Submit Search
Upload
Product Innovation Award 2009
•
1 like
•
301 views
Kim Jensen
Follow
Product Innovation Award 2009 - Websense Web Security Gateway - Frost and Sullivan
Read less
Read more
Technology
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Advanced Web Security Deployment
Advanced Web Security Deployment
Cisco Canada
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)Dna
SylCotter
Wsg datasheet
Wsg datasheet
amingslip
Managing and Securing Web 2.0
Managing and Securing Web 2.0
Jason Edelstein
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
Advanced monitoring
Presentation cisco iron port web usage controls
Presentation cisco iron port web usage controls
xKinAnx
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
Dean Iacovelli
An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)
Robert Crane
Recommended
Advanced Web Security Deployment
Advanced Web Security Deployment
Cisco Canada
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)Dna
SylCotter
Wsg datasheet
Wsg datasheet
amingslip
Managing and Securing Web 2.0
Managing and Securing Web 2.0
Jason Edelstein
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
Advanced monitoring
Presentation cisco iron port web usage controls
Presentation cisco iron port web usage controls
xKinAnx
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
Dean Iacovelli
An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)
Robert Crane
How to get deeper administration insights into your tenant
How to get deeper administration insights into your tenant
Robert Crane
Topsec email security 2016
Topsec email security 2016
Nathan CAVRIL
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-Ups
Benjamin Rohé
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Dean Iacovelli
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabia
Faysal Ghauri
Cloud Security (CASB) for Slack
Cloud Security (CASB) for Slack
Sachin Yadav
Security is Hard
Security is Hard
Mike Murray
History of Content Security: Take 2 - ShareCloudSummit Houston
History of Content Security: Take 2 - ShareCloudSummit Houston
Adam Levithan
Microsoft Digital Crimes Unit
Microsoft Digital Crimes Unit
Microsoft Österreich
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
SPS Paris
Secure remote work
Secure remote work
Allessandra Negri
The 15 best cloud security practices
The 15 best cloud security practices
Cloudride LTD
Cyber Ethics: Cyber Security Services | VAPT and WAPT
Cyber Ethics: Cyber Security Services | VAPT and WAPT
SaeelRelekar
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Cisco do Brasil
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
Cloud computing present
Cloud computing present
James Sutter
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Security
inside-BigData.com
Microsoft Threat Protection
Microsoft Threat Protection
Thierry DEMAN
Cipher Cloud - Company Profile
Cipher Cloud - Company Profile
Salesforce Deutschland
Summer internship - Cybersecurity
Summer internship - Cybersecurity
AbhilashYadav14
Genes Linked To Spread Of Breast Cancer
Genes Linked To Spread Of Breast Cancer
SamanthaAnderson
Link’s Transition Planning
Link’s Transition Planning
gasanden
More Related Content
What's hot
How to get deeper administration insights into your tenant
How to get deeper administration insights into your tenant
Robert Crane
Topsec email security 2016
Topsec email security 2016
Nathan CAVRIL
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-Ups
Benjamin Rohé
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Dean Iacovelli
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabia
Faysal Ghauri
Cloud Security (CASB) for Slack
Cloud Security (CASB) for Slack
Sachin Yadav
Security is Hard
Security is Hard
Mike Murray
History of Content Security: Take 2 - ShareCloudSummit Houston
History of Content Security: Take 2 - ShareCloudSummit Houston
Adam Levithan
Microsoft Digital Crimes Unit
Microsoft Digital Crimes Unit
Microsoft Österreich
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
SPS Paris
Secure remote work
Secure remote work
Allessandra Negri
The 15 best cloud security practices
The 15 best cloud security practices
Cloudride LTD
Cyber Ethics: Cyber Security Services | VAPT and WAPT
Cyber Ethics: Cyber Security Services | VAPT and WAPT
SaeelRelekar
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Cisco do Brasil
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
Cloud computing present
Cloud computing present
James Sutter
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Security
inside-BigData.com
Microsoft Threat Protection
Microsoft Threat Protection
Thierry DEMAN
Cipher Cloud - Company Profile
Cipher Cloud - Company Profile
Salesforce Deutschland
Summer internship - Cybersecurity
Summer internship - Cybersecurity
AbhilashYadav14
What's hot
(20)
How to get deeper administration insights into your tenant
How to get deeper administration insights into your tenant
Topsec email security 2016
Topsec email security 2016
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-Ups
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabia
Cloud Security (CASB) for Slack
Cloud Security (CASB) for Slack
Security is Hard
Security is Hard
History of Content Security: Take 2 - ShareCloudSummit Houston
History of Content Security: Take 2 - ShareCloudSummit Houston
Microsoft Digital Crimes Unit
Microsoft Digital Crimes Unit
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
Secure remote work
Secure remote work
The 15 best cloud security practices
The 15 best cloud security practices
Cyber Ethics: Cyber Security Services | VAPT and WAPT
Cyber Ethics: Cyber Security Services | VAPT and WAPT
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Cloud computing present
