You are on page 1of 14

WEBSENSE PROPOSAL TEMPLATE

FOR
Customer ABC
5 February 2007

Page 0 of 14
reserved.

Copyright 2007, Websense Inc. All rights

Version 6.3 - 2007

Page 1 of 14
reserved.

Copyright 2007, Websense Inc. All rights

ABOUT WEBSENSE
Websense, Inc. is the global leader in web filtering and a leader in web and endpoint security. Websense software helps organizations meet
the risks of internet use, offering maximum protection with minimal effort. Trusted by over 24,000 organizations worldwide and with
over 24.1 million seats under subscription, Websense is the vendor of choice for leading Fortune 500 and FTSE 100 customers, as
well as for government agencies and educational institutions. Websense proactively discovers and immediately protects against
web-based threats such as spyware, phishing attacks, viruses, and others. Websense secures organizations from existing and
emerging internet threats by providing proactive, policy driven web filtering, web security, and endpoint security software.
Websense software fills the technology gaps left open by networks and defenses such as antivirus, anti-spyware, firewall, and other
products. With diverse partnerships and integrations, Websense enhances its customers network and security environments.

IT CHALLENGES AND WEBSENSE CAPABILITIES


Challenge: Loss of Confidential Information
Organizations can lose their intellectual property, customer data, even system IDs and passwords to security attacks launched from outside or
through the acts of internal employees. The harm done when secrets find their way into competitors hands is not limited to the
shattered trust of customers, vendors, or partners; there are also possible financial penalties from regulatory agencies, lawsuits
from affected parties, and loss in employee productivity because of compromised network access.
Websense helps organizations prevent data loss. Organizations can set policies to prevent employees inside and outside the network from
accessing websites known to host programs designed to steal confidential information. Even if a user has previously accessed, for
example, a spyware- or keylogger- infected site and the malicious code is already on the users computer, Websense will block the
backchannel communications to the host servers, keeping any captured information from leaving the organization.
But malicious code and malicious websites are only part of the problem. Confidential information can leak out in instant messages (IM) and
IM file attachments. Often, IM applications do not communicate using the same ports and protocols monitored or blocked by
firewalls and other traditional security solutions. Websense allows organizations to set policies to manage the use of IM and IM file
attachments to protect themselves from information loss and from the security threats that can enter through these channels.
Employees may also take confidential information with them by downloading it to removable media devices like CD/DVD drives, USB drives,
and external hard drives. Websense allows organizations to block the use of removable media to prevent files from being
transferred to these devices and leaving the organization. Organizations can also block writeable media, depending on their
policies.
Challenge: Regulatory Compliance
In recent years, the inadequacy of policies and controls in certain high-profile organizations has led to the creation of new regulations. While
each law has its own agenda, there are overriding issues that this new legislation collectively addresses: audit controls, information
management, financial reporting, risk management, and security. These new regulations impose new requirements on
organizations, establish standards for compliance, and institute penaltiessome extremely harshfor noncompliance.
Websense helps organizations meet regulatory requirements by preventing access to websites, protocols, and applications that may pose a
security threat to the organizations confidential data. For regulations that require specific age groups to be prevented from viewing
content classified as inappropriate, Websense allows organizations to filter that content for the groups.
Websense also helps organizations control the flow of information into and out of the organization, through the management of IM and IM
attachments and removable media devices. Websense can also track and record attempted security breaches such as invalid login
attempts, port scans, and requests for inappropriate access. Management can receive regular reports so corrective action can be
taken and compliance maintained.

Page 2 of 14
reserved.

