![Page 1: Websense Financial Analyst Day 2013 - Threat Technology](https://reader034.vdocuments.net/reader034/viewer/2022051816/5443cd9eb1af9f740a8b4685/html5/thumbnails/1.jpg)
Russ Dietz, EVP Products & CTO
PERSISTENT THREAT PROTECTION
![Page 2: Websense Financial Analyst Day 2013 - Threat Technology](https://reader034.vdocuments.net/reader034/viewer/2022051816/5443cd9eb1af9f740a8b4685/html5/thumbnails/2.jpg)
© 2
013
Web
sens
e, In
c.
Pag
e 2
Infiltration is an Architectural Problem
EMAIL GATEWAY
PROXY ANTI MALWARE
ANTI VIRUS
DATA LOSS PREVENTION
![Page 3: Websense Financial Analyst Day 2013 - Threat Technology](https://reader034.vdocuments.net/reader034/viewer/2022051816/5443cd9eb1af9f740a8b4685/html5/thumbnails/3.jpg)
© 2
013
Web
sens
e, In
c.
Pag
e 3
PERSISTENT - Threat Protection Architecture
ADVANCED PERSISTENT
THREATS Threats
Data
Web
Message
![Page 4: Websense Financial Analyst Day 2013 - Threat Technology](https://reader034.vdocuments.net/reader034/viewer/2022051816/5443cd9eb1af9f740a8b4685/html5/thumbnails/4.jpg)
© 2
013
Web
sens
e, In
c.
Pag
e 4
Complete Threat Protection – TRITON Architecture
GLOBAL THREAT AWARENESS
REAL-TIME THREAT DETECTION
PROTECTION & DEPLOYMENT
PERSISTENT VISIBILITY
![Page 5: Websense Financial Analyst Day 2013 - Threat Technology](https://reader034.vdocuments.net/reader034/viewer/2022051816/5443cd9eb1af9f740a8b4685/html5/thumbnails/5.jpg)
© 2
013
Web
sens
e, In
c.
Pag
e 5
THREATSEEKER – Detection Evolution
THREAT AWARENESS & EDUCATION
ACTIVE PROTECTION APT MITIGATION
GLOBAL THREAT AWARENESS
REAL-TIME THREAT DETECTION
![Page 6: Websense Financial Analyst Day 2013 - Threat Technology](https://reader034.vdocuments.net/reader034/viewer/2022051816/5443cd9eb1af9f740a8b4685/html5/thumbnails/6.jpg)
© 2
013
Web
sens
e, In
c.
Pag
e 6
TRITON Architecture – Protection Evolution
ENDPOINT PROTECTION
• Any OS • Any Browser • Anywhere
MOBILE SECURITY
ADVANCED THREAT DEFENSES PROTECTION & DEPLOYMENT
PERSISTENT VISIBILITY
OVERLAYS CURRENT DEFENSES
![Page 7: Websense Financial Analyst Day 2013 - Threat Technology](https://reader034.vdocuments.net/reader034/viewer/2022051816/5443cd9eb1af9f740a8b4685/html5/thumbnails/7.jpg)
© 2
013
Web
sens
e, In
c.
Pag
e 7
Full content analysis Web, Message & Data
Encrypted visibility & prevent criminal encryption
Safe & Scalable content sandboxing Recognize legitimate data
Validate Identities Double check TRUST Block known compromised… Evolve…
beyond attacks
Unique, patented, TRITON Architecture…
ADVANCED PERSISTENT THREATS BLOCKED
![Page 8: Websense Financial Analyst Day 2013 - Threat Technology](https://reader034.vdocuments.net/reader034/viewer/2022051816/5443cd9eb1af9f740a8b4685/html5/thumbnails/8.jpg)
© 2
013
Web
sens
e, In
c.
Pag
e 8
Impact on real protection – today & going forward…
INFORMATION TECHNOLOGY & ATTACK SURFACE LANDSCAPES
EVOLVING
CYBER WARFARE ADVANCING
TECHNOLOGY
THREATS & PREDATORS ARE LONG-TERM & BUSINESS DRIVEN
![Page 9: Websense Financial Analyst Day 2013 - Threat Technology](https://reader034.vdocuments.net/reader034/viewer/2022051816/5443cd9eb1af9f740a8b4685/html5/thumbnails/9.jpg)
© 2
013
Web
sens
e, In
c.
Pag
e 9
TRITON & THREATSEEKER MOMENTUM
UNIQUE INTELLECTUAL PROPERTY
INDUSTRY LEADING PROGRESS
THE FUTURE… TODAY