Quin said other industry vendors already offer security to protect both social media and e-mail combined. There are also firewalls with deep traffic monitoring on the market. And, McAfee Inc., for instance, has similar application traffic level control. But the industry is moving toward more security technology of this type, he said.
“The security industry is always going to be catching up so we have to respond to attacks; security is a defense,” Quin said.
Managing all of the security for individual appliances can become a problem for business as it makes more work for IT people to monitor all of the software and keep it updated, according to Quin.
Triton can be used across multiple facilities and is useful for remote workers because it integrates with software-as-a-service. Across the many branches and appliances it might be used for, it will compile one single report on web mail, security and Internet.
The system is already in use by a few companies like P&O Ferrymasters, a Dubai shipping and logistics company.
“With Websense Triton-based products like their Web Security Gateway and e-mail security, we feel confident that our systems stay clean of malware and the integrated DLP helps make sure that sensitive data stays where it should, without fear of data loss,” said David Rigby, IT manager with P&O Ferrymasters, a subsidiary of Dubai World Co.
Triton is not only usable on company laptops and desktop computers but it can be used to protect tablets and smart phones, and it runs better on the Android than iOS, said Meizlik.
“Some devices are easier to cover than others,” he said. “Mobile is picking up and it’s hot; perimeter-based protection is ineffective.”
Some popular software was useless against new sorts of security threats, according to a report by Miercom in 2010, a consulting agency specializing in networking, communications and product testing. BlueCoat is 18.9 per cent effective against blocking new malware threats. Blue Coat is 29.4 per cent and McAfee is 19.8 per cent effective for blocking malicious software in social media. Twenty per cent of spam goes undetected by firewalls, AV, UTMs, and proxies.