Thursday, February 17, 2011

Fortinet launches new data center security appliance


Fortinet, a network security provider and the worldwide leader of unified threat management (UTM) solutions - today announced the addition of a new consolidated security appliance to its award-winning FortiGate product family. Fortinet will showcase the new appliance and other products at the RSA Conference in Booth #923 at the Moscone Center in San Francisco from February 14-18.





The FortiGate-3140B consolidated security appliance is designed for large enterprises and data centers requiring maximum firewall, virtual private network and intrusion prevention system (IPS) performance to optimize protection against blended threats, destructive malware and constantly evolving attempts to breach security in high-speed network environments.

Big Performance; Small Form Factor

Leveraging custom FortiASIC processors, the FortiGate-3140B appliance provides large enterprises with up to 58 gigabits-per-second of firewall performance, 10 Gbps of IPS performance, and up to a robust 22 gigabits-per-second of VPN performance, all in a highly compact two rack unit (2-RU) form factor designed to preserve precious wiring closet real estate.

The new appliance comes standard with ten 10-gigabit Ethernet (10-GbE) ports. To provide the most flexible protection for the most demanding network environments, the appliance offers a total of 22 ports, making the system ideal for data center and other high-bandwidth applications. This unmatched port density enables the FortiGate-3140B to be deployed as either a high-performance firewall or a unified threat management solution that can be easily configured to concurrently support VPN, IPS, application control, anti-spam and anti-virus security measures without degrading performance.

Equipped with the third major release of the FortiOS 4.0 MR3 operating system, the FortiGate-3140B will feature active profiling for improved policy enforcement and flow-based inspection for superior Web filtering and traffic shaping.

"Our large enterprise customers are vocal about their need for proactive security measures that can combine the trifecta of high performance, consolidated threat management, and ease of deployment in a single appliance," said Bashar Bashiereh, regional director at Fortinet Middle East. "And once again, we're responding to this directive with the release of our latest additions to the FortiGate product line. By innovating across hardware, software and 'threat landscape' dimensions, we continue to meet the evolving security requirements of our worldwide customer base."

The FortiGate-3140B rounds out the update of the FortiGate-3000 series family, joining the FortiGate-3950B, which delivers up to 120 Gbps of low-latency firewall inspection performance to help secure the most demanding enterprise environments, as well as the FortiGate-3040B, which delivers up to 40 Gbps of exceptionally low latency, wire-speed firewall inspection. This appliance family takes full advantage of the broad advancements offered in the FortiOS 4.0 MR3 operating system also announced today.

Availability

The FortiGate-3140B is available now.

Fortinet Launches Powerful Operating System Upgrades That Extend Wireless Networking and Integrated Security for Wired and Wireless Networks

SUNNYVALE, CA, Feb 14, 2011 (MARKETWIRE via COMTEX) --
Fortinet(R) (FTNT) -- a leading network security provider
and the worldwide leader of unified threat management (UTM) solutions
-- today announced a new release of its FortiOS(TM) 4.0 operating
system for the FortiGate product family, including today's newly
introduced FortiGate-3140B multi-threat security appliance. Fortinet
will showcase these and other products at the RSA Conference in Booth
#923 at the Moscone Center in San Francisco from February 14-18.
(editors note:Please see today's announcement regarding Fortinet's
launch of the FortiGate-3140B security appliance.)



The broad advancements offered in the FortiOS 4.0 MR3 operating
system introduce wireless controller extensions that support
automatic provisioning of wireless access points, detection and
suppression of rogue access points, multiple authentication methods
and strengthened unified management of both wired and wireless
networks from a single FortiGate platform. The upgrade also
introduces active profiling and flow-based threat inspection
enhancements to the robust OS that already integrates firewall,
virtual private network (VPN), intrusion prevention (IPS), antivirus,
application control and many other security technologies.


Expanded Wireless Options
With the release of FortiOS 4.0 MR3,
powerful new security features and performance enhancements are now
available for FortiGate consolidated security appliances. The
advanced FortiOS operating system expands the wireless controller
capabilities of any FortiGate running FortiOS 4.0 MR3. These
capabilities improve security by enabling role-based access control
to limit access to regulated, proprietary, or confidential data based
upon a user's role, as well as allowing customers to meet wireless
PCI DSS compliance with improved rogue AP on-wire detection and
suppression and integrated management and reporting for both wireless
connectivity and security.


As a complement to this firmware feature, Fortinet is also
introducing the FortiAP-222B outdoor wireless access point (AP),
which completes the FortiAP family of access points and allows
enterprise-wide wifi coverage across the campus with seamless
roaming. The FortiAP-222B is a high power dual-radio outdoor thin AP
that provides wireless client access or air monitor in a ruggedized
weather-resistant enclosure. This device will benefit enterprises
looking to extend their wireless network to challenging
non-temperature controlled environments, or beyond the physical
footprint of a building or campus. The simple-to-manage-and-deploy
FortiAP-222B uses an industry leading high gain 27dB transmit output
and highly sensitive receiver which permits coverage to a vast area.


