Websense Triton Security Gateway Anywhere review

Websense's TSGA claims to be the first unified solution for web, mail and data security that doesn’t rely on any third party components. It goes even further by amalgamating on-premises and cloud scanning in the same product, but is it too good to be true? Dave Mitchell finds out in our review.

Security policies for web access can be applied to a range of criteria including AD users and groups, IP address ranges and individual machines. Websense provides a remarkable choice of categories where you can block or allow certain keyword searches and file types as well as apply quotas that restrict browsing time.

Websense provides comprehensive lists of web categories and protocols which can be combined in the same security policy.

Websense provides comprehensive lists of web categories and protocols which can be combined in the same security policy.

This section also includes a comprehensive range of protocol filters so the same policy can be used to control apps such as IM and P2P, file transfer tools and web mail. There's even a bandwidth optimiser that can be applied to individual web categories and protocols within a policy where they will be blocked if usage goes above a set percentage of bandwidth.

Default policies for inbound and outbound mail are ready to use and messages are subjected to a barrage of tests. TSGA scans the message body, runs heuristics and applies its LexiRule scanner which looks for specific word patterns. It'll also classify any URLs in the message and calculates a message fingerprint which it compares to its spam database.

The TruHybrid portion is easy to configure and for the web component you decide which locations, based on IP addresses and subnets, are to be filtered using the cloud service. Policies created locally can be applied to remote sites and workers and, as TSGA can identify their physical location, it can apply different policies based on whether they are on-site or off-site.

Featured Resources

Modern governance: The how-to guide

Equipping organisations with the right tools for business resilience

Free Download

Cloud operational excellence

Everything you need to know about optimising your cloud operations

Watch now

A buyer’s guide to board management software

Improve your board’s performance

The real world business value of Oracle autonomous data warehouse

Lead with a 417% five-year ROI

Download now

Recommended

Proofpoint impersonator steal Microsoft, Google logins in phishing campaign
cyber security

Proofpoint impersonator steal Microsoft, Google logins in phishing campaign

8 Nov 2021
Cloudflare enters the email security business
phishing

Cloudflare enters the email security business

28 Sep 2021
The most secure email services of 2021
email providers

The most secure email services of 2021

12 Sep 2021
Microsoft Outlook shows real contact details in some phishing emails
Microsoft Office

Microsoft Outlook shows real contact details in some phishing emails

7 Sep 2021

Most Popular

Dell XPS 15 (2021) review: The best just got better
Laptops

Dell XPS 15 (2021) review: The best just got better

14 Jan 2022
Sony pulls out of MWC 2022
Business operations

Sony pulls out of MWC 2022

14 Jan 2022
Synology DiskStation DS2422+ review: A cube of great capacity
network attached storage (NAS)

Synology DiskStation DS2422+ review: A cube of great capacity

10 Jan 2022