Cloud computing present
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Security
Microsoft Threat Protection
Microsoft Threat Protection
Cipher Cloud - Company Profile
Cipher Cloud - Company Profile
Summer internship - Cybersecurity
Summer internship - Cybersecurity
Viewers also liked
Genes Linked To Spread Of Breast Cancer
Genes Linked To Spread Of Breast Cancer
SamanthaAnderson
Link’s Transition Planning
Link’s Transition Planning
gasanden
Guide to Cloud Computing (pdf) - Danish
Guide to Cloud Computing (pdf) - Danish
Kim Jensen
IT sikkerhed 2009
IT sikkerhed 2009
Kim Jensen
TLS and SSL v3 vulnerabilities
TLS and SSL v3 vulnerabilities
Kim Jensen
Collaborative Practice for Civil matters
Collaborative Practice for Civil matters
carlMichaelrossi
CreditUnionVMS
CreditUnionVMS
TriNovus LLC
Brave New World Trends That Will Change Your Life
Brave New World Trends That Will Change Your Life
Tom Barrett
Viewers also liked
(8)
Genes Linked To Spread Of Breast Cancer
Genes Linked To Spread Of Breast Cancer
Link’s Transition Planning
Link’s Transition Planning
Guide to Cloud Computing (pdf) - Danish
Guide to Cloud Computing (pdf) - Danish
IT sikkerhed 2009
IT sikkerhed 2009
TLS and SSL v3 vulnerabilities
TLS and SSL v3 vulnerabilities
Collaborative Practice for Civil matters
Collaborative Practice for Civil matters
CreditUnionVMS
CreditUnionVMS
Brave New World Trends That Will Change Your Life
Brave New World Trends That Will Change Your Life
Similar to Product Innovation Award 2009
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdf
SolviosTechnology
Web Security and Network Security
Web Security and Network Security
crussell79
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
Cloudflare
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
RedhuntLabs2
Cloud Application Security --Symantec
Cloud Application Security --Symantec
Abhishek Sood
Web Security For Enterprise
Web Security For Enterprise
digital.signage
Passmarked.com
Passmarked.com
Mark McChlery
Veracode Corporate Overview - Print
Veracode Corporate Overview - Print
Andrew Kanikuru
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
Cognizant
Research challenges and issues in web security
Research challenges and issues in web security
IAEME Publication
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
white paper
Global Market Leader Award 2009
Global Market Leader Award 2009
Kim Jensen
Clearswift f5 integration
Clearswift f5 integration
Marco Essomba
Best Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdf
Digital Auxilio Technologies
Derek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_k
Derek Mezack
Strategies for Effective Cybersecurity in Web Development pdf.pdf
Strategies for Effective Cybersecurity in Web Development pdf.pdf
LondonAtil1
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptx
SonaliG6
Symantec-CWS_Brochure
Symantec-CWS_Brochure
Justyna Majek
CYRENWebSecurity
CYRENWebSecurity
Jennifer Hinton
Mobile content generation application | Wireless Community Network Enabler#
Mobile content generation application | Wireless Community Network Enabler#
Mike Taylor
Similar to Product Innovation Award 2009
(20)
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdf
Web Security and Network Security
Web Security and Network Security
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
Cloud Application Security --Symantec
Cloud Application Security --Symantec
Web Security For Enterprise
Web Security For Enterprise
Passmarked.com
Passmarked.com
Veracode Corporate Overview - Print
Veracode Corporate Overview - Print
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
Research challenges and issues in web security
Research challenges and issues in web security
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Global Market Leader Award 2009
Global Market Leader Award 2009
Clearswift f5 integration
Clearswift f5 integration
Best Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdf
Derek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_k
Strategies for Effective Cybersecurity in Web Development pdf.pdf
Strategies for Effective Cybersecurity in Web Development pdf.pdf
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptx
Symantec-CWS_Brochure
Symantec-CWS_Brochure
CYRENWebSecurity
CYRENWebSecurity
Mobile content generation application | Wireless Community Network Enabler#
Mobile content generation application | Wireless Community Network Enabler#
More from Kim Jensen
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
Kim Jensen
OpenDNS presenter pack
OpenDNS presenter pack
Kim Jensen
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
Kim Jensen
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
Kim Jensen
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003
Kim Jensen
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
Kim Jensen
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
Kim Jensen
Websense 2013 Threat Report
Websense 2013 Threat Report
Kim Jensen
Security Survey 2013 UK
Security Survey 2013 UK
Kim Jensen
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
Kim Jensen
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012
Kim Jensen
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
Kim Jensen
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012
Kim Jensen
State of Web Q3 2011
State of Web Q3 2011
Kim Jensen
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011
Kim Jensen
Corporate Web Security
Corporate Web Security
Kim Jensen
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
Kim Jensen
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011
Kim Jensen
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
Kim Jensen
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010
