How Websense works in the real world A presentation by David Rawle and John Tait.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

Central Middle School Part I Documents and Presentations.
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Using PantherFile A guide for UWM students Welcome and Navigation Welcome to Using PantherFile, a guide for UWM students. You can link directly to the.
Analysis Super User Update January 30, 2015 To dial in, use this phone number and participant code… Phone number: Participant code:
Your NEW Social Services Verification Tool
Information Services Portal Login/Logout. LOGIN PAGE Please refer to the following pages for scenarios 1, 2 and 3 Please refer to the ‘Guest User’ User.
TRAINING SOLUTIONS P R S M A R T. 2 WE PROVIDE TURNKEY TECHNICAL TRAINING SOLUTIONS Prosmart offers state of the art turnkey solutions for technical training.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Keys to Success College is as easy as A, B, C. A -- Attend Class __________________.
When You Arrive: ▪ Use a post-it-note to write down your user name and password for your Microsoft 365 Account. Master lists can be found around this room.
© 2011 Autodesk Securing AutoCAD IP in the era of WikiLeaks Presenter: Rahul Kopikar Co-Founder, Seclore Technology.
Text Your Students Presented by: DeAnna Kirchen. What students say: “ is for old people” “I never check my ” “I didn’t receive your announcement”
Small Bytes eStatements Presented By: David Henshaw– National Accounts Manager.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
Copyright © 2005, SAS Institute Inc. All rights reserved. SAS ABM Survey Kit A Sample Usage Scenario: Collecting Group Assignment Values.
CS105 Lab 1 – Introduction Section: ??? TA: ??? ??? Announcements CITES Accounts Compass Netfiles Other Administrative Information CS105 Fall
SAFETY What to be aware of and how to avoid problems. **This is not meant to make you fearful of . The goal of this discussion is to make sure.
CLASSROOM EXPECTATIONS Ms. Bain Holgate Middle School 8 th Grade Language Arts.
Exchange Online Protection. About Speaker Prabhat Nigam Microsoft MVP: Exchange Server MCSE: Messaging 2013, MCITP 2010/2007, MS Ex – Microsoft Exchange.
DSS User Group April 2013 Creating and Managing a Review Strategy.
s By Jordon walker. Sending an attachment.
Aim: How can we respond to professors when they respond to us? What if they do not respond?
Data Base Systems Some Thoughts. Ethics Guide–Nobody Said I Shouldn’t Kelly make a backup copy of his company’s database on CD and took it home and installed.
Creating a Canvas Account! Follow these simple directions to access the course materials for this year.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
Asking for Assistance conveying a tone in your writing conveying a tone in your writing.
D-Link Cloud Revolutions
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
A PC Wakes Up A STORY BY VICTOR NORMAN. Once upon a time…  a PC (we’ll call him “H”) is connected to a network and turned on. Aside: The network looks.
Upay User Guide WELCOME TO UPAY This guide is aimed to help you to use the Upay website. To launch Upay you will need to navigate to
Blackboard Help Chain for IHCS Students Vince Clark - Learning Technologist Institute of Health & Community Studies Bournemouth University R307, Royal.
Staff Induction Log On Credentials & Security Resources Web Applications / Software LanSchool Projectors / Cameras / Printing Laptops / WiFi.
How to Set Up Google analytics in Magento Step by Step If you are running your Magento e-commerce store you may have heard about Google Analytics. Google.
Use of a Peer Notetaker Accommodation If you receive “Use of a Peer Notetaker” as an accommodation this tutorial will show you how to implement that accommodation.
INFINITIVE OF PURPOSE WHY?
Anti Money Laundering Know Your Customer. Anti Money Laundering There is some very strong legislation in force in regard to Anti Money Laundering do’s.
Yahoo is the one of the topmost “internal portal” on the web that is used for  Homepage customization  Search s  Search as a World Wide Web 
Gmail is one of the finest service which is free, advertising-supported service developed by google. User can easily access gmail on the web.
Technology for Tomorrow Intro to Google Drive Part 1
Introduction to Programming
Gareth Johns IT Skills Development Advisor
Do You Want To Pass In First Attempt?
The Video About Me.
Dial +1(505) Quickly Gmail Password Recover.
Dial +1(505) Quickly Gmail Password Recovery.
Implications of Global Communications
Outlook Technical Support It’s a web based service which is being used by Millions of users and owned by Microsoft. Microsoft.
Collaboration with Google Docs
Gmail Customer Support USA Toll-Free
ShipNow Putting control of shipments in the senders hands
Welcome to CS 1010! Algorithmic Problem Solving.
PSPS Mobile APP Demo by John Haddle
Please check below to let us know whether you would like to participate in this project. Yes, see my contact info below No, thank you Name (s): ____________________________________.
Room Booking Implementation Faculty Building
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Uppingham Community College
Gareth Johns IT Skills Development Advisor
Introductions November 2018
Use of a Peer Notetaker Accommodation
Patrol Data Capture for Domestic Operations
Data Loss Prevention in Office 365
Homework Reading Machine Projects Labs
FCL – Administration Tool
Citizen Science with the Zooniverse
Comodo Dome Data Protection
Security in SharePoint and Teams with DLP, IRM, and AIP
Division of Engineering Computing Services
OSL150 – Get Hands on with Ivanti Endpoint Security
Presentation transcript:

How Websense works in the real world A presentation by David Rawle and John Tait

Agenda and Aim o The Aim o To show what Websense can do for your business with a series of real-world examples o Agenda o Web Filtering o Web 2.0 Filtering o Remote User Filtering o Reporting o DLP

This is a Live Lab Please don’t hesitate to ask if you have any questions

Question 1 o “Product vendors are all telling me we can use their products to consolidate the technology we have to manage. Is Websense still a best of breed Web Filtering product or has it forgotten its roots?”

Demo

Question 2 o “I need to be able to offer granular blocking of Web 2.0 applications to the business. Can Websense do this just as well as the basic web filtering?”

Demo

Question 3 o “Websense seems able to provide a comprehensive solution for Web filtering and Web 2.0 filtering. How do I apply that policy to my users whether they are in the office or not?”

Demo

Question 4 o “How do I go about monitoring and reporting on what my end users are doing whether they are in the office, on the road or working from home?”

Demo

Question 5 o “So Websense can deal with all of my Web Filtering requirements but what about ?”

Demo

But what about DLP?

Scenario We have a lab with “sensitive” data on it. Lets see how we can monitor and block it

DLP Scenario 1 An end-user wants to get some “sensitive” data out of the organisation so decides to it to themselves.

DLP Scenario 2 Having found their to themselves didn’t arrive our end-user decides to send it to themselves with their Gmail account

DLP Scenario 3 Having found they cannot upload the data via or Gmail our end user decides to copy the data to a USB device on their laptop

DLP Scenario 4 Having failed in their other attempts our end-user decides to take a screen grab of the data and it to themselves

Any Questions?

Thank you Please hand in your feedback forms