopting a Web security solution was to limit our exposure Mark Hill records, or abuse of personal data that protect universities and research reliability, and availability of your Websense solutions. With personalized service, “Our primary goal in to Web-based security vulnerabilities by making sure employees couldn’t Head of IT can be reused in online transactions. As facilities against emerging threats. your TAM takes the time to understand your complex environment to help you accidentally visit infected Web sites hosting malicious code.” Weston College risks become more sophisticated, mitigate security risks, resolve issues quickly, and minimize downtime for your adopting a Web security mission critical systems. solution was to limit our Tamasanis wanted to strike the right balance between protecting from security exposure to Web-based threats and still allowing Internet access for employees’ business activities. Control Costs without Sacriﬁcing Security Strategic Account Planning Providers must balance providing Web and email access with the need to With Websense Mission Critical Support you receive architecture reviews, security vulnerabilities.” prevent inappropriate use of these services to reduce risk, as well as preserve migration planning assistance, training recommendations, and periodic account The Solution network bandwidth for educational activities. MP3s, streaming video, and social reviews to track progress, measure results, and identify any issues that could Doug Tamasanis Kronos turned to its trusted information technology (IT) security solution networking sites require a great deal of bandwidth and can seriously affect the improve the support of your Websense solution(s). This hands-on and ongoing provider, Networks Unlimited to ﬁnd the answer. The longtime Websense® network’s speed and performance. Websense solutions allow administrators to communication helps ensure continued protection throughout your network and Chief Information Technology reseller helped Kronos select and implement Websense Web Filter. customize security policies and to allow ﬂexible use of Web, email, and IM without help you to maximize the power of integrated Web, messaging, and data security Websense ThreatSeeker Network Architect and Director, compromising access to enriching information. solutions. Websense has built the necessary The Websense ThreatSeeker™ Network is fundamentally different than any security Networks and Security discovery and classiﬁcation system on the market today, offering an alternative tools, data, and infrastructure Universities and Research Facilities Rely on Websense Working closely with your staff, your TAM will into a web of interconnected to outdated signature-based anti-virus systems and costly intrusion prevention Weston College relies on Websense to protect student records and guard conduct an architecture review of your environment to identify your unique technologies known as the Content systems that can’t adapt to the rapidly changing Internet. The ThreatSeeker against Internet threats. Websense enables Weston College to apply detailed support requirements and provide speciﬁc recommendations to optimize the Research Cortex. More than 100 Network includes more than 50 million real-time data collecting systems policies to different user groups or departments rather than having to enforce a conﬁguration of your network and Websense software. researchers worldwide apply a worldwide to monitor and to classify Web, messaging, and data content—giving Challenge Solution Beneﬁts blanket policy. With access to senior engineers When it is time to upgrade, you can count on vast array of classiﬁcation Websense customers unparalleled visibility into the state of content on the Providing an open Websense Web Filter Protecting the company that understand your environment, your TAM to provide you with a migration plan and recommendation for techniques to block malicious or Internet—at no additional cost. Internet culture while from Web-based threats maintaining security even while employees Compliance Concerns Continue you always receive proactive and ensuring the migration process is seamless. unwanted data from entering the visit Web 2.0 sites for Educational institutions that receive federal funding are subject to regulations that expedited support to keep your Helping you manage your Websense software network and protect conﬁdential or The ThreatSeeker Network populates Internet security intelligence to customers work purposes protect student privacy. Universities that receive federal funding are subject to the business running around the clock. to meet your business goals is our primary objective. Your TAM will identify proprietary data from leaving. through the Websense Web, messaging, and data security products to help ensure Family Educational Rights and Privacy Act (FERPA) and must protect the privacy opportunities to provide training to your technical staff to ensure you are customers receive the most up-to-date protection from unwanted content and of student records. With the rise in student health centers, providers need to maximizing your investment with Websense. malicious threats. These advancements enable Websense to provide customers protect not only student records, but their patient ﬁles, too. The Health Insurance with improved content classiﬁcation, data identiﬁcation, and security ﬁltering Portability and Accountability Act (HIPAA) requires any organization entrusted to mitigate risks to an organization’s environment and help enable safe and productive use of the Internet.