FortiOS Inspection Enhancements
The advanced FortiOS operating
system features active profiling that provides the ability to use a
form of behavioral analysis to create and actively enforce policies
based on deviations from corporate, group or individual baseline
profiles. A range of policy enforcement options is available for
suspicious behavior, including monitoring, quarantining and/or
outright blocking.

Exchange Server in a Box?

The continued success of the Apple iPad at eating into the laptop market has had me thinking about appliances—not the kind you find in your kitchen, but the kind that vendors such as Barracuda Networks and Azaleos sell. These appliances (for those of you who have been locked in a concrete bunker for the past few years) are essentially single-purpose servers that you install to provide a specific function on your network. The function, and hardware configuration, varies from vendor to vendor, but the basic idea is to deliver a service that requires a minimum of effort from the system administrator. The vast majority of appliances sold into the market are highly specialized. For example, if you're using a conventional hardware firewall, that's an appliance. So is the wireless router you have at home. So is your TiVo.


The whole idea of appliances seems like it would conflict with the direction that Microsoft Exchange Server (and now Lync) have taken: increasingly flexible, and complex, roles that can be combined or split onto separate machines. The idea behind appliances is to increase simplicity by clever packaging and configuration, and sometimes by adding vendor-specific utilities or customizations. For example, Barracuda's line of messaging-related products is based on open-source tools that Barracuda has extended and customized; Barracuda has added value to tools you could get for free by making them easier to configure and use, and by adding unique features.


Exchange Server has been largely immune to the appliance trend. Some functional areas, such as antispam and antivirus, have been successfully appliance-ized (a word I just made up) but Exchange itself hasn't. There are a number of reasons for this. The biggest reason is probably the simple fact that Exchange is designed to integrate with Active Directory (AD), Microsoft Outlook, SharePoint, and Office Communications Server (OCS)/Lync. This integration means you can't just stick a self-contained Exchange server into a rack and call it good—and as soon as you have to start integrating something with AD and other infrastructure components, you lose many of the theoretical time- and cost-savings that appliances offer.


Another reason is that Exchange designs aren't one-size-fits-all. For example, I have a customer with about 500 mailboxes that are geographically distributed between London and New York. This company has invested heavily in high availability. I have another customer of similar size whose users are all located in one building; their investments have been very different. Exchange works well for both customers—and many more besides—because of its flexibility. To some extent, flexibility is antithetical to the idea of a single-function appliance that does one thing easily and well.


Of course, another reason we haven't seen Exchange appliances is the advent of cloud-based services. Microsoft has invested heavily in designing Exchange 2010 so that the same code could run both locally and in the cloud, and cloud-based services—at least in theory—offer many of the same potential advantages as appliances: ease of installation, ease of use, and reduced maintenance costs.


Against this background, the recent announcement by HP of its new E5000 line of packaged Exchange solutions is particularly interesting. HP will be announcing more details of its new solutions soon, and I'll have more to say about them when that happens.

Global Unified Threat Management 2008-2012 - a new market research

(live-PR.com) - Reportlinker.com announces that a new market research report related to the Security Systems industry is available in its catalogue.

More information regarding this report:Global Unified Threat Management 2008-2012

http://www.reportlinker.com/p0240410/Global-Unified-Threat-Management-2008-2012.html#utm_source=LivePR&utm_medium=pr&utm_campaign=LivePR




Unified Threat

 



Management (UTM) appliance integrates devices such as firewall, Virtual Private Network (VPN), intrusion detection and prevention, and gateway into a single platform for threat management. UTM is a single system, handling duties of multiple systems such as guarding against intrusion, filtering content & spam, and performing anti-virus duties. Also, these appliances include security management or policy management.

Many enterprises are adopting UTM appliances to consolidate their network security, reduce cost and improve security management. Moreover, UTM appliances are increasingly preferred as these can add new capabilities with single hardware upgrade; thus, accommodating future scalability.

The UTM market is expected to grow across enterprises with increasing demand for addition of new features such as content security (Web and messaging). These UTM Appliances provide different security applications through dedicated appliances. The UTM Appliance vendors are focusing on the threat mitigation features and design hardware which includes anti-virus, anti-malware, content filtering, and traffic analysis.

The report by TechNavio Insights forecasts the size of the UTM market over the period 2008-2012. Further, it discusses the key market trends, drivers and challenges of UTM market, and profiles some of the key vendors of this market.

