Websense Triton Security Gateway Anywhere review
Websense's TSGA claims to be the first unified solution for web, mail and data security that doesn’t rely on any third party components. It goes even further by amalgamating on-premises and cloud scanning in the same product, but is it too good to be true? Dave Mitchell finds out in our review.
Security policies for web access can be applied to a range of criteria including AD users and groups, IP address ranges and individual machines. Websense provides a remarkable choice of categories where you can block or allow certain keyword searches and file types as well as apply quotas that restrict browsing time.
Websense provides comprehensive lists of web categories and protocols which can be combined in the same security policy.
This section also includes a comprehensive range of protocol filters so the same policy can be used to control apps such as IM and P2P, file transfer tools and web mail. There's even a bandwidth optimiser that can be applied to individual web categories and protocols within a policy where they will be blocked if usage goes above a set percentage of bandwidth.
Default policies for inbound and outbound mail are ready to use and messages are subjected to a barrage of tests. TSGA scans the message body, runs heuristics and applies its LexiRule scanner which looks for specific word patterns. It'll also classify any URLs in the message and calculates a message fingerprint which it compares to its spam database.
The TruHybrid portion is easy to configure and for the web component you decide which locations, based on IP addresses and subnets, are to be filtered using the cloud service. Policies created locally can be applied to remote sites and workers and, as TSGA can identify their physical location, it can apply different policies based on whether they are on-site or off-site.
In This Article
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Evaluate your order-to-cash process
15 recommended metrics to benchmark your O2C operationsDownload now
AI 360: Hold, fold, or double down?
How AI can benefit your businessDownload now
Getting started with Azure Red Hat OpenShift
A developer’s guide to improving application building and deployment capabilitiesDownload now