Copyright 2007, Websense Inc. All rights

Challenge: The Rapidly Changing Nature of Attacks


Because traditional defenses, like firewalls and antivirus software, have adapted as exploits have been uncovered, cyber-criminals continue
to improve their techniques. Where once viruses were a primary method of attack, now malicious mobile code and alternative
attacks (e.g. attacks through peer-to-peer file sharing and IM programs) are used because of their ability to bypass traditional
defenses. These new attacks can change system settings, get users to provide personal or corporate information, steal an
organizations sensitive data, or even hold fi les hostage until a ransom is paid. The results of these attacks are many: increased
calls to the Help Desk, decreased productivity, increased exposure to legal liability, and noncompliance with industry regulations, all
serious and costly consequences for organizations.
Websense protects organizations from todays evolving web-based attacks at the internet gateway, on the network, and at the endpoint.
At the internet gateway, Websense:
Prevents employees from accessing malicious websites.
Blocks malicious HTTP traffic on all ports.
On the network, Websense:
Allows organizations to manage the use of IM and IM attachments to lower the risk of intellectual property theft and malicious attacks
through this channel.
Prevents dangerous protocol-based applications from introducing security problems by extending policy control of protocols to the network
level.
Enables deep content inspection for web-based threats through proxy and cache capabilities.
At the endpoint, Websense:
Prevents employees outside the network from accessing malicious websites.
Blocks the launch of malicious applications.
Websense quickly identifies new security threats such as spyware, drive-by spyware, bots and bot network traffic, phishing, pharming,
keylogging, and email-borne worms. Real-time updates automatically protect organizations and decrease their exposure time to
new threats.
Challenge: Remote and Mobile Users
Remote and mobile users pose a unique set of challenges. They may regularly use outside networks. These networks may not be as secure
as the organizations network and could expose these users to security threats. Spyware, keyloggers, malicious mobile code, and
other malware can lodge on the endpoint, degrading performance, causing data loss, and requiring the IT department to spend time
re-mediating or re-imaging the workstation. When the user re-enters the organizations network, the threat may spread throughout
the network. Additionally, because of their locations, remote and mobile users may not receive software patches or updates as
regularly as they would at the main office. This delay increases their exposure to emerging security threats. Infection can result in
frequent and longer Help Desk calls and decreased productivity while machines travel between the user and the main office or until
an IT representative can come on-site.

Page 3 of 14
reserved.

Copyright 2007, Websense Inc. All rights

Websense provides remote and mobile users operating outside the network with the same level of protection as they have inside the network.
By providing this proactive protection, the workload on IT is reduced. IT does not have to spend as much time troubleshooting and
repairing damage caused by attacks on these remote and mobile users. The likelihood of an attack is the same for these users as it
is for users within the organizations network. The benefit to organizations is that their labor, overhead, and in some cases, capital
equipment costs related to recovering from security-related attacks on remote and mobile users is reduced.
Websense can also limit the remote and mobile environment to a known configuration to prevent users from introducing new applications that
may cause conflicts with existing applications.
Challenge: Increased Complexity and Globalization of Organizations
IT departments in large, multi-site, and distributed organizations face scalability and administration challenges not typically experienced by
smaller, single-site organizations. These challenges stem from the large number of users, devices, and offices requiring web
security and web filtering protection. Third-party security and networking toolsnetwork access control, security event
management, identity management, internet gateway, and appliance solutionsare designed to help manage this complexity, but
they may also inadvertently add to it. The volume of information generated, as well as the need for access to and control over this
information by individuals at different levels and functional areas, can place a significant burden on the corporate IT resources.
Over 450 million sites per week are mined and analyzed through automated data mining and human analysis processes. Websense
addresses these particular needs of large, multi-site, and distributed organizations. Websense allows organizations to efficiently
manage internet usage policies across multiple departments, business units and group without increasing the workload on the
corporate IT resources. Policy decisions can be pushed closer to the end-users by delegating administrative capabilities. For
organizations that operate in multiple states, countries, or regions, this is particularly important. Policies can be customized to suit
the cultural and structural needs of a particular region. Even though organizations may choose to push policy decisions closer to
the end-users, Websense allows organizations to track and analyze all administrative activities to ensure policy compliance with
corporate guidelines and improve web security.
Challenge: Productivity
With the entire world available to them through their computers, employees can be distracted by non-work related or unproductive activities.
These activities can impact the organizations overall productivity. Too many employees using bandwidth-intensive applications like
streaming media can decrease the organizations network capacity or cause system downtime.
Websense allows organizations to define and enforce internet use policies to minimize inappropriate internet use and ensure available
bandwidth for business-critical applications. Organizations can manage protocols and desktop applications used in non-productive
activities to conserve the available bandwidth. Additionally, organizations can increase available bandwidth during peak times and
automatically adjust to real-time network conditions through dynamic bandwidth policy enforcement. This dynamic policy
enforcement helps organizations conserve and more effectively utilize their network bandwidth. Websense also offers an
enterprise-class proxy and cache solution that accelerates the delivery of web based content to users to increase network
performance while decreasing bandwidth consumption.

Page 4 of 14
reserved.

