SlideShare a Scribd company logo
1 of 4
Download to read offline
2009 North American Web Content Management
                               Product Innovation of the Year Award

                                       Websense
         The 2009 Frost & Sullivan North American Product Innovation of the Year Award in
         Web Content Management goes to Websense in recognition of the company’s
         development of a series of innovative Web security products that include a Web filter
         and Web security gateway. Websense’s solutions can cope with the needs of the
         dynamic content of feature-rich Web sites, especially Web 2.0. They provide policy-
         based control over hundreds of network protocols against security threats along with
         bandwidth optimization to efficiently manage real-time network traffic.

                                      Company Background

         Headquartered in San Diego, California, Websense was founded by Phil Trubey in
         1994. Incorporated with a mission to develop software to block inappropriate websites,
         Websense emerged as a pioneer in the domain of Web filtering. A public company
         since 2000, Websense is led by network security veteran Gene Hodges, who serves as
         the company’s chief executive officer. With more than 1,300 employees, Websense
         has a global presence. Considering the rapid increase in the number and severity of
         internet threats, Websense has established a security lab of more than 80 dedicated
         content researchers to constantly discover, investigate, and report such threats.

                                 Relevance in the Market Place

         The nature of Web content today is more dynamic than before. Web users have begun
         to actively use Web sites as a medium of communication, for application sharing, and
         content updates. Web 2.0 applications and technologies from AJAX, Flash, online
         storage, webmail, and SaaS services to content-sharing and online messaging
         technologies like Wikipedia and social networking tools such as Facebook and Twitter
         are increasingly being used and leveraged in the workplace. According to Websense
         Security Labs the top 100 Web sites are the most popular targets for attackers due to
         their large user base, good reputations and support of Web 2.0 applications. With
         malware attacks becoming major threats that compromise confidential data such as
         usernames and passwords, the hacker community is currently developing security




© 2009 Frost & Sullivan
breach tactics ranging from phishing attacks to deploying botnets in order to acquire
         critical personal and corporate data from Web users.

                                  How the Technology Works

         Websense has developed the Websense Web Security Gateway (WSG), an integrated
         Web proxy and cache purpose-built for protecting organizations from malicious or
         inappropriate Web content and Web sites that are accessed by organizational
         employees. WSG allows an organization to create internet user policies by choosing a
         series of options such as ‘Allow,’ ‘Block,’ ‘Continue,’ ‘Quota,’ ‘Block by File Type,’
         around Web site and content categories as well as network application categories such
         as Instant Messaging or Peer-to-Peer applications. To prevent malware and virus
         attacks, WSG incorporates many advanced real-time site, file, object, reputation,
         virus, and exploit scanning capabilities. At the same time it leverages these and
         additional content and protocol analysis capabilities to prevent inappropriate use of
         Web content and network resources that can violate HR, Acceptable Use, and legal
         liability policies. As an additional critical capability, the WSG can also look at the
         outbound data content leveraging Websense award-winning Data Loss Prevention
         technology, and it can enforce polices to protect sensitive and regulated data from
         leaving the organization based on the user, the actual data, and the destination of that
         data. These policies set by organizations can be created based on users or even
         groups as defined in the Microsoft Windows Active Directory, the Sun Java System
         Directory Server, RADIUS (remote authentication dial in user service), and Novell
         eDirectory access via Lightweight Directory Access Control.

         By leveraging more than 1,800 proprietary analytical engines as well as the patent-
         pending Websense ThreatSeeker™ Network, the Websense Web Security Gateway
         analyzes and classifies in real-time Web site content accessed by end users. The
         ThreatSeeker Network provides intelligence to address malicious content with the most
         up-to-date protection. Over the years Websense has made many enhancements to this
         system, and its acquisition of Defensio in early 2009 is a recent example. Defensio's
         ability to sit in social networks and provide content and blog-spam intelligence into the
         ThreatSeeker™ Network puts Websense ahead in detecting and protecting end users,
         while these new sites, links and content are simply not seen by traditional email and
         Web detection systems.

