Websense Enterprise v5 Employee Internet Management Brian Flasck Sales Director – Northern Europe Mobile: +44 7979 647 658.

Slides:



Advertisements
Similar presentations
Symantec & IMlogic January © 2006 Symantec - CONFIDENTIAL Contents Intro Vision Key Benefits Product Strategy Business Strategy Roadmap.
Advertisements

Its a new digital world with new digital dangers….
Outpost Office Firewall Product presentation. What is Outpost Office Firewall? Software firewall solution designed especially to meet small and medium.
Visibility. Then Control. Keep good employees from doing bad things on the Internet.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Emerging Internet Threats Graham Connolly Websense Territory Manager Australia & New Zealand.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Internet, Intranet and Extranets
THE RIGHT TECHNOLOGY IN INVESTOR RELATIONS: WHAT TO DO ONLINE? THOMSON REUTERS Alex Ménage Head of Business Development Corporate Services Rapidly Developing.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Maintaining and Updating Windows Server 2008
The Business and Technology of Caching-based Services for State Education Networks Mike Lane Cacheflow, Inc. Phone (773)
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Electronic Customer Portal System. Reducing Risks – Increasing Efficiency – Lowering Costs Secure Internet based Communication Gateway direct to your.
Forefront Security Exchange. Problem Meddelande system och sammarbetsprodukter är underbarar mål för elak kod och “distrubition” av äkta dynga… Viruses.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Copyright 2005 AMX/Hoffman Video/Emmaco Prentiss – Confidential and Proprietary AMX Globally Managed Communication Systems (GMCS)
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Internet safety By Lydia Snowden.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
INTRODUCING F-SECURE POLICY MANAGER
 Value Proposition  Key Features  A Closer Look  Operational Support  Essential Payback Employee Access TM Your Window to Employee and Manager Self-Service.
Business Computing 550 Lesson 4. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
FIRST LOOK.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
Also called net is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Vantage Report 3.0 Product Sales Guide
Module 3: Business Information Systems Chapter 8: Electronic and Mobile Commerce.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted. For HP.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
The Legal, Safe and Ethical Use of Technology in the Classroom Gabriella Wheeler s
Building Tomorrow’s Corporate Portal David C. Hastings Director, Solutions Management
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
SETTING UP AN INTERNET NETWORK What you’ll need Your options How does data travel the Internet? Different terminology.
WINS Monthly Meeting www2.widener.edu/wins 10/12/2007 www2.widener.edu/wins
TACTIC | Workflow: Project Management OSS on Microsoft Azure Helps Enterprises to Create Streamline, Manage, and Track Digital Content MICROSOFT AZURE.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Maintaining and Updating Windows Server 2008 Lesson 8.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
Web Content Security Unlock the Power of the Web
BUILD SECURE PRODUCTS AND SERVICES
Trend Micro Consumer 2010 Easy. Fast. Smart.
Web Content Security Unlock the Power of the Web
Barracuda Web Security Flex
Internet, Intranet and Extranets
Barracuda Web Filtering Service
Internet, Intranet and Extranets
100% Exam Passing Guarantee & Money Back Assurance
GetWired Internet Manager
Internet, Intranet and Extranets
Retailing in Electronic Commerce: Products and Services
Check Point Connectra NGX R60
Collaborative Business Solutions
Presentation transcript:

Websense Enterprise v5 Employee Internet Management Brian Flasck Sales Director – Northern Europe Mobile:

Agenda  The Real Internet Internet Threats of 2005  How Websense Protects From These Threats  Internet Access Policies  Live Demonstration  Reporting and Analysing Internet Use  How to Integrate Websense in Your Network  Summary  Questions & Answers

Websense Market Leadership  The leader in Internet management solutions since 1994  >24,000 customers with 21.6 million subscribing seats  IDC - Websense is clear market leader for third year in a row  Frost & Sullivan - Websense is #1 for second year in a row  2004 billings : $150m +35% growth ( $111m & $82m)  22 consecutive quarters of revenue growth  Forbes – Websense is #14 on “Top 25 Technology Companies”  Fortune – Websense is #11 on “100 Fastest Growing Public Companies”  PC Magazine - Websense is named “Editor’s Choice”  The leader in Internet management solutions since 1994  >24,000 customers with 21.6 million subscribing seats  IDC - Websense is clear market leader for third year in a row  Frost & Sullivan - Websense is #1 for second year in a row  2004 billings : $150m +35% growth ( $111m & $82m)  22 consecutive quarters of revenue growth  Forbes – Websense is #14 on “Top 25 Technology Companies”  Fortune – Websense is #11 on “100 Fastest Growing Public Companies”  PC Magazine - Websense is named “Editor’s Choice”

Spyware Hacking Tools Instant Messaging Proxy Avoidance Keyloggers Remote Access Protocols Mobile Malicious Code What’s lurking below the surface? The tip of the iceberg… Pornography Peer-to-Peer Where are the real Internet threats in 2005? Phishing Frauds Streaming Media

So what are the Internet threats concerning organizations in 2005 ?

