Websense announced plans to deliver new technology to control the unwanted dissemination of sensitive and confidential information — from personnel records to corporate trade secrets.
To accelerate entry into the information leak prevention market, Websense has signed an agreement with PortAuthority Technologies to use its technology as part of the new Websense product line. This marks the industry’s first OEM agreement between a global security company and an information leak prevention vendor.
With this new agreement, Websense plans to deliver new Deep Content Control technology that acts as a “digital data guardian” to help control how sensitive data can leave the organization and under what circumstances. For the first time, organizations will be able to control where users go, how they get there, and what information they can send or use under a unified policy management console. For example, a business could identify and prevent an employee from accidentally or maliciously sending customer credit card data, sales projections or product source code and plans to a non-trusted or unknown location or unauthorized internal recipients. As a result, organizations can more effectively and efficiently respond to issues related to corporate governance and intellectual property protection.
The market for data-centric content control is growing. In fact, IDC predicts that the market for multi-protocol content filtering will grow from $194.0 million in 2007 to $434.6 million in 2009, representing a 49.7 percent compound annual growth rate.
Websense Deep Content Control technology will integrate PortAuthority’s patented PreciseID information classification and identification technology with Websense’s patent-pending classification and enforcement technology to provide automated data protection.
The new Websense technology will extend Websense’s ability to help secure sensitive and confidential information that can cause intellectual property loss, compliance violations and harm brand reputation. The technology will allow organizations to protect against information leaks that happen from a variety of sources including; poor security practices, ill-advised business processes, insider attacks and targeted attacks which are all happening more frequently.