1
TRITON RiskVision Setup Guide
1
Introducing TRITON
RiskVision
TRITON RiskVision Setup Guide | TRITON RiskVision | v2.0
Websense
®
TRITON
®
RiskVision
™
uses advanced analytics—including rules,
signatures, heuristics, and file sandboxing—to provide real-time analysis of files
transferred in web and email traffic.
TRITON RiskVision monitors TCP traffic by connecting to a SPAN or mirror port on
a switch, or to a network tap that supports aggregation.
Files identified in HTTP and SMTP traffic are analyzed by the solution in real
time, using Websense Advanced Classification Engine (ACE) analytics on the
local machine, to identify suspicious and malicious software.
Potentially suspicious files are forwarded to the cloud-based file sandboxing
service to identify advanced malware threats. Administrators can:
Find status information in the Local Manager to track the status of file
sandboxing.
Access online file sandboxing reports to learn more about analyzed files, the
threats associated with them, and the steps needed for remediation.
Transaction data is analyzed to find violations of regulatory policies related to
transfer of Personally Identifiable Information (PII), Protected Health Information
(PHI), and Payment Card Industry (PCI) data within file content.
Содержание RiskVision
Страница 1: ...v2 0 TRITON RiskVision Setup Guide...
Страница 4: ...ii Websense TRITON RiskVision Contents...
Страница 14: ...Installation 10 Websense TRITON RiskVision...
Страница 26: ...Initial Setup 22 Websense TRITON RiskVision...