()*9./2?<%)<4%C5 !".,+#(% !"#$%;0*-.5% 2"6+,(%/1.15+7+.(% Websense Data Security Suite Websense Data Security Websense Data Discover Solutions Websense Data Monitor Websense Web Security Websense Messaging Websense Websense Data Protect Websense Web Security Gateway Email Security Websense Solutions Websense Data Endpoint Websense Security Solutions Web Security Hosted Email Security ach Appro Websense Websense bsense ith Webse rity Data S Web Filter Hybrid Email Security e The W ecue ta ecurity “W Secu a S to Datrity Suite, weDaation. Websense ns Webse ct sensitive roduct P Express inform ca accurat ential n expense Data ks to be s zation ’s ess ely analyzing Webse nse mation lea cu Se rit Websense uring an organi any by quickly identify a loss communnetwork secure or ta Securit entional, Suite inf Da y A Best ach intSuite pre Hosted Web Security Practi ile sec s busine y inst dat on the icatio unpara imarily ctic ss un “We ch ppro iness wh n pr ed vis pra es. Each vents data loss, llenge Web S tects aga rs are se A e New Threa ce Portfoli bles bus er use contain llel e te pro ibility, or th ebsenail Secu SWebserity Optiona nse® ena wheth ing PII tal into com of the four inte manages com The cap Cha ns e urity Sui data los nse cu acciden atically Webse or mu ess os l Add-o rity Pro Data Sec autom s. source n designed to sinnicatio 2.0pro We The W cu nse grated pliance poor bu ing ritye Em t La o for s “Webse k nse policie , and co eb security abilities ofcan bsense Web ng- Networ Webse modul route (DLP) solutio de, report on ns, com ducts orcing and Visibil ity. We of es pro Network ndsca The W with optionalductsdramaticativecha ure ult the pliance Messagof its phenas acause WebseatSeeker and enf res bse Availa bsense vides data tion it for en e and auditin be ies are -on add lly be ext nat ended Thre nse W set of besteb Securit or offline . ding Data Los s Preven tual pro perty, orc and enf crypty, Webse ™ techno log ion.” nse maps data— pr data polesnses.” ta Sec se Da ocicies to urity Sui g, and the risk of to omvital Secu We as ble ThreatSeeker both rity allo ker™ pe a hoeatSee is the the lea log laboraes: bles provid busine te’s adv ws org Thrsted servic hnol- technoWebse werful, col modul y Gate offers ation, intellec ed Pre ciseID , and ena and how ing vis ss pro anced email enal ck. gr of hybri bsensean y tece Web 2.0 po Clie nse s enablin wa y Webse nse inform h our pat ent rs its use CI s. . ibility r, octoandsident, l cesses , enablin policy framew en the power anular po che email. threa d Theploymadaptivizations toion and on-prem y risks in de We e securit nt roduce harnes forcems securit g safe g and As the tomer Detectio Paul Pr icie contro s a, monito orcement pol SO, k evolvin work. provid,es also int Policy Man on the use of tect cus . Throug g busine ork inte lic Networ ent. First, 50 mill take a ise so cas well bey y g adds on- over ma ay’ ent ond ts befor than it is rapidly municate and ing business a comprehenear ager tent ing the late ion st Web pro pliance l dat SallieM ae Inc. Security We n Accura ch Vice Pre naging ss and lligent ions to ping tod e they re s mo the systems layere ftware e,tect ﬁdentia tent enf app premis ly anizat thatwcl t goe pabih messagin on-pr ernet endpoi tory com bsense Resear Throug securin emise use data collectingWebsense d appro , Webs nt sec idly Webse de while kee sive ed con robust ers con ent con cy. who and bles org ogy evenThe Int ople com way of do rap tio are urityr-generat for ns and nse proxy-based conve sites and too ha 2.0 regula discov implem bsense Data ed what go g nse® ena n vehicle vie tha early y wit ies lit securi e rea r Interne ho t ach to ense Webies we deploy tiﬁes and ThreatSeeker Gartner ansive ty ously moch an dynam sted servic h Precis the tions Messa way pe ng a new applica desktops, lapes to use solution log Securit tent ana ls. The atically ate and the We t can be eID tec where Webse nicatio s an exp log y techno outs eats and to ga l-tim tinuinside nito organ ic rea email ginging the autom ilable in securi Web 2.0 techno creati Web Sec s to cre classiﬁ Netwo commu securit he emerging thrne risks. in the izatio e block is s. sted servic servers tops and y and lysis trator are ava es tha es dat rk, We hnolog ss s require data ot into hi ail Messa t con the ne new and