Copyright 2007, Websense Inc. All rights

WEBSENSE ADVANTAGES
Automatic Protection
Websense offers automatic, real-time updates for critical website and application security threats. Unlike other solutions, these updates do not
require a full product upgrade or IT intervention to deploy.
Easy-to-Use Reporting
Websense solutions offer unparalleled reporting that includes web-based, drill-down capabilities usable by IT as well as non-technical groups
such as Human Resources, Legal, and Managementat no extra cost. Websense Reporting Tools offer Risk Classes that provide
management-level summary information on the network security, legal liability, employee productivity, and bandwidth risks of an
organization.
Whether presenting a real-time or historical view of categorized network activity, Websense Reporting Tools provide easily-understood
information quickly across terabytes of data.
Flexibility
Websense solutions integrate with all leading enterprise directories, such as Microsoft Windows NT, Windows Active Directory, LDAP,
Novell eDirectory, and RADIUS, making deployment and administration easy. Websense solutions allow the creation of policies
based on the users/groups defined in these enterprise directories.
Scalability
Websense solutions scale from 50-user organizations through 250,000 users and beyond with full reliability and accuracy. Offering either
standalone or integrated deployments for maximum flexibility and scalability, the Websense architecture allows a single-box
deployment or a distributed component approach.

Page 5 of 14
reserved.

Copyright 2007, Websense Inc. All rights

WEBSENSE WEB FILTERING SOLUTIONS


Websense Enterprise
Websense Enterprise, the worlds leading web filtering solution, helps protect organizations from the productivity, legal liability, and bandwidth
risks of the internet through the management of employee internet access and the enforcement of internet use policies.
Websense Enterprise provides comprehensive and accurate internet
filtering, even of productivity- and bandwidth-draining websites.
Organizations can choose between Allow, Block, Continue, Quota,
Block by Bandwidth, and Block by File Type options for managing web
access. Sites can also be filtered based on the time of day. Custom
URL capabilities allow organizations to recategorize sites to best meet
their web filtering needs. Report templates, block pages, and webpage
category names are available in multiple languages.
Websense Enterprise also offers powerful flexibility with ease of use. The central management console minimizes administrative overhead in
setting and enforcing internet use policies. Policies can be set based on users/groups defined in major directory services (Microsoft
Windows NT, Windows Active Directory, LDAP, Novell eDirectory, and RADIUS). Websense Enterprise allows organizations to set
policies for fi le types and over 80 application protocols, including email, file transfer, remote access, streaming media, instant messaging
(IM), and peer-to-peer (P2P) protocols.
Websense Enterprise scales from 50 to 250,000+ users with full reliability and accuracy and is available in either standalone, embedded, or
integrated deployments.
WEBSENSE WEB SECURITY SOLUTIONS
Websense Web Security Suite
Websense Web Security Suite provides a best-in-class internet
security solution, protecting organizations from existing and
emerging web-based threats. Websense Web Security Suite
identifies security threatsincluding spyware, drive-by spyware,
bots and bot network traffic, phishing, pharming, and keylogging
and blocks access at the internet gateway. Within minutes of
the discovery of a new high-risk threat, Real-Time Security
Updates are automatically sent to the local database for effortless protection. Administrators are alerted of email-borne worm traffic in the
network. Should there be any spyware or keyloggers already residing in the network, Websense Web Security Suite will block the
backchannel communications to the host servers.
Websense Web Security Suite includes three unique services to protect organizations websites, brands, and web servers:
ThreatWatcher provides a hackers-eye view into their web servers through
regular vulnerability scans. Detailed reports of known vulnerabilities and policy
compliance issues are provided through a customized web portal, allowing them to
take protective action.
SiteWatcher alerts them when their websites have been infected with malicious
mobile code (MMC), and allows them to take immediate measures to prevent its
spread to customers, prospects, and partners.
BrandWatcher alerts them when their websites or brands have been targeted in
phishing or malicious keylogging code attacks. BrandWatcher provides them with
security intelligence, including attack details and other security-related information.
Websense Web Security Suite also manages the alternative methods threats use to
enter the network. Dangerous protocol-based applications can introduce security
problems. Websense Web Security Suite extends the policy control of protocols to the
network level, including the management of P2P, email, file transfer, and other
protocols. Sophisticated internet threats may enter the network through ports other
than Port 80. Websense Web Security Suite blocks malicious HTTP traffic on Port 80
and all other ports to prevent it from entering the network. Because IM attachments can also be used in malicious attacks, Websense Web
Security Suite allows organizations to manage their use.

