Websense launches Threatseeker Honeygrid

The first fruits of Websense's purchase last year of Surfcontrol and PortAuthority were evident as the malware scanner launched its Threatseeker Honeygrid web and email scanning service.

The first fruits of Websense's purchase last year of Surfcontrol and PortAuthority were evident as the malware scanner launched its Threatseeker Honeygrid web and email scanning service.

The Honeygrid Network offers a tenfold increase over Websense's previous offering, Websense said. It now uses more than 50 million real-time data collecting systems worldwide to monitor and to classify Web, messaging and data content.

Dan Hubbard, Websense's vice-president for security and technology, told Computer Weekly the Honeygrid Network uses both honeypots and advanced grid computing systems to parse more than one billion pieces of content daily to find security threats.

The new system also includes new technology to test the trustworthiness of networks, domains, Web 2.0 sites and structured and unstructured data, he said.

The new system uses content classification and data identification with binary, lexical and statistical analysis along with heuristics, image recognition, machine learning, pattern detection, natural language processing and data 'fingerprinting', he said.

Websense's 'Honeyclients' mine and analyse more than 100 million web sites daily, and more than 50 million real-time data collecting systems parse a billion pieces of content daily, he said.




Read more on Antivirus, firewall and IDS products

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close