         This WSG technology also has been incorporated in the v10000 gateway appliance,
         which was developed to especially address Web 2.0 threats and to mitigate the risks of
         leveraging Web 2.0 for its obvious benefits. Websense Web security is also available




© 2009 Frost & Sullivan
as a Software as a Service (SaaS) solution which provides another key deployment
         option and advantage. Websense Hosted Web Security is a highly scalable, zero-
         latency SaaS option that ensures only clean traffic reaches customer networks, thus
         reducing time and costs associated with administration, maintenance and support and
         freeing IT to focus on strategic business initiatives. Traffic is routed through globally
         distributed data centers and scanned in real time for malicious and inappropriate
         content using a combination of commercial antivirus scanning, the Websense
         ThreatSeeker Network, and correlated heuristics. The service utilizes a multi-tenant
         architecture with purpose-built high-performance proxies and is backed by industry-
         leading SLAs to ensure uptime and availability.

                                            Best Practices

         One of the important features of the Websense Web Security Gateway solution is its
         ability to support the rising dynamics of the Web by conducting real-time content
         analysis of the most frequented Web sites. Although, these popular Web sites perform
         daily updates to their Web pages, WSG seamlessly tracks these sites constantly across
         millions of individual Web pages. Due to the immense popularity of social networking
         sites such as Facebook and Twitter, Websense has begun offering Web security
         solutions directly on the client sites to enhance real-time threat protection. With its
         deep knowledge of the Web and real-time dynamic threat protection, Websense
         provides complete coverage, visibility, and control over who can send what
         information, where, and how, enabling corporations to keep their networks and data
         safe while still leveraging the benefits of Web 2.0.

         Websense has been awarded a total of 18 patents so far. A majority of the issued
         patents are in the area of Web filtering and content filtering, which include patents
         from filtering techniques to flexible filtering technologies. The company has
         approximately 100 patents in the filing process.


                                              Conclusion

         Frost & Sullivan is pleased to present Websense with the 2009 Award for Product
         Innovation of the Year in Web Content Management for its development of an
         advanced, innovative policy-based control Web security solution, which can cope with
         the dynamic needs of today’s internet communication spectrum while addressing the
         latest security threats.




© 2009 Frost & Sullivan
Award Description

          The Frost & Sullivan Award for Product Innovation is presented each year to the
          company that has demonstrated excellence in new products and technologies within its
          industry. The recipient company has shown innovation by launching a broad line of
          emerging products and technologies.

                                      Research Methodology

          To choose a recipient of this Award, the analyst team tracks all new product launches,
          research and development spending, products in development, and new product
          features and modifications. This is accomplished through interviews with the market
          participants and extensive secondary and technology research. All new product
          launches and new products in development in each company are compared and
          evaluated based on degree of innovation and customer satisfaction. Companies are then
          ranked by number of new product launches and new products in development.

                                       Measurement Criteria

          In addition to the methodology described above, there are specific criteria used to
          determine final competitor rankings in this industry. The recipient of this Award has
          excelled based on one or more of the following criteria:
                Significance of new product(s) in its industry
                Competitive advantage of new product(s) in its industry
                Product innovation in terms of unique or revolutionary technology
                Product acceptance in the marketplace
                New product value-added services provided to customers
                Number of competitors with similar product(s).

About Best Practices

Frost & Sullivan Best Practices Awards recognize companies in a variety of regional and global markets for
demonstrating outstanding achievement and superior performance in areas such as leadership, technological
innovation, customer service, and strategic product development.       Industry analysts compare market
participants and measure performance through in-depth interviews, analysis, and extensive secondary
research in order to identify best practices in the industry.

About Frost & Sullivan

Frost & Sullivan, the Growth Consulting Company, partners with clients to accelerate their growth. The
company's Growth Partnership Services, Growth Consulting and Career Best Practices empower clients to
create a growth focused culture that generates, evaluates and implements effective growth strategies. Frost &
Sullivan employs over 45 years of experience in partnering with Global 1000 companies, emerging businesses
  © 2009 Frost & Sullivan
and the investment community from more than 30 offices on six continents. For more information about Frost
& Sullivan’s Growth Partnerships, visit http://www.frost.com.

www.awards.frost.com

More Related Content

What's hot

Security is Hard
Security is HardSecurity is Hard
Security is Hard
Mike Murray
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
James Sutter
 

What's hot (20)

