Websense

Displaying 1-15 of 15 results

  • White Papers // Oct 2014

    The Seven Stages of Advanced Threats

    Today's advanced threats occur in "kill chains" of up to seven stages. These attacks easily evade traditional filtering and anti-virus defences to steal your organisation’s valuable data. Advanced threats can be stopped at any stage — if you deploy the proper cybersecurity solutions. We've prepared a report to...

    Sponsored By Websense

  • White Papers // Mar 2014

    5 Essentials for Protecting Against Advanced Persistent Threats (APTS)

    Advanced persistent threats (APTs) have become a major concern for IT security professionals worldwide, and for good reason. Recent attacks have targeted a multitude of diverse companies. This paper clarifies the nature of APT risks and provides recommendations on how organizations can better protect themselves. Read more...

    Sponsored By Websense

  • White Papers // Mar 2014

    Protecting IP Data from Loss and Theft

    This white paper describes the shortest path to reaching the prevention stage of data loss and data theft incidents without bringing data flows to a grinding halt. The paper presents an expanded view of IP and outlines six steps an organization can take to deploy data security controls. Read more...

    Provided By Websense

  • White Papers // Mar 2014

    Using Anomalies in Crash Reports to Detect Unknown Threats

    One of the biggest challenges organizations face when protecting their intellectual property and other sensitive data is detecting, inspecting, and stopping attacks that are capable of bypassing their cyber defenses. This white paper examines the “risk indicators” that can be observed in the anomalous activity taking place across a network....

    Provided By Websense

  • White Papers // Aug 2011

    Advanced persistent threats: From fear to facts

    Advanced persistent threats (APT) aren't just for huge companies that are attacked and hacked - they affect all organisations. Too much marketing hype and fear, uncertainty and doubt have clouded the facts about a very real danger to organisations of all sizes. This overview will: -Explain...

    Provided By Websense

  • White Papers // Jun 2011

    Three must-haves to securing the social web

    Businesses can embrace the social web and still keep safe from the enterprise-sized risks that come with it. From Facebook to Twitter, YouTube to Flickr, these sites are valuable business tools for the modern enterprise. Take care with these top tips to protect your business while gaining social opportunity and...

    Provided By Websense

  • White Papers // May 2010

    Seven Criteria for Evaluating Security-as-a-Service (SaaS) Solutions

    The right Security-as-a-Service solution can perform reliably and effectively and deliver the flexibility and control associated with on-premise solutions ? at a significantly lower cost ? without compromising privacy and security. Whether as the sole deployment platform or part of a hybrid on-premise/ SaaS solution, SaaS helps provide a greater...

    Provided By Websense

  • White Papers // Apr 2010

    Regulatory Compliance Highlights Value of Data Security Solutions

    Amendments to the Information Technology Act, 2000, have created additional and more stringent compliance requirements relating to cyber security, highlighting more than ever the value of data security solutions. Chief information officers and heads of technology charged with promoting compliance will need to pay even greater attention to their organizations'...

    Provided By Websense

  • White Papers // Mar 2010

    Email Security 2010

    Emails are becoming a rampant means of IT threat. The number and means of email threats are increasing and therefore, they are causing a lot of worry for organizations about being complacent with their security. This paper looks at a number of researches to understand issues associated with email security....

    Provided By Websense

  • White Papers // Feb 2010

    The Cost Benefits of a Hybrid Approach to Security

    Conventionally managed application security is becoming more complicated with the increasing use of new tools like Twitter and Facebook, and it is becoming more expensive. The results are higher IT costs, more cumbersome and less timely policy management, and greater potential for violating regulatory, legal and corporate policies. By using...

    Provided By Websense

  • White Papers // Jan 2010

    Next Generation Secure Web Gateways: The Case and Criteria for Embedded Data Loss Prevention

    Web 2.0 technology has transformed the Web into a core business communication platform. Unfortunately, it's also become much easier to accidentally or intentionally disclose sensitive data. This white paper outlines the business need for Web data loss prevention (DLP), makes the case for DLP as an embedded capability within secure...

    Provided By Websense

  • White Papers // Sep 2009

    Web Security Gateway: Web 2.0 Secured and Simplified

    While the use of Web 2.0 products is exploding, its full impact on enterprise security is still not well understood. IT professionals struggle to adopt reasonable policy controls to keep their networks safe from external threats. As new forms of dynamic content such as iGoogle, video sharing sites, blogs, etc....

    Provided By Websense

  • White Papers // Sep 2009

    Websense Security Labs: State of Internet Security, Q1 - Q2, 2009

    Websense Security Labs uses the patent-pending Websense ThreatSeeker Network to discover, classify and monitor global Internet threats and trends. Featuring the world's first Internet HoneyGrid, the system uses hundreds of technologies including honeyclients, honeypots, reputation systems, machine learning and advanced grid computing systems to parse through more than one billion...

    Provided By Websense

  • Webcasts // Jul 2009

    When Reputation Is No Longer Enough

    The number of compromised, legitimate Web sites has recently surpassed the number of sites created by attackers. Attendee of this webcast will learn how to protect the business against these insidious threats.

    Provided By Websense

  • White Papers // Jun 2009

    Implementing Best Practices for Web 2.0 Security With the Websense Web Security Gateway

    The way to address Web 2.0 threats that combines the best aspects of traditional security and control techniques is with new technology designed specifically to address the dynamic, real-time nature of Web 2.0. This paper describes how the Websense Web Security Gateway enables you to quickly and effectively implement a...

