Welcome!

News Feed Item

Websense TRITON Solutions Named a Finalist for Seven 2013 SC Magazine Awards

Security experts and practitioners recognize Websense as an industry leader

SAN DIEGO, Jan. 21, 2013 /PRNewswire/ -- Websense, Inc. (NASDAQ: WBSN), a global leader in unified web security, email security, mobile security and data loss prevention (DLP), has been named a 2013 SC Magazine Awards finalist in seven different security categories. These awards honor best-in-class security products and services that protect organizations from the most sophisticated security threats.

"Websense creates some of the most innovative and effective security technologies on the market today," said Illena Armstrong, vice president and editorial director of SC Magazine. "Our readers are among the most knowledgeable security professionals. It is quite a statement to be selected by this group as one of the best."

A panel of SC Magazine readers joined a handpicked jury of practicing security executives and professionals to select award finalists. Websense received industry recognition for:

  • Best Anti-Malware Gateway for Websense® TRITON™ Security Gateway Anywhere
  • Best Cloud Computing Security for Websense TRITON Enterprise
  • Best Computer Forensic Tool for Websense CyberSecurity Intelligence™ (CSI) Services On-Demand
  • Best Data Leakage Prevention (DLP) for Websense Data Security Suite
  • Best Email Security Solution for Websense Email Security Gateway Anywhere
  • Best Regulatory Compliance Solution for Websense Data Security Suite
  • Best Web Content Management Product for Websense Web Security Gateway Anywhere

Each Websense finalist solution is part of the award-winning TRITON architecture, which protects organizations from advanced threats that are often timed and targeted. The architecture also features containment defenses against data theft with forensic threat and reporting details. The TRITON solution unifies all the key components of threat protection and data theft prevention into a cohesive content security system. It brings together web security, email security, mobile security and DLP defenses with unified security intelligence and a unified management console.

"To stop today's toughest cyber attacks, organizations need more than signature-based defenses and whitelisting web apps—real-time security intelligence and protection is absolutely critical," said John McCormack, Websense CEO. "The Websense TRITON architecture gives CSOs a scalable, unprecedented level of global security intelligence and real-time security defenses. It's an honor to be recognized for our security effectiveness and ongoing innovation by SC Magazine."   

The SC Awards, now in its 16th year, is the premier global recognition for information-technology (IT) security professionals and products that fend off the myriad security threats in today's corporate world. The annual awards showcase the best solutions, services and professionals while recognizing achievement and technical excellence. SC Magazine distinguishes the achievements of the security professionals in the field, the innovations happening in the vendor and service provider communities and the fervent work of government, commercial and nonprofits. 

Winners of this year's SC Awards U.S. will be announced at a gala dinner and award ceremony in San Francisco on Tuesday, February 26, 2013. To attend the awards, please visit https://www.eiseverywhere.com/ereg/newreg.php?eventid=51723&categoryid=389844.

For more information about Websense TRITON solutions, please visit www.websense.com/triton

About Websense, Inc.
Websense, Inc. (NASDAQ: WBSN), a global leader in unified web security, email security, mobile security, and data loss prevention (DLP), delivers the best content security for modern threats at the lowest total cost of ownership to tens of thousands of enterprise, mid-market and small organizations around the world. Distributed through a global network of channel partners and delivered as appliance-based software or SaaS-based cloud services, Websense TRITON content security solutions help organizations leverage social media and cloud-based communication, while protecting from advanced persistent threats and modern malware, preventing the loss of confidential information, and enforcing internet use and security policies. Websense is headquartered in San Diego, California with offices around the world. For more information, visit www.websense.com.

Follow Websense on Twitter: www.twitter.com/websense
Join the discussion on Facebook: www.facebook.com/websense

About SC Magazine
SC Magazine provides IT security professionals with in-depth and unbiased information through timely news, comprehensive analysis, cutting-edge features, contributions from thought leaders and the best, most extensive collection of product reviews in the business. By offering a consolidated view of IT security through independent product tests and well-researched editorial content that provides the contextual backdrop for how these IT security tools will address larger demands put on businesses today, SC Magazine enables IT security pros to make the right security decisions for their companies. In addition to the monthly print edition, the brand's portfolio includes a vibrant website (scmagazine.com); SC Congress New York, Toronto and Chicago; SC Awards; SC MarketScope; and SC Magazine Newswire.

Friend us on Facebook: http://www.facebook.com/SCMag 
Follow us on Twitter: http://twitter.com/scmagazine 

Websense Media Contact:
Patricia Hogan
Websense, Inc.
(858) 320-9393
[email protected]

SOURCE Websense

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The essence of cloud computing is that all consumable IT resources are delivered as services. In his session at 15th Cloud Expo, Yung Chou, Technology Evangelist at Microsoft, demonstrated the concepts and implementations of two important cloud computing deliveries: Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). He discussed from business and technical viewpoints what exactly they are, why we care, how they are different and in what ways, and the strategies for IT to transi...
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership abi...
Interoute has announced the integration of its Global Cloud Infrastructure platform with Rancher Labs’ container management platform, Rancher. This approach enables enterprises to accelerate their digital transformation and infrastructure investments. Matthew Finnie, Interoute CTO commented “Enterprises developing and building apps in the cloud and those on a path to Digital Transformation need Digital ICT Infrastructure that allows them to build, test and deploy faster than ever before. The int...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service.
Niagara Networks exhibited at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
SYS-CON Events announced today that Outlyer, a monitoring service for DevOps and operations teams, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Outlyer is a monitoring service for DevOps and Operations teams running Cloud, SaaS, Microservices and IoT deployments. Designed for today's dynamic environments that need beyond cloud-scale monitoring, we make monitoring effortless so you ...
Virtualization over the past years has become a key strategy for IT to acquire multi-tenancy, increase utilization, develop elasticity and improve security. And virtual machines (VMs) are quickly becoming a main vehicle for developing and deploying applications. The introduction of containers seems to be bringing another and perhaps overlapped solution for achieving the same above-mentioned benefits. Are a container and a virtual machine fundamentally the same or different? And how? Is one techn...
My team embarked on building a data lake for our sales and marketing data to better understand customer journeys. This required building a hybrid data pipeline to connect our cloud CRM with the new Hadoop Data Lake. One challenge is that IT was not in a position to provide support until we proved value and marketing did not have the experience, so we embarked on the journey ourselves within the product marketing team for our line of business within Progress. In his session at @BigDataExpo, Sum...
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
What sort of WebRTC based applications can we expect to see over the next year and beyond? One way to predict development trends is to see what sorts of applications startups are building. In his session at @ThingsExpo, Arin Sime, founder of WebRTC.ventures, will discuss the current and likely future trends in WebRTC application development based on real requests for custom applications from real customers, as well as other public sources of information,
China Unicom exhibit at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. China United Network Communications Group Co. Ltd ("China Unicom") was officially established in 2009 on the basis of the merger of former China Netcom and former China Unicom. China Unicom mainly operates a full range of telecommunications services including mobile broadband (GSM, WCDMA, LTE FDD, TD-LTE), fixed-line broadband, ICT, data communica...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, will discuss some of the security challenges of the IoT infrastructure and relate how these aspects impact Smart Living. The material will be delivered i...
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and micro services. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your contain...