Page 6 of 14
reserved.

Copyright 2007, Websense Inc. All rights

FEATURED MODULES
WEBSENSE REPORTING TOOLS
Included at no extra charge with all Websense products, Websense Reporting Tools help organizations identify their risks related to network
security, legal liability, employee productivity, and bandwidth loss. The monitoring and reporting capabilities of Websense Reporting Tools offer
real-time and historical views of internet use. Interactive point-and-click reporting and powerful drill-down capabilities allow non-technical and
technical personnel to easily access the information they need. Role-based reporting provides increased visibility of network activities and
risks to those responsible for individual areas. Standard reports provide the most frequently used network activity categories while Favorite
reports are user-defined. Report scheduling allows Standard and Favorite reports to be run a single time or at daily, weekly, or monthly
intervals. The results can then be exported into multiple fi le formats for further analysis or printing and distributed via email.

Websense Real-Time Security Updates


Websense Real-Time Security Updates allow organizations to obtain immediate protection from new web- and application-based security
threats with no administrative intervention required. As soon as Websense determines that a website or application poses a security threat,
the local database is automatically updated to protect all users in the Websense environment. With no deployment effort required, all users
are now prevented from accessing the malicious site or launching the harmful application.
Websense Bandwidth Optimizer
Websense Bandwidth Optimizer enables organizations to optimize their network bandwidth resources by prioritizing and managing network
traffic in real time. As network traffic reaches preset thresholds, Bandwidth Optimizer blocks new non-business bandwidth use, ensuring
priority access to network resources for business-critical applications. Bandwidth Optimizer helps organizations conserve and more effectively
utilize network bandwidth by increasing the available network bandwidth during peak times and automatically adjusting to real-time network
conditions through dynamic policy enforcement.
Websense Corporate Edition
Websense Corporate Edition builds on the best-in-class features of Websense Enterprise, Websense Web Security Suite, and Websense
Web Security Suite Lockdown Edition, providing additional enterprise-class administrative, reporting, auditing, logging, and alerting features
for large, multi-site, and decentralized organizations. Delegated and Remote Administration capabilities provide efficient, flexible management
of internet use policies across multiple departments, business units, groups, or locations. These capabilities provide the granularity to
distribute administrative tasks to different areas, so individual administrators can manage web access and web security and are accountable
for their specific user bases. To increase the visibility of activities, security risks, and productivity risks in individual areas, Delegated reporting
enables organizations to distribute reporting permissions throughout the organization. Even though multiple individuals may be accountable
for multiple user bases, it is necessary that policy decisions remain consistent throughout the organization. Auditing capabilities in Corporate
Edition allow organizations to capture and log policy and configuration changes to help ensure consistency. SNMP Alerting notifies Security
Event Management systems of important security or performance related events to help organizations more effectively manage internetbased risk, while Anonymous Logging allows organizations to log user activity with or without names or IP addresses.
INTEGRATIONS: THE WEBSENSE WEB SECURITY ECOSYSTEM
The Websense Web Security Ecosystem is a comprehensive framework of technology integrations that provides enhanced security and ease
of deployment of Websense web security solutions in enterprise environments. The Websense Web Security Ecosystem incorporates worldclass security and networking technologies including: internet gateways, network access control, security event management, identity
management, and appliance platforms. Through seamless integration with more than 40 different technology solutions, the Websense Web
Security Ecosystem helps organizations identify and mitigate web-based threats and vulnerabilities.

Page 7 of 14
reserved.