Kim Jensen
More from Kim Jensen
(20)
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
OpenDNS presenter pack
OpenDNS presenter pack
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
Websense 2013 Threat Report
Websense 2013 Threat Report
Security Survey 2013 UK
Security Survey 2013 UK
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012
State of Web Q3 2011
State of Web Q3 2011
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011
Corporate Web Security
Corporate Web Security
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010
Recently uploaded
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Recently uploaded
(20)
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Product Innovation Award 2009
1.
2009 North American
Web Content Management Product Innovation of the Year Award Websense The 2009 Frost & Sullivan North American Product Innovation of the Year Award in Web Content Management goes to Websense in recognition of the company’s development of a series of innovative Web security products that include a Web filter and Web security gateway. Websense’s solutions can cope with the needs of the dynamic content of feature-rich Web sites, especially Web 2.0. They provide policy- based control over hundreds of network protocols against security threats along with bandwidth optimization to efficiently manage real-time network traffic. Company Background Headquartered in San Diego, California, Websense was founded by Phil Trubey in 1994. Incorporated with a mission to develop software to block inappropriate websites, Websense emerged as a pioneer in the domain of Web filtering. A public company since 2000, Websense is led by network security veteran Gene Hodges, who serves as the company’s chief executive officer. With more than 1,300 employees, Websense has a global presence. Considering the rapid increase in the number and severity of internet threats, Websense has established a security lab of more than 80 dedicated content researchers to constantly discover, investigate, and report such threats. Relevance in the Market Place The nature of Web content today is more dynamic than before. Web users have begun to actively use Web sites as a medium of communication, for application sharing, and content updates. Web 2.0 applications and technologies from AJAX, Flash, online storage, webmail, and SaaS services to content-sharing and online messaging technologies like Wikipedia and social networking tools such as Facebook and Twitter are increasingly being used and leveraged in the workplace. According to Websense Security Labs the top 100 Web sites are the most popular targets for attackers due to their large user base, good reputations and support of Web 2.0 applications. With malware attacks becoming major threats that compromise confidential data such as usernames and passwords, the hacker community is currently developing security © 2009 Frost & Sullivan
2.
breach tactics ranging
from phishing attacks to deploying botnets in order to acquire critical personal and corporate data from Web users. How the Technology Works Websense has developed the Websense Web Security Gateway (WSG), an integrated Web proxy and cache purpose-built for protecting organizations from malicious or inappropriate Web content and Web sites that are accessed by organizational employees. WSG allows an organization to create internet user policies by choosing a series of options such as ‘Allow,’ ‘Block,’ ‘Continue,’ ‘Quota,’ ‘Block by File Type,’ around Web site and content categories as well as network application categories such as Instant Messaging or Peer-to-Peer applications. To prevent malware and virus attacks, WSG incorporates many advanced real-time site, file, object, reputation, virus, and exploit scanning capabilities. At the same time it leverages these and additional content and protocol analysis capabilities to prevent inappropriate use of Web content and network resources that can violate HR, Acceptable Use, and legal liability policies. As an additional critical capability, the WSG can also look at the outbound data content leveraging Websense award-winning Data Loss Prevention technology, and it can enforce polices to protect sensitive and regulated data from leaving the organization based on the user, the actual data, and the destination of that data. These policies set by organizations can be created based on users or even groups as defined in the Microsoft Windows Active Directory, the Sun Java System Directory Server, RADIUS (remote authentication dial in user service), and Novell eDirectory access via Lightweight Directory Access Control. By leveraging more than 1,800 proprietary analytical engines as well as the patent- pending Websense ThreatSeeker™ Network, the Websense Web Security Gateway analyzes and classifies in real-time Web site content accessed by end users. The ThreatSeeker Network provides intelligence to address malicious content with the most up-to-date protection. Over the years Websense has made many enhancements to this system, and its acquisition of Defensio in early 2009 is a recent example. Defensio's ability to sit in social networks and provide content and blog-spam intelligence into the ThreatSeeker™ Network puts Websense ahead in detecting and protecting end users, while these new sites, links and content are simply not seen by traditional email and Web detection systems. This WSG technology also has been incorporated in the v10000 gateway appliance, which was developed to especially address Web 2.0 threats and to mitigate the risks of leveraging Web 2.0 for its obvious benefits. Websense Web security is also available © 2009 Frost & Sullivan
3.