(rlk1-2011-02-16) plp



1. Introduction


2. Global UTM Appliance Market

3. Market Segmentation by Geography

3.1 UTM Market in Americas

3.2 UTM Market in EMEA

3.3 UTM Market in APAC

4. Market Trends

5. Sales Drivers

6. Challenges

7. Major Vendor Profiles


7.1 Checkpoint

7.2 Crossbeam

7.3 Fortinet

7.4 Juniper Networks

7.5 SonicWALL

Other Reports in this Series



List of Exhibits

Exhibit 2.1: Global UTM Market in USD millions (2008-2012)


Exhibit 3.1: Market Segmentation of UTM by Geography (2008)

Exhibit 3.2: UTM in Americas - Market Size and Forecast 2008-2012 (in $ billion)

Exhibit 3.3: UTM in EMEA - Market Size and Forecast 2008-2012 (in $ billion)

Exhibit 3.4: UTM in APAC - Market Size and Forecast 2008-2012 (in $ million)















Disclaimer: (c) 2011 Reportlinker. All of the reports and press releases contained herein are protected by copyright and other applicable laws, treaties and conventions. Information contained in the releases is furnished by Reportlinker's, who warrant that they are solely responsible for the content, accuracy and originality of the information contained therein. All reproduction, other than for an individual user's personal reference, is prohibited without prior written permission.


Roaring Penguin Adds Granularity to the CanIt Reputation List

Roaring Penguin Software upgrades their CanIt IP Reputation list. The CanIt IP Reputation list is a key component of the CanIt family of anti-spam solutions for ISPs, Web Hosts, Universities, and Managed Services Providers.


Ottawa, ON -- (SBWIRE) -- 02/09/2011 -- Roaring Penguin Software's CanIt Reputation List collects IP reputation data on e-mail servers fr1om a worldwide network of sensors. Roaring Penguin currently aggregates this data into four DNS-based block lists:




Spam Source: A list of IP addresses that have sent mostly spam and very little non-spam.



Dictionary Attackers: A list of IP addresses that have sent to many nonexistent recipients and very few valid recipients.



Greylist Stumblers: A list of IP addresses that have been thwarted by greylisting. Such machines are typically compromised personal computers.



Good: A list of IP addresses that have passed greylisting, have sent to very few nonexistent recipients, and have sent mostly non-spam. These machines are very likely legitimate mail servers.



To these block lists Roaring Penguin has added a new list called "Mixed" for hosts that send a mixture of spam and non-spam.



Roaring Penguin found that the old "SpamSource" list would often list outbound mail servers for large e?mail providers. These servers tend to send a lot of spam, but they also send a lot of non-spam e-mail.




The change to Roaring Penguin's Reputation Lists means that about 5600 machines formerly listed on the "SpamSource" list are now listed on "Mixed". This still leaves almost 1.9 million machines listed on the "SpamSource" e-mail reputation list.



CanIt 8.0 is available as:



CanIt-PRO, an anti-spam / anti-virus appliance or a soft appliance.

CanIt-Domain-PRO, spam filtering software that allows service providers such as MSPs to host anti-spam for their customers.

Hosted CanIt, a fully outsourced anti-spam solution.



About Roaring Penguin

Founded in 1999, Roaring Penguin Software Inc., specializes in developing spam email blockers The company focuses on fighting spam at the mail server, with the acclaimed CanIt and MIMEDefang product lines. Today, Roaring Penguin develops, deploys and supports its spam- and virus-fighting software for customers that include enterprises, ISPs, campuses, web hosts, and government offices. For more information, visit http://www.roaringpenguin.com.













This press release was listed using SBWire's free press release listing service. SBWire offers both press release listing and press release distribution services starting at $24.95 per press release. SBWire also offers many additional services such as Hosted News Room, SBWire CRM, SBWire Connect and more.

mikado soft GmbH präsentiert sich auf der CeBIT 2011

NAC-Software macmon jetzt auch mit WLAN-Unterstützung







Berlin
(pts/01.02.2011/12:47) -

Der Berliner Netzwerk-Security Experte mikado soft wird sich auf der diesjährigen CeBIT vom 01. bis 05. März im Rahmen der Security Plaza in Halle 11, Stand 16 mit der neuesten Version seines Netzwerksicherheitssystems macmon präsentieren. Zudem berichtet das Unternehmen in Vorträgen im Rahmen der Heise CeBIT Security Plaza über sein Engagement in IF-MAP Forschungsprojekten.



macmon 3.3. mit neuen Funktionen

macmon 3.3. enthält eine Reihe von neuen Funktionen. Hierzu gehört insbesondere ein dezidierter WLAN-Support, der es Unternehmen oder Institutionen ermöglicht, Gästen