{"id":1516,"date":"2006-10-31T00:00:00","date_gmt":"2006-10-31T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/10\/31\/websense-launches-new-threat-prevention-tool\/"},"modified":"2021-12-30T11:39:31","modified_gmt":"2021-12-30T11:39:31","slug":"websense-launches-new-threat-prevention-tool","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/10\/31\/websense-launches-new-threat-prevention-tool\/","title":{"rendered":"Websense Launches New Threat Prevention Tool"},"content":{"rendered":"<p>Websense introduced its latest malware detection technology on Oct. 31, rolling out its ThreatSeeker application that will serve as the technological foundation for all of the company&#8217;s security software products.  As Web-based threats have shifted away from traditional attacks focused on software vulnerabilities to so-called zero day exploits aimed at previously unidentified flaws, traditional anti-virus and intrusion detection technologies have left users with inadequate protection, Websense officials maintain.  By utilizing a vast network of data mining machines, along with some 100 proprietary processes based on a combination of mathematical algorithms, behavior profiling and code analysis, the San Diego-based company claims that the technology can identify zero day threats and other attacks before they show up on corporate networks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The first products to bear the technology will be the firm&#8217;s latest network security filtering applications, Websense Web Security Suite version 6.3 and Web Security Suite&#8212;Lockdown Edition version 6.3, which are expected to become available sometime before the end of Nov. 2006.<\/p>\n<p>Sometime in 2007, Websense also plans to launch a data leakage prevention software package featuring the ThreatSeeker technology.<\/p>\n<p>The company said that ThreatSeeker has already aided in the identification of several major attacks, including the recently reported WMF and VML zero-day exploits that targeted flaws in popular Microsoft products.  Since Websense&#8217;s products are already used by a number of Internet service providers, the company is using the technology to get an eagle&#8217;s eye view into emerging attacks as they propagate on those companies&#8217; own massive networks, said John McCormack, senior vice president of product development for the software maker.<\/p>\n<p>While anti-virus and intrusion protection software makers, namely market leader Symantec, have been battling with Microsoft over the PatchGuard technology being added in the 64-bit version of the company&#8217;s upcoming Vista operating system, technologies such as ThreatSeeker eliminate most of the need for technologies that access an OS kernel, McCormack said.<\/p>\n<p>http:\/\/www.eweek.com\/article2\/0,1759,2048199,00.asp?kc=EWWHNEMNL110206EOAD<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1516","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1516","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1516"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1516\/revisions"}],"predecessor-version":[{"id":4003,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1516\/revisions\/4003"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}