as a Software
as a Service (SaaS) solution which provides another key deployment option and advantage. Websense Hosted Web Security is a highly scalable, zero- latency SaaS option that ensures only clean traffic reaches customer networks, thus reducing time and costs associated with administration, maintenance and support and freeing IT to focus on strategic business initiatives. Traffic is routed through globally distributed data centers and scanned in real time for malicious and inappropriate content using a combination of commercial antivirus scanning, the Websense ThreatSeeker Network, and correlated heuristics. The service utilizes a multi-tenant architecture with purpose-built high-performance proxies and is backed by industry- leading SLAs to ensure uptime and availability. Best Practices One of the important features of the Websense Web Security Gateway solution is its ability to support the rising dynamics of the Web by conducting real-time content analysis of the most frequented Web sites. Although, these popular Web sites perform daily updates to their Web pages, WSG seamlessly tracks these sites constantly across millions of individual Web pages. Due to the immense popularity of social networking sites such as Facebook and Twitter, Websense has begun offering Web security solutions directly on the client sites to enhance real-time threat protection. With its deep knowledge of the Web and real-time dynamic threat protection, Websense provides complete coverage, visibility, and control over who can send what information, where, and how, enabling corporations to keep their networks and data safe while still leveraging the benefits of Web 2.0. Websense has been awarded a total of 18 patents so far. A majority of the issued patents are in the area of Web filtering and content filtering, which include patents from filtering techniques to flexible filtering technologies. The company has approximately 100 patents in the filing process. Conclusion Frost & Sullivan is pleased to present Websense with the 2009 Award for Product Innovation of the Year in Web Content Management for its development of an advanced, innovative policy-based control Web security solution, which can cope with the dynamic needs of today’s internet communication spectrum while addressing the latest security threats. © 2009 Frost & Sullivan
4.
Award Description
The Frost & Sullivan Award for Product Innovation is presented each year to the company that has demonstrated excellence in new products and technologies within its industry. The recipient company has shown innovation by launching a broad line of emerging products and technologies. Research Methodology To choose a recipient of this Award, the analyst team tracks all new product launches, research and development spending, products in development, and new product features and modifications. This is accomplished through interviews with the market participants and extensive secondary and technology research. All new product launches and new products in development in each company are compared and evaluated based on degree of innovation and customer satisfaction. Companies are then ranked by number of new product launches and new products in development. Measurement Criteria In addition to the methodology described above, there are specific criteria used to determine final competitor rankings in this industry. The recipient of this Award has excelled based on one or more of the following criteria: Significance of new product(s) in its industry Competitive advantage of new product(s) in its industry Product innovation in terms of unique or revolutionary technology Product acceptance in the marketplace New product value-added services provided to customers Number of competitors with similar product(s). About Best Practices Frost & Sullivan Best Practices Awards recognize companies in a variety of regional and global markets for demonstrating outstanding achievement and superior performance in areas such as leadership, technological innovation, customer service, and strategic product development. Industry analysts compare market participants and measure performance through in-depth interviews, analysis, and extensive secondary research in order to identify best practices in the industry. About Frost & Sullivan Frost & Sullivan, the Growth Consulting Company, partners with clients to accelerate their growth. The company's Growth Partnership Services, Growth Consulting and Career Best Practices empower clients to create a growth focused culture that generates, evaluates and implements effective growth strategies. Frost & Sullivan employs over 45 years of experience in partnering with Global 1000 companies, emerging businesses © 2009 Frost & Sullivan and the investment community from more than 30 offices on six continents. For more information about Frost & Sullivan’s Growth Partnerships, visit http://www.frost.com. www.awards.frost.com
Download now