Copyright 2007, Websense Inc. All rights

VALUE-ADDED MODULES
Websense Security Filtering (also known as Websense Security PG)
Websense Security Filtering provides organizations with an additional layer of web filtering protection from malicious websites. With Security
Filtering, organizations can block access to websites supporting Bot Networks, Keyloggers, Malicious Websites, Phishing, Potentially
unwanted Software, and Spyware.
Websense Remote Filtering
Websense Remote Filtering extends the premier web
security and industry-leading web filtering technology of
Websense to include protection for remote office and
mobile laptop users outside as well as inside the
organizations network. Remote Filtering allows
organizations to apply internet use policies to remote and
mobile users, protecting them from the external security
threats in unsecured networks and preventing their access
to malicious and inappropriate sites.
Websense Client Policy Manager
Websense Client Policy Manager (CPM) is an endpoint
security solution that provides a first line of defense
against attacks. CPM provides organizations with
maximum control over endpoint environments. CPM
proactively monitors user application inventories and
activities and prevents users from installing or running unapproved applications. Based on the application category, CPM blocks applications
from accessing the network through specific ports and protocols to stop the propagation of malicious software or unauthorized outbound
communications, CPM also allows organizations to prevent new malicious software from executing and limit the application environment to a
known configuration to preempt attacks.
CPM even protects remote and mobile endpoints operating outside the network.
Organizations can apply the same web filtering and web security policies to these users
when they are outside the network as they would have inside the network. CPM works
with NAC solutions to enforce policy on devices trying to enter the network, denying
access to noncompliant endpoints. CPM integrates with Windows Firewall
in Microsoft Windows XP Service Pack 2 (SP2) to simplify firewall configuration and add
content management and control to the firewall, without requiring an additional agent on
the endpoint.

WEBSENSE CONTENT GATEWAY


The Websense Content Gateway is a high-performance, enterprise-class web proxy and cache solution. The Websense Content Gateway
enables deep content inspection and enforcement for web-based threats and accelerates the delivery of web-based content to increase
network performance while decreasing bandwidth consumption.

Page 8 of 14
reserved.

Copyright 2007, Websense Inc. All rights

WEBSENSE SECURITY SOLUTIONS


The last few years have seen significant increases in the number and severity of security threats to organizations information resources. The
random attacks that were once the work of teenage hackers have given way to sophisticated and targeted attacks by criminals for whom
information-based crime offers bigger rewards and less risk than crime in the physical
world. Their goal is the theft of informationcorporate data or sensitive user information
that they can use themselves, sell for profit, or use for extortion. These crimeware attacks
may take a variety of forms: spyware, keyloggers, bots connected to bot networks, phishing
and pharming scams, zero-day attacks, or a blend of several types. Peer-to-peer (P2P)
networks and instant messaging (IM) are increasingly under threat. Attacks on web servers,
creating compromised websites that launch attacks on visitors by exploiting vulnerabilities
in browsers, are increasingly frequent. In a worrisome development, the very programs
designed to protect data have themselves become targets of attack. Threats to antivirus
programs, databases, and media player software illustrate just how much the security world
has changed.
HOW WEBSENSE SOLVES SECURITY ISSUES
Websense Security Expertise
Security is a key focus for Websense. A dedicated global team of security researchers at Websense Security Lab proactively discovers and
investigates internet threats, researches and classifies them, and publishes timely product and information updates to the security community
and Websense customers to support them in securing their infrastructures.
A worldwide network of computers provides global, 24 x 7 analysis of the web. Over 450 million sites per week are mined and analyzed
through automated data mining and human analysis processes. Programs crawl websites, peer-to-peer networks, and other systems looking
for malicious content and applications. Honeypots and honeynetscomputers and networks deliberately configured with vulnerabilitieswait
to be attacked by the latest security threats.
Additional websites and applications come through the Websense patent-pending
WebCatcher website and AppCatcher application customer feedback loops, while
security researchers continually monitor newsgroups, chat rooms, security websites, and
online forums for the latest vulnerability releases and proof-of-concept exploits. Expert staff
from all over the world, skilled in multiple languages and international cultures, reviews
websites, applications, and protocols on a regular basis to ensure the accuracy of
categorization.
The work of Websense is available to the community through free email alerts and a blog,
and to customers in the form of free daily database downloads and premium real-time
database updates. Included as part of each Websense product, the Websense Master Database is the most accurate and up-to-date
database in the industry and contains:
Over 18 million websites published in over 50 languages and organized into more than 90 categories.
Over 80 protocols organized into more than 15 categories.
Over 1.7 million applications and executables, organized into more than 50 categories.
Websense plays an active role in key web security research organizations, such as the Anti-Phishing Working Group (APWG) and the AntiSpyware Coalition (ASC). A member of both organizations, Websense has taken the lead role in the APWGs Phishing Data Repository
project. Because of its research and industry participation, Websense staffers are asked to participate in influential web security consortia as
well as speak at conferences and events worldwide.

Page 9 of 14
reserved.

