Welcome to World of MSPL!!!

Today, the most challenging part is not good product but to get good Partner who can give good technical support, design good solution can help to develop total IT Solution. Most of the customers are dependent on Vendor, getting good product but are not able to utilize the investment, not getting technological updates on regular basis. When a problem with IT infrastructure occurs, nothing is more frustrating than having to deal with someone who does not understand your problem, or who does not have the relevant information to hand to resolve the issue – especially in an emergency situation

Products: Information Security » DLP and Encryption » Websense » Websense Data Leak Proof Solution

Websense - Data Leak Proof Solution

From tarnished brand reputation to regulatory fines, the adverse impacts of data breaches are clear. Just a single incident of data loss can erode a business’s competitive advantage, weaken consumer confidence, and result in fines or penalties from regulators. The problem is further exacerbated with rapid proliferation of mobile computing devices, widespread use of peripheral devices, and easy access to file-sharing software — all increasing the opportunity for data loss. Websense offers comprehensive data security solutions that can help secure your essential information by providing visibility into what data is confidential, where it’s stored, how it is transmitted, and who is using it.

From tarnished brand reputation to regulatory fines, the adverse impacts of data breaches are clear. Just a single incident of data loss can erode a business’s competitive advantage, weaken consumer confidence, and result in fines or penalties from regulators. The problem is further exacerbated with rapid proliferation of mobile computing devices, widespread use of peripheral devices, and easy access to file-sharing software — all increasing the opportunity for data loss. Websense offers comprehensive data security solutions that can help secure your essential information by providing visibility into what data is confidential, where it’s stored, how it is transmitted, and who is using it.

Websense Data Security Suite includes four integrated modules, managed under a single policy framework, which together provide visibility and control over network and endpoint data loss as well as comprehensive data discovery across enterprise storage systems.

  • Websense Data Monitor: Monitors for data loss on network (Web, email, FTP, other)
  • Websense Data Protect: (includes Websense Data Monitor) Enforces automated, policy-based controls to block, quarantine, route to encryption gateway, audit and log, or notify users of violations
  • Websense Data Endpoint: Monitors and enforces automated, policy-based controls for data in use via applications and peripheral devices on endpoints; local discovery and classification of confidential data

Websense Data Discover: Discovers and classifies confidential data stored in enterprise repositories, with customizable remediation action including file removal.

Websense Data Security Suite is the only solution with native enforcement of Web (HTTP), secure Web (HTTPS), and email (SMTP) traffic, eliminating the need for additional expensive third-party proxy solutions. It integrates with any Websense Web security solution, which routes outbound Web traffic to Websense Data Monitor for analysis.

Websense DLP Module

Features

Web DLP

Data Monitor

Data Protect

Data EndPoint

Data Discover

Data Security Suite

Data Identification

*

*

*

*

*

*

Central Management

*

*

*

*

*

*

Notifications

*

*

*

*

*

*

Monitor Web

*

*

*

*

*

Enforce Web

*

*

*

*

Monitor Email

*

*

*

Enforce Email

*

Web Downloads

*

*

Outbound LAN

*

*

Removable Media

*

*

Application Control

*

*

Agent based Discovery

*

*

Agent-less Discovery

*

*

Websense DLP - Features

  • Ensure sensitive data are only uploaded to identified and approved SaaS application
  • Application monitoring triggered by user, user group, predefined application or application groups
  • Enforce type of information that can be downloaded locally from SaaS application
  • Classification by regulated data type such as credit card numbers
  • Detect small amounts of confidential data sent over multiple communications
  • Comprehensive discovery: Network scans, local scans (via endpoint software agent); ad-hoc or scheduled scans
  • Detect large volume of data loss from the sum of confidential data sent over specific time period
  • Coverage: Network-based scan of databases, file shares, Exchange, SharePoint; local scan based on file type, size, age
  • Network monitoring Web (HTTP), Secure Web (HTTPS), email (SMTP), IM (AOL, Yahoo, MSN), FTP, printing (optional OCR agent), dynamic Web 2.0 content
  • Identification: Over 400 file types, including Microsoft Exchange PSTs; file fingerprints, compliance templates
  • Reduce violations by 50 percent with user notification of violations
  • Websense Web Security integration: Route HTTP, HTTPS, FTP traffic for analysis by Websense Data Security via ICAP protocol
  • Device monitoring and control of removable storage, external hard drives, printing, burning to CDs/DVDs, copy/paste/screen print to clipboard, file access
  • Automated, accurate identification of confidential data: Keywords, dictionaries, fingerprinting, regular expressions, thresholds, context, proximity, and correlation for unstructured, structured data (e.g. database)
  • No need for additional solutions: HTTP, SMTP, IM, FTP and HTTPS (with Websense Web Security, for Web proxy)
  • Flexible and cost effective: (1) Monitor or protect mode, (2) passby/span port or inline/tap, (3) with Websense Web Security or any standard Web proxy, (4) with Websense Email Security or any SMTP-compliant MTA
  • Schedule discovery scans when system, not running off battery (endpoint); during off-peak hours; network-based (coverage) vs. agent-based (performance); exception lists in IP range for network discovery
  • Microsoft SMS or other methods; Avoid conflict with antivirus, personal firewalls; Phased deployment with user profiles; enable/disable agent
  • Built-in wizards to make it easy: Industry, regional regulations (e.g., PCI, UK DPA, GLBA, HIPAA, SOX); pre-defined checks: PII (personally identifiable data), PHI (personal health care info), PCI (payment card industry), PFI (personal financial info)
  • Built-in reports for auditors and executives: Distribute tamperproof (PDF) compliance reports with information on total number of incidents based on: Network: User group, policy, regulation, enforcement action, etc
  • Endpoint: Device/application channel, user group, policy, regulation, enforcement action taken, etc.
  • Discovery: IP address, repository type/name, confidential data (type, specific file/record), data owner, remediation action