The Latest Internet Security Threats Spyware & KeyloggersPeer-to-Peer File SharingInstant Messaging Mobile Malicious CodePhishing & FraudsInappropriate Surfing Consumes bandwidth and IT resources Increasingly malicious Many forms 100 malicious keyloggers released this year Not just music anymore – films, software, games, etc Common avenue for virus and worm outbreaks It’s illegal Bandwidth hog! Chat, attachments, video, etc. Common avenue for virus and worm outbreaks Risk for confidential information leaks Increasingly sophisticated blended threats Examples include PWMonkey, WPaSteal, Troj/Bancos Used for Identity theft and BotNets Not just US banks anymore Very sophisticated and well- funded Rapid growth in Europe Gambling, Porn, Hacking, Proxy Avoidance, Games Streaming Media, Downloads, Internet Storage, Web

Communicating and Implementing Internet Access Policies

Employees don’t always know what is against the rules Pornography ? Gambling ? Instant Messaging ? Film downloads ? Internet Storage ? Web ? Job search ? Stock Trading ? Software Downloads ? MP3 files ? An Internet access policy must be explicit and detailed

Internet Access Policies Should be: Customised to your company culture Realistic Explicit Detailed Clearly Communicated In Writing

Employee Internet Management (EIM) Comprehensive software that helps organizations manage their existing Internet Access Policy

Employee Internet Management (EIM) Why are organizations investing in Websense? 1) Boost Employee Productivity 2) Maximise Network Bandwidth 3) Increase Network Security 4) Avoid Legal Problems 5) Avoid HR Problems 6) PR – Protect Public Reputation

Websense Enterprise - 3 Layers of Security Management Dynamic Databases  11 million+ URLs with 2 billion pages classified in 90+ categories  60 protocols in addition to HTTP  1 million applications in 50+ categories Log Server & Reporting tools  3 powerful reporting and diagnostics tools  Historical and Real-Time information about Internet use INTERNET Network Gateway Client

Creating the Websense Database Proprietary Web Agents and A.I. Robots Collect Sites 24,000 Customer Sites Web Analysts Review Sites (Add 75,000 per week) Web Analysts Review Sites (Add 75,000 per week) INTERNET DATABASE Webcatcher Websites Protocols Applications Websites Protocols Applications

WebCatcher Enables You to Make Additions to the Database

Webcatcher keeps database up-to-date Proprietary Web Agents and A.I. Robots Collect Sites 24,000 Customer Sites Web Analysts Review Sites (Add 75,000 per week) Web Analysts Review Sites (Add 75,000 per week) INTERNET DATABASE Webcatcher Websites Protocols Applications Websites Protocols Applications

 Abortion – Pro-Choice – Pro-Life  Advocacy Groups  Adult Material – Adult Content – Lingerie and Swimsuit – Nudity – Sex – Sex Education  Business and Economy – Financial Data and Services  Drugs – Abused Drugs – Marijuana – Prescribed Medications – Supplements and Unregulated Compounds  Education – Cultural Institutions – Educational Institutions – Educational Materials – Reference Materials  Entertainment – MP3  Gambling  Games  Government ― Military ― Political Organizations  Health  Illegal or Questionable  Information Technology – Computer Security – Hacking – Proxy Avoidance – Search Engines and Portals – URL Translation Sites – Web Hosting  Internet Communication – Web Chat – Web-based  Job Search  Militancy and Extremist  News and Media – Alternative Journals  Racism and Hate  Religion – Non-Traditional Religions and Occult and Folklore – Traditional Religions  Shopping ― Internet Auctions ― Real Estate  Social Organizations – Professional and Worker Organizations – Service and Philanthropic Organizations – Social and Affiliation Organizations  Society and Lifestyle – Alcohol and Tobacco – Gay or Lesbian or Bisexual Interest – Hobbies – Personal Web Sites – Personals and Dating – Restaurants and Dining  Special Events  Sports – Sport Hunting and Gun Clubs  Tasteless  Travel  Vehicles  Violence  Weapons Legal liability Productivity Security Bandwidth Websense Master Database URL Categories

3 Layers of Management

Websense Manager Demo

Logging & Reporting Report and Monitor on Internet activity using –Websense Reporter –Real Time Analyzer –Websense Explorer

Websense Reporter  60+ reports, tables, charts  Customizable reporting  Report scheduling and delivery  Multiple export formats including html, Word, Excel  60+ reports, tables, charts  Customizable reporting  Report scheduling and delivery  Multiple export formats including html, Word, Excel

Real Time Analyzer

Websense Explorer

Websense Explorer Demo

Integration Platform Options Firewalls Cache & Proxies Router & Switches

Managing Internet Use Today – a Summary  Internet Management is an essential element to an effective global security strategy  Managing only HTTP traffic is not enough – all traffic to the Internet needs to be managed  Database updates are increasingly time-critical  Management should not be limited to employees in the office  Reporting and analysis tools need to be powerful, flexible and protect employee privacy  Ability to delegate certain aspects of administration and reporting to subsidiaries is of great benefit  Integration platform flexibility is key for a long-term solution

Thank You

First Line of DefenseA critical component of a complete security solution Protect your most valuable asset Traditional security provides limited protectionStrengthen your perimeter protection