Copyright 2007, Websense Inc. All rights

Websense ThreatSeeker : Bold New Approach To Security


Websense ThreatSeeker technology delivers pre-emptive protection from Web-based security threats - threats typically missed or too costly
to prevent using security technologies such as antivirus and intrusion prevention systems. Unlike these approaches, Websense seeks out
threats on the Internet before customers are compromised and protects customers before patches and signatures are created. Unlike
intrusion prevention systems, Websense ThreatSeeker doesn't have massive costs and administrative burdens. With Websense security
software, powered by Websense ThreatSeeker, organizations are automatically protected from the latest threats within minutes and with no
guesswork.
Finds, blocks and protects customers from Web-based security threats before they have a chance to steal business information and affect
business productivity
Uses more than 100 proprietary processes and systems to decipher emerging and complex threats
Runs using a combination of mathematical algorithms, behavior profiling, code analysis, as well as an extensive network of data mining
machines
Provides ongoing threat intelligence to Websense security software products - delivering protection to customers within minutes

Seeks out threats before customers are


compromised
Enables protection before patches and signatures
are available
Enables accurate protection from new threats
within minutes of discovery
Number of websites scanned searching for
threats

ThreatSeeker

Antivirus

IPS

595 million/week
85 million/day

none

none

TYPES OF SECURITY THREATS


Spyware
Spyware is often so disguised that users may not even know it is on their machines. But once inside a system, spyware can cause serious
information and financial losses. Spyware may gain network access to steal CPU or network cycles, install more applications on the system,
or enable the theft of proprietary information, including client databases, customer information, usernames and passwords, sensitive files and
documents, and other business-critical information. Spyware infection can also lead to increased Help Desk calls and time and effort to
reformat or rebuild infected machines.
Keyloggers
Keyloggers reside on user machines and recording each keystroke and transmitting the information back to a third party. Keyloggers are often
used to steal confidential information such as user IDs and passwords, credit card numbers, and Social Security Numbers. Like spyware,
keyloggers use backchannel communications to transmit captured information. Backchannel communications employ the users internet
connection, but generally run without the users consent or knowledge. As a result, keyloggers and their backchannel communications can be
tricky for IT departments to detect.
Bots
Botssoftware that connects a computer to and allows unauthorized control of many machines from a single command-and-control center
have emerged as a serious security threat. Bots may be instructed to spread to additional machines within the internal network, evading
firewalls, intrusion detection systems, or intrusion prevention systems deployed at the network edge. An organizations computers could all be
under a third partys control before anyone became aware of it. Compromised machines may be coordinated to launch a denial-of-service
attack, jamming their target with traffic and decreasing its ability to respond to legitimate connections. Bots may also be used in spam and
phishing attacks.
Zero-Day Exploits
Zero-day threats attack critical systems in real time by exploiting unknown code vulnerabilities, known vulnerabilities that havent been
patched yet, or incorrectly configured systems. By creating an exploit that takes advantage of a vulnerability that vendors are not yet aware of
or for which no patch is available, the attacker can wreak maximum havoc until that window of exposure is closed. Vulnerability exploits can
be configured to steal information or to infect the system with malicious software.
Phishing and Pharming
Phishing capitalizes on the popularity of email as a communication tool. Phishers send official-looking but phony emails to trick recipients into
revealing confidential account, user, or organization information. In some cases, recipients are encouraged to click links in the emails that
lead them to what appears to be an authentic web page. Some fraudulent websites are so convincingly constructed that the browsers
address bar indicates a connection to a legitimate site. In other cases, highly believable bait is used on specific or common groups of people,
such as employees receiving an email seemingly from their manager requesting copies of product roadmaps, launch plans, or engineering
information. Pharming is a variant of phishing. Instead of relying on a victim to accept a baited message, pharmers install malicious code on
a workstation or server that redirects potential victims to a fake site, even if the correct URL was typed in or selected from a list of favorites.
Pharming is phishing on a grander scale to reap even greater rewards.

Page 10 of 14
reserved.

Copyright 2007, Websense Inc. All rights

APPENDIX A : PROPOSED DEPLOYMENT SCENARIO

Page 11 of 14
reserved.

Copyright 2007, Websense Inc. All rights

2007 Websense, Inc. All rights reserved. Websense and Websense Enterprise a registered trademarks of Websense, Inc. in the United States and in certain international markets.
Websense has numerous other trademarks nationally and internationally. All other trademarks are the property of their respective owners.

Page 12 of 14
reserved.

Copyright 2007, Websense Inc. All rights

Page 13 of 14
reserved.

Copyright 2007, Websense Inc. All rights

You might also like