How to get deeper administration insights into your tenant
How to get deeper administration insights into your tenantHow to get deeper administration insights into your tenant
How to get deeper administration insights into your tenant
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-Ups
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaCybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabia
 
Cloud Security (CASB) for Slack
Cloud Security (CASB) for SlackCloud Security (CASB) for Slack
Cloud Security (CASB) for Slack
 
Security is Hard
Security is HardSecurity is Hard
Security is Hard
 
History of Content Security: Take 2 - ShareCloudSummit Houston
History of Content Security: Take 2 - ShareCloudSummit HoustonHistory of Content Security: Take 2 - ShareCloudSummit Houston
History of Content Security: Take 2 - ShareCloudSummit Houston
 
Microsoft Digital Crimes Unit
Microsoft Digital Crimes UnitMicrosoft Digital Crimes Unit
Microsoft Digital Crimes Unit
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Secure remote work
Secure remote workSecure remote work
Secure remote work
 
The 15 best cloud security practices
The 15 best cloud security practices The 15 best cloud security practices
The 15 best cloud security practices
 
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 Cyber Ethics: Cyber Security Services | VAPT and WAPT Cyber Ethics: Cyber Security Services | VAPT and WAPT
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Security
 
Microsoft Threat Protection
Microsoft Threat ProtectionMicrosoft Threat Protection
Microsoft Threat Protection
 
Cipher Cloud - Company Profile
Cipher Cloud - Company ProfileCipher Cloud - Company Profile
Cipher Cloud - Company Profile
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 

Viewers also liked

Genes Linked To Spread Of Breast Cancer
Genes Linked To Spread Of Breast CancerGenes Linked To Spread Of Breast Cancer
Genes Linked To Spread Of Breast Cancer
SamanthaAnderson
 

Viewers also liked (8)

Genes Linked To Spread Of Breast Cancer
Genes Linked To Spread Of Breast CancerGenes Linked To Spread Of Breast Cancer
Genes Linked To Spread Of Breast Cancer
 
Link’s Transition Planning
Link’s Transition PlanningLink’s Transition Planning
Link’s Transition Planning
 
Guide to Cloud Computing (pdf) - Danish
Guide to Cloud Computing (pdf) - DanishGuide to Cloud Computing (pdf) - Danish
Guide to Cloud Computing (pdf) - Danish
 
IT sikkerhed 2009
IT sikkerhed 2009IT sikkerhed 2009
IT sikkerhed 2009
 
TLS and SSL v3 vulnerabilities
TLS and SSL v3 vulnerabilitiesTLS and SSL v3 vulnerabilities
TLS and SSL v3 vulnerabilities
 
Collaborative Practice for Civil matters
Collaborative Practice for Civil mattersCollaborative Practice for Civil matters
Collaborative Practice for Civil matters
 
CreditUnionVMS
CreditUnionVMSCreditUnionVMS
CreditUnionVMS
 
Brave New World Trends That Will Change Your Life
Brave New World   Trends That Will Change Your LifeBrave New World   Trends That Will Change Your Life
Brave New World Trends That Will Change Your Life
 

Similar to Product Innovation Award 2009

Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
crussell79
 
Web Security For Enterprise
Web Security For EnterpriseWeb Security For Enterprise
Web Security For Enterprise
digital.signage
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
Andrew Kanikuru
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
white paper
 
Derek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_kDerek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_k
Derek Mezack
 
Symantec-CWS_Brochure
Symantec-CWS_BrochureSymantec-CWS_Brochure
Symantec-CWS_Brochure
Justyna Majek
 

Similar to Product Innovation Award 2009 (20)

Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdf
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 
Web Security For Enterprise
Web Security For EnterpriseWeb Security For Enterprise
Web Security For Enterprise
 
Passmarked.com
Passmarked.comPassmarked.com
Passmarked.com
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
Research challenges and issues in web security
Research challenges and issues in web securityResearch challenges and issues in web security
Research challenges and issues in web security
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
 
Global Market Leader Award 2009
Global Market Leader Award 2009Global Market Leader Award 2009
Global Market Leader Award 2009
 
Clearswift f5 integration
Clearswift f5 integrationClearswift f5 integration
Clearswift f5 integration
 
Best Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdfBest Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdf
 
Derek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_kDerek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_k
 
