New TRITON Architecture Combines Websense Security Solutions for Greater Protection against Dynamic, Blended Threats at the Lowest Total Cost of Ownership

 

READING, UK, February 9, 2010 - Websense, Inc. (NASDAQ: WBSN), a global leader in content security, today introduced the new Websense® TRITONTM unified security architecture, combining Websense Web, data and email security technologies into a single platform delivering unified content analysis and management. The Websense TRITON architecture integrates the real-time Web content analysis and malware protection of the industry-leading Websense Web Security Gateway with industry-leading Websense Data Security Suite and Websense Email Security to protect organizations and their essential information from blended threats and targeted attacks while easing administration and lowering total cost of ownership.

Read more: Websense Unveils TRITON™ Architecture Unifying Web, Data and Email Security

Thales Datacryptor® Ethernet Layer 2 reduces the number of appliances needed to secure Multipoint Ethernet traffic   Weston, FL and Long Crendon, UK – 8 February 2010: Thales, leader in information systems and communications security, announces that its Datacryptor 100 Mbps and 1 Gbps Ethernet Layer 2 network encryptors now have the capability to operate in multipoint, fully meshed environments, enabling organizations to reduce their information security cost. 

This newly added multipoint capability enables any one node in the network to securely connect simultaneously to any other node, thus reducing the total number of encryptors required to protect multiple connections. Government agencies and enterprise customers are now able to protect sensitive data in transit across fully-meshed distributed applications more cost effectively with fewer dedicated encryption appliances.

Read more: Thales Adds Multipoint Capability to its Datacryptor Ethernet Layer 2 Network Encryptors

Presentation of gateProtect V 8.6 – the new firewall generation: press conference being held on 2 March at 9.00am, Room 112 in the Convention Centre

Hamburg, Germany. 8 February 2010 – As in previous years, the German-based network security specialist gateProtect is exhibiting at CeBIT, underscoring its strong market presence as well as its healthy growth. Show visitors in Hanover will be able to see a preview of gateProtect’s new generation of Unified Threat Management (UTM) firewalls, version 8.6, from 2-6 March 2010 at CeBIT. The new release provides automatic updates of the client software, enhanced performance of encryption technologies, and support for in-house DynDNS servers. Other new products on show at CeBIT include gateProtect’s new range of appliances designed for use in large environments.

Read more: gateProtect at CeBIT 2010: Unified Threat Management (UTM) for midsized and large companies

A consultant's report (http://bit.ly/8Y0y0c) on the theft of four laptops at St Albans council - in which the details of more than 14,500 postal voters went walkabout - has highlighted continuing lapses on the security front, says Origin Storage, the storage systems integration specialist. "The theft of the laptops caused an uproar, but the report from Socitm has identified that staff are still being lax on data security, despite the fact that other security procedures have been tightened up," said Andy Cordial, Origin's managing director. "Local press notes about the report make for interesting reading, not least because, although staff are physically locking hardware to their desks, and portable device data is being encrypted, employees are still taking a poor approach to security generally, such as sharing their passwords," he added.

Read more: St Albans council report on four stolen laptops highlights need for multiple layers of security on...

London, 3rd February 2010 - The rapid evolution of Web 2.0 services and the parallel world of cybercrime is driving a revolution in the price that criminals charge each other for user credentials, says Imperva, the data security specialist.   The price of a file of user credentials - known as a `dump' in hacking circles - depends greatly on the Internet service(s) where they can be used, says Amichai Shulman, the firm's chief technology officer.   "Just five years ago, the illegal trade in credit card details was a rising problem for the financial services industry, as well as their customers, with platinum and corporate cards being highly prized by the fraudsters," he said.   "Today, however, there are reports of Twitter credentials changing hands for up to $1,000 owing to the revenue generation that is possible from a Web 2.0 services account. This confirms our observations that credentials can fetch a high sum according to both the popularity of the application, and the `popularity' of the account in question," he added.  

Read more: Cybercrime evolution means value of stolen credentials now determined by Internet service