SECURITY OUTFIT Websense has announced an updated release of its Triton web, data and email security product.
The San Diego firm announced Triton 7.7 in London today, and said the software product will provide 10 defenses against advanced threats and data theft through its Advanced Classification Engine (ACE).
Speaking at the event, Websense senior director of product marketing Tom Clare claimed seven of the 10 new features are "industry firsts" including an online sandbox service, cloud sandboxing of email links, criminal encryption detection, protection against password file data theft, and features for optical character recognition (OCR) of data in motion, data loss prevention (DLP) and forensic data support.
Clare said that the Triton software ties together "security intelligence", such as common consoles and administration through its Advanced Malware Threat Dashboard (AMTD) to make it simpler to use.
The AMTD profiles lists of security incidents, in-depth forensics and data theft capture so that users know who was attacked, how the attacks function, where those communications were being sent and what data was targeted.
"Triton unifies architecture across multiple areas," he said. "From the application the [user] understands the architecture and how to use it without looking at six different consoles."
One of the other main features of the updated Triton software is spear phishing protection with cloud sandboxing capabilities. This identifies suspicious links in emails with real time analysis. For example, once email recipients click on an embedded URL, Websense will analyse the web site content and browser code in real time, and "put a 'wrapper' on it", Clare explained.
"When a user goes to their inbox, clicks on the link and goes to our cloud service, we apply all of our real time defences to it. If it's bad with our real time web security analysis we'll go ahead and block and protect the users from this potential spear phishing attack."
Websense said Triton 7.7 will ultimately provide enterprises with the protection, forensics and visibility necessary to understand, "which individuals are subject to attacks, cybercrime tactics and methods, attack communications and destinations, and what data is being targeted". µ