Strategies for Effective Cybersecurity in Web Development pdf.pdf
Strategies for Effective Cybersecurity in Web Development pdf.pdfStrategies for Effective Cybersecurity in Web Development pdf.pdf
Strategies for Effective Cybersecurity in Web Development pdf.pdf
 
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxTop 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptx
 
Symantec-CWS_Brochure
Symantec-CWS_BrochureSymantec-CWS_Brochure
Symantec-CWS_Brochure
 
CYRENWebSecurity
CYRENWebSecurityCYRENWebSecurity
CYRENWebSecurity
 
Mobile content generation application | Wireless Community Network Enabler#
Mobile content generation application | Wireless Community Network Enabler#Mobile content generation application | Wireless Community Network Enabler#
Mobile content generation application | Wireless Community Network Enabler#
 

More from Kim Jensen

Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
Kim Jensen
 

More from Kim Jensen (20)

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter pack
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web Security
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Product Innovation Award 2009

  • 1. 2009 North American Web Content Management Product Innovation of the Year Award Websense The 2009 Frost & Sullivan North American Product Innovation of the Year Award in Web Content Management goes to Websense in recognition of the company’s development of a series of innovative Web security products that include a Web filter and Web security gateway. Websense’s solutions can cope with the needs of the dynamic content of feature-rich Web sites, especially Web 2.0. They provide policy- based control over hundreds of network protocols against security threats along with bandwidth optimization to efficiently manage real-time network traffic. Company Background Headquartered in San Diego, California, Websense was founded by Phil Trubey in 1994. Incorporated with a mission to develop software to block inappropriate websites, Websense emerged as a pioneer in the domain of Web filtering. A public company since 2000, Websense is led by network security veteran Gene Hodges, who serves as the company’s chief executive officer. With more than 1,300 employees, Websense has a global presence. Considering the rapid increase in the number and severity of internet threats, Websense has established a security lab of more than 80 dedicated content researchers to constantly discover, investigate, and report such threats. Relevance in the Market Place The nature of Web content today is more dynamic than before. Web users have begun to actively use Web sites as a medium of communication, for application sharing, and content updates. Web 2.0 applications and technologies from AJAX, Flash, online storage, webmail, and SaaS services to content-sharing and online messaging technologies like Wikipedia and social networking tools such as Facebook and Twitter are increasingly being used and leveraged in the workplace. According to Websense Security Labs the top 100 Web sites are the most popular targets for attackers due to their large user base, good reputations and support of Web 2.0 applications. With malware attacks becoming major threats that compromise confidential data such as usernames and passwords, the hacker community is currently developing security © 2009 Frost & Sullivan
  • 2. breach tactics ranging from phishing attacks to deploying botnets in order to acquire critical personal and corporate data from Web users. How the Technology Works Websense has developed the Websense Web Security Gateway (WSG), an integrated Web proxy and cache purpose-built for protecting organizations from malicious or inappropriate Web content and Web sites that are accessed by organizational employees. WSG allows an organization to create internet user policies by choosing a series of options such as ‘Allow,’ ‘Block,’ ‘Continue,’ ‘Quota,’ ‘Block by File Type,’ around Web site and content categories as well as network application categories such as Instant Messaging or Peer-to-Peer applications. To prevent malware and virus attacks, WSG incorporates many advanced real-time site, file, object, reputation, virus, and exploit scanning capabilities. At the same time it leverages these and additional content and protocol analysis capabilities to prevent inappropriate use of Web content and network resources that can violate HR, Acceptable Use, and legal liability policies. As an additional critical capability, the WSG can also look at the outbound data content leveraging Websense award-winning Data Loss Prevention technology, and it can enforce polices to protect sensitive and regulated data from leaving the organization based on the user, the actual data, and the destination of that data. These policies set by organizations can be created based on users or even groups as defined in the Microsoft Windows Active Directory, the Sun Java System Directory Server, RADIUS (remote authentication dial in user service), and Novell eDirectory access via Lightweight Directory Access Control. By leveraging more than 1,800 proprietary analytical engines as well as the patent- pending Websense ThreatSeeker™ Network, the Websense Web Security Gateway analyzes and classifies in real-time Web site content accessed by end users. The ThreatSeeker Network provides intelligence to address malicious content with the most up-to-date protection. Over the years Websense has made many enhancements to this system, and its acquisition of Defensio in early 2009 is a recent example. Defensio's ability to sit in social networks and provide content and blog-spam intelligence into the ThreatSeeker™ Network puts Websense ahead in detecting and protecting end users, while these new sites, links and content are simply not seen by traditional email and Web detection systems. This WSG technology also has been incorporated in the v10000 gateway appliance, which was developed to especially address Web 2.0 threats and to mitigate the risks of leveraging Web 2.0 for its obvious benefits. Websense Web security is also available © 2009 Frost & Sullivan
  • 3. as a Software as a Service (SaaS) solution which provides another key deployment option and advantage. Websense Hosted Web Security is a highly scalable, zero- latency SaaS option that ensures only clean traffic reaches customer networks, thus reducing time and costs associated with administration, maintenance and support and freeing IT to focus on strategic business initiatives. Traffic is routed through globally distributed data centers and scanned in real time for malicious and inappropriate content using a combination of commercial antivirus scanning, the Websense ThreatSeeker Network, and correlated heuristics. The service utilizes a multi-tenant architecture with purpose-built high-performance proxies and is backed by industry- leading SLAs to ensure uptime and availability. Best Practices One of the important features of the Websense Web Security Gateway solution is its ability to support the rising dynamics of the Web by conducting real-time content analysis of the most frequented Web sites. Although, these popular Web sites perform daily updates to their Web pages, WSG seamlessly tracks these sites constantly across millions of individual Web pages. Due to the immense popularity of social networking sites such as Facebook and Twitter, Websense has begun offering Web security solutions directly on the client sites to enhance real-time threat protection. With its deep knowledge of the Web and real-time dynamic threat protection, Websense provides complete coverage, visibility, and control over who can send what information, where, and how, enabling corporations to keep their networks and data safe while still leveraging the benefits of Web 2.0. Websense has been awarded a total of 18 patents so far. A majority of the issued patents are in the area of Web filtering and content filtering, which include patents from filtering techniques to flexible filtering technologies. The company has approximately 100 patents in the filing process. Conclusion Frost & Sullivan is pleased to present Websense with the 2009 Award for Product Innovation of the Year in Web Content Management for its development of an advanced, innovative policy-based control Web security solution, which can cope with the dynamic needs of today’s internet communication spectrum while addressing the latest security threats. © 2009 Frost & Sullivan
  • 4. Award Description The Frost & Sullivan Award for Product Innovation is presented each year to the company that has demonstrated excellence in new products and technologies within its industry. The recipient company has shown innovation by launching a broad line of emerging products and technologies. Research Methodology To choose a recipient of this Award, the analyst team tracks all new product launches, research and development spending, products in development, and new product features and modifications. This is accomplished through interviews with the market participants and extensive secondary and technology research. All new product launches and new products in development in each company are compared and evaluated based on degree of innovation and customer satisfaction. Companies are then ranked by number of new product launches and new products in development. Measurement Criteria In addition to the methodology described above, there are specific criteria used to determine final competitor rankings in this industry. The recipient of this Award has excelled based on one or more of the following criteria:  Significance of new product(s) in its industry  Competitive advantage of new product(s) in its industry  Product innovation in terms of unique or revolutionary technology  Product acceptance in the marketplace  New product value-added services provided to customers  Number of competitors with similar product(s). About Best Practices Frost & Sullivan Best Practices Awards recognize companies in a variety of regional and global markets for demonstrating outstanding achievement and superior performance in areas such as leadership, technological innovation, customer service, and strategic product development. Industry analysts compare market participants and measure performance through in-depth interviews, analysis, and extensive secondary research in order to identify best practices in the industry. About Frost & Sullivan Frost & Sullivan, the Growth Consulting Company, partners with clients to accelerate their growth. The company's Growth Partnership Services, Growth Consulting and Career Best Practices empower clients to create a growth focused culture that generates, evaluates and implements effective growth strategies. Frost & Sullivan employs over 45 years of experience in partnering with Global 1000 companies, emerging businesses © 2009 Frost & Sullivan and the investment community from more than 30 offices on six continents. For more information about Frost & Sullivan’s Growth Partnerships, visit http://www.frost.com. www.awards.frost.com