    Provided By Websense

  • White Papers // Mar 2014

    5 Essentials for Protecting Against Advanced Persistent Threats (APTS)

    Advanced persistent threats (APTs) have become a major concern for IT security professionals worldwide, and for good reason. Recent attacks have targeted a multitude of diverse companies. This paper clarifies the nature of APT risks and provides recommendations on how organizations can better protect themselves. Read more...

    Sponsored By Websense

  • White Papers // Oct 2014

    The Seven Stages of Advanced Threats

    Today's advanced threats occur in "kill chains" of up to seven stages. These attacks easily evade traditional filtering and anti-virus defences to steal your organisation’s valuable data. Advanced threats can be stopped at any stage — if you deploy the proper cybersecurity solutions. We've prepared a report to...

    Sponsored By Websense

  • White Papers // Aug 2011

    Advanced persistent threats: From fear to facts

    Advanced persistent threats (APT) aren't just for huge companies that are attacked and hacked - they affect all organisations. Too much marketing hype and fear, uncertainty and doubt have clouded the facts about a very real danger to organisations of all sizes. This overview will: -Explain...

    Provided By Websense

  • White Papers // May 2010

    Seven Criteria for Evaluating Security-as-a-Service (SaaS) Solutions

    The right Security-as-a-Service solution can perform reliably and effectively and deliver the flexibility and control associated with on-premise solutions ? at a significantly lower cost ? without compromising privacy and security. Whether as the sole deployment platform or part of a hybrid on-premise/ SaaS solution, SaaS helps provide a greater...

    Provided By Websense

  • White Papers // Feb 2010

    The Cost Benefits of a Hybrid Approach to Security

    Conventionally managed application security is becoming more complicated with the increasing use of new tools like Twitter and Facebook, and it is becoming more expensive. The results are higher IT costs, more cumbersome and less timely policy management, and greater potential for violating regulatory, legal and corporate policies. By using...

    Provided By Websense

  • White Papers // Sep 2009

    Web Security Gateway: Web 2.0 Secured and Simplified

    While the use of Web 2.0 products is exploding, its full impact on enterprise security is still not well understood. IT professionals struggle to adopt reasonable policy controls to keep their networks safe from external threats. As new forms of dynamic content such as iGoogle, video sharing sites, blogs, etc....

    Provided By Websense

  • White Papers // Apr 2010

    Regulatory Compliance Highlights Value of Data Security Solutions

    Amendments to the Information Technology Act, 2000, have created additional and more stringent compliance requirements relating to cyber security, highlighting more than ever the value of data security solutions. Chief information officers and heads of technology charged with promoting compliance will need to pay even greater attention to their organizations'...

    Provided By Websense

  • White Papers // Jan 2010

    Next Generation Secure Web Gateways: The Case and Criteria for Embedded Data Loss Prevention

    Web 2.0 technology has transformed the Web into a core business communication platform. Unfortunately, it's also become much easier to accidentally or intentionally disclose sensitive data. This white paper outlines the business need for Web data loss prevention (DLP), makes the case for DLP as an embedded capability within secure...

    Provided By Websense

  • White Papers // Mar 2010

    Email Security 2010

    Emails are becoming a rampant means of IT threat. The number and means of email threats are increasing and therefore, they are causing a lot of worry for organizations about being complacent with their security. This paper looks at a number of researches to understand issues associated with email security....

    Provided By Websense

  • White Papers // Sep 2009

    Websense Security Labs: State of Internet Security, Q1 - Q2, 2009

    Websense Security Labs uses the patent-pending Websense ThreatSeeker Network to discover, classify and monitor global Internet threats and trends. Featuring the world's first Internet HoneyGrid, the system uses hundreds of technologies including honeyclients, honeypots, reputation systems, machine learning and advanced grid computing systems to parse through more than one billion...

    Provided By Websense

  • White Papers // Jun 2009

    Implementing Best Practices for Web 2.0 Security With the Websense Web Security Gateway

    The way to address Web 2.0 threats that combines the best aspects of traditional security and control techniques is with new technology designed specifically to address the dynamic, real-time nature of Web 2.0. This paper describes how the Websense Web Security Gateway enables you to quickly and effectively implement a...

    Provided By Websense

  • Webcasts // Jul 2009

    When Reputation Is No Longer Enough

    The number of compromised, legitimate Web sites has recently surpassed the number of sites created by attackers. Attendee of this webcast will learn how to protect the business against these insidious threats.

    Provided By Websense

  • White Papers // Mar 2014

    Protecting IP Data from Loss and Theft

    This white paper describes the shortest path to reaching the prevention stage of data loss and data theft incidents without bringing data flows to a grinding halt. The paper presents an expanded view of IP and outlines six steps an organization can take to deploy data security controls. Read more...

    Provided By Websense

  • White Papers // Mar 2014

    Using Anomalies in Crash Reports to Detect Unknown Threats

    One of the biggest challenges organizations face when protecting their intellectual property and other sensitive data is detecting, inspecting, and stopping attacks that are capable of bypassing their cyber defenses. This white paper examines the “risk indicators” that can be observed in the anomalous activity taking place across a network....

    Provided By Websense

  • White Papers // Jun 2011

    Three must-haves to securing the social web

    Businesses can embrace the social web and still keep safe from the enterprise-sized risks that come with it. From Facebook to Twitter, YouTube to Flickr, these sites are valuable business tools for the modern enterprise. Take care with these top tips to protect your business while gaining social opportunity and...

    Provided By Websense