Websense, Inc. has announced the continued expansion and success of the Websense TRITON Security Alliance with top technology partners including Aruba Networks, F5 Networks, IBM, Imperva, Microsoft, VMware and more. Websense and participating TRITON Security Alliance members are building applications that incorporate security intelligence as a fundamental component of advanced networks, mobile and cloud-based applications.
“Our partners look to Websense for the most effective security in the industry that provides real-time protection against advanced threats and data theft,” said Ryan Windham, Senior Director of Corporate Development for Websense. “Together, with our partners, we share the vision of security that is coordinated, proactive, dynamic and offers shared situational analysis. Our TRITON Security Alliance partners lead their respective categories with innovation in areas such as network infrastructure, software defined networks, mobility, user rights management, and governance, risk and compliance.”
Mobility and the cloud are creating a borderless enterprise where users connect and interact with web-based applications without being on the corporate network. The network itself is changing by becoming programmable and dynamically adapting to virtualised datacenters and elastic workloads. This shift necessitates security that is flexible, dynamic, and part of the network fabric—no matter where users and data reside.
Key technology partners have turned to the TRITON Security Alliance because real-time Websense security intelligence, delivered through the cloud, can be easily woven into their platforms to prevent advanced threats, malware, phishing attacks, lures and scams.
The Websense ThreatSeeker Intelligence Cloud and Websense ACE (Advanced Classification Engine) are the foundation of the company’s deep security intelligence. The Websense ThreatSeeker Intelligence Cloud, the world’s largest threat intelligence network, collects and manages up to five billion inputs per day from more than 900 million global endpoints. This real-time clearinghouse of threat information also expands through a bi-directional exchange of security intelligence with industry partners.