ty with b 2.0 urity risk ps to ho and unk protect against to ored discov le on Websense of Web and SSL urity Gateway adminis utions rated mo dul Solution a, both bsense y, com busine s threat ity r solutio em ging tha full sp ding twork The n’s ga s spam a availab Web and of We ering sec Data Sec bined with today’ t—i ec Security nclu trum threats. to pre tew and oth nted sec ased mashu bewnmonit enurity risk Web Filt traffic urity sol y-integ the Coverage on the netwo the pow pping -class ed visibil nd outbou ns on that is conten ing emerg of protec k vent da ay, followed er y Gase four, full hout network ede nown securit notkno Securit to the ta Sec . Webse urity Sui Sto best-in arallel secure tent—for ge chan wor unprec Web-b can . This s and er platfo nse Da sed of d throug rk and te acc erful grating ieves unp ound and the m s the Net tion ker ta los by ad includ t.” blocking dan It preven nse Da an ts inst 2.0 y threats. ering and at con d un p, from Web alla teway ke rm. Thi Webse compri at the urately from inb eatSee comp Web for ess s. This dition L ﬁlt e mar es: tribute By inte nse ach the end ta Sec arket.” nse Thr der co deskto mon to tion UR rmous The s allows is data dis Manag urity Sui endpoi iden- tection W ntrol. into itslex ential allows al Act th y, Webse or and gerous which Webse ations. tent com abases the eno Suite* need: ssiﬁes em easy too ent and Repo point, te monito nt. els of pro t-in-ebse lligence and inform org and applic ed con apption dat to tap . secure the ive Security malwa re. The on cus tomer and cla securin g data rs all typ securit sible lev uires bes nsefeeds this inte ging security, and a uncertain email ation. Webs aniza- Host messa modul , data ls to ana rtin user-g enerat utalications how h as rep h challenges— orc sensitive at gatew on ay to det nn e deploy Webse based er – Dis covers lyze, tra g. Centralize regard es of dat highes t pos ats Jaail threats req y Maint securit ed Em solu tions. As lands ense d Thre ged Web and em TeWessel, ch er of theme ing comprehloss preventionable to adapt to and enf nse We less of and y, th Ca isel Partners state- how. ain namic, dels, suc wit ting a comprehen , and policy es netwo rk. Usi Be b ta Discov ck, rem d manag format a on de resear ail cape The dy securi ty mo with con ﬂic rks, end -users sive dat ect ng advas We , block, or s of-the nse Da “Fifty what data, and ediate , and rep ement and rep or locatio g Blen VP of of Web beco difficu data ensive nse is Securit into on e Webse orgawho is using percent of trols that map t conver decade chnology, pow Stoppin ail users agains draws on over a tected. Through the proactto bombard ou lt, resuecially changing Inteon t atnal these ana wit h legacy urity teams ping netwo abase Thom anced heu lytics are ristics, strip ma licious -art Thr eatSee erprise . rs nizati ort on policy orting provid n. ively pro esp lt, Webse tectio rne y ts IT sec 2.0 while kee continu integra rules, sig code bef ker ana the ent Monito ons sta sed con violati es e, to n presen Webse ous upd lytics nitor – policy-ba wi ons. ting em nse are pro in real-tim anli- co d sts r netw rapidly with the by tradan exc itio Web nse Rem ates and ted with the nature ore it ent ta Mo the a with rt th Protec y. Webse tomers other ma can qu theorks.not en sible vast arr email lusively in- tial of extend ote Filt The Co ﬁne-tu global s, and ers the nse Da ts datnetwor ted b securit email cus is able, re, and imme pos ickspeeds Ev the and basic ay of co poten s Web ering ntent Ga ning to ted ThreatSee behavior det Webse Protec k (data integra class We ensure rk, We bsense , spywa emailsdiately— ly get s mo mplex house basis securit ﬁltering along teway modul e preven ect thedet ker Ne ection tect – motion) nt with ence to Netwo viruses anted co y solution reduc securitout of ha st skilled , 25%urity to thein poi with dec stop unw threa has Data Pro and y protec ryption sense provid twork , end intellig Seeker contain othmprehensiv er ing bu s. nd IT ma es inline r latest ts tha s that ect and s that sinesstion . A hoste “Web scanninghitting ou ssiﬁ threats. bsense tion to provid Threat nager discovedata sec lead with offices . e pro ﬁltering solu co t conti and mo remote and ing We cesses Webse nse y Web site d to det ng threat tectio sts, eliwork: d solution is often nue bile lap ance, adu s from of SSLntially cation of new cla iness pro s t classif then use stoppi Webs – Extend ry (data users. n. over- top to bus ution tha ation is ense ker Net minatin so attack er and URLs— Remote Filterin the pot lt, hac king, and te traffic. Built on point an at rest) tion (DLP) sol tors to discov inform malicious Hoste eatSee g comp lves these burde ned protec g extend ential many and po conten ta End . d approx e. This every d Em The Thr lexity challe tion to k t, nse Da iate and day, de ail Se equipm users and s risks of new, or oth netwunknow er typeseftcon a robust Web pro Webse and rep orting imateloss preven wing administra data ly 25 allo cious cod tain ina ppropr ect. organ tectin cu g malwa rity analy , and provid nges ent whe th of sta the only even det izatio dntheb con Webse ement ing te is rt with awarenes % . xy s, hour the net n used nse We te We tent, pro manag that con s cannot aware e ns from nag re site per zes millio attac Wepattes as preven ively ma of the outside b Securit work and ease-o and t. ten tecting users fro - urity Sui destina a nt how tion co y system proact Secu e of the ea k long b rns ns they em of emails an ensure y Gatew ta Sec lli- securit where ent- and sec f-use. ay dential , and thr s safe nse Da t, and aw rk to inte ions to ta Risk ure Inte An intu itive ma conﬁcombines m tex are en ation, mewo zat lligenc pro rity t. Avail befor erge IP d We rnet use Webse tent, con organi by the inte able e tradit ks, in b req dpoined policy fra the network and ging Da , Websense allows tent. Bolstered epth data insiza-pan’s ne protection 2in four modules tsal antivirurs l time, protec uests and any where. anytim of nagement .” powerful es con inform organ pection es vid ion wor , net rea d what anct.” domains ta Mana e Integra securit provid tio ck- ry hou dadashboard can sen es an adv on ion eve patient ted pol y with tection ss and at mill time and icy ma provid unriva e who te includ for pro busine emails opriate con offers in-d aries pre twork the Int and hos Webs , techn ting nagem es imm led manag bound inappr bsense diction Hosted An nse . es, address ernet lev ense ology effort ent, rep ediate urity Sui GAcesses tfo ine proRTNER: rm to enable naging For out a and ise, We pliance bse from We tivirus. el, be Hoste is even while red orting feedback ta Sec Devel ss l for ma ntial dat y expert proac d Em ucing , and del nse Da s to bus op ul policy pla contro conﬁde t and com management tiv legal Webs fore thr us ail errors egated Webse a policie erf an Enterprise ity and a securit conten uce ely by ense malicio eats that can adminis map dat es Strate Monito a pow gy for es vis ibil nse dat than 100 policy data, red ense Webs proce Hoste ed content and reach lead to tration gently It includ ring and provid ntent Co Webse h more ﬂexible of their Threa ssing d An everyunwant tivhour an securit saves endpoi nt. abilityFilt oved. ed wit nular and e usage s. losHosted tSeek mee every irus protec que cap combin ges. Gra ropriat t data tions e appr y breach ering/D otherwis er tec codssage thr hosted applica es. at the This uni Loss Pre. ata ort unless langua orce app preven spam Antis pam. hnolo ts again and data. and how vention, ium Supp aged in 12 s to enf s, and —includ Webs gy. ough multip or st viruses egets secure where e Prem 2008 zation ulation ense content, wid what go require Websens organi nce reg powe rful tec ing ph Hoste g, phishin le antiviru nerated who and rity prod ucts allows t complia hniqu ishing , imag d An ited spam, day s engin s, user-ge Data Secu , suppor Hoste es to uns tis e, and olic pam pro every paignstec es an : Web mashup sense liability d Conte ﬁlter PDF d All Web each exploit cam ts messa spam by us against all * desktop ges. , can co nt Fil nging y challen tream ntrol ter. The cha securit mains legal their ge. ing a types t new siness longe r Websen liability corpo comb of presen the bu ies is no se Web rate em inatio enter priva by en eb 2.0 ble by Web 2.0 these technolog of Web 2.0, Security Suite Web cy sta suring ail po n of s to W -based ndard comp licy, inc Say Ye abilities made po cking the use siness opportunit ssi of ies manage Hoste s. liance rease ment and d Encry with fed securi cap and blo bu reporting Webs ense ption . To sec eral reg ty, and red d tools dashbo As new access of the ard. client- Hoste ulatio uce nying antage b-base Webse based d Encry ure comm ns an ply de take adv st We nse Hos ption un d glo sim option. To to the late . With the saves organi ted Email encry ption is a co ications be bal a viable e access attack manag zat ing em ions time Securit . st-eff tween provid e from namic y ective partn is of dy Interne and mo rise saf and ea ers an ail sec s can t leve urity sional enterp analys bsense l. at the ney sy-to- d use alt individuals, Intuitive profes ping the ape, real-time nd in We . instantIT , security das bsense feedile still keeard and how ernati hbo landsc urity fou Websens where, ve to With We ations s and k on threats, provides activitie wh bac threat und sec Web 2.0 . e Web send wha t data plic of the user outbo Yes to Security who can and ap e policy controlsound and Gatewa wledg now say manage y com e inb . ponents trols to led kno hensiv nals can . ides con unriva compre fessio Suite prov t, and IT pro a Security conten utions, se Dat urity sol Websen Web sec The We bsense and We Messa bsense gin Hybrid g portfol Email io inc Securit ludes y which Websense combin Hos es bot ted Email Sec h a hos ted and urity, Webse on-pre nse Em mise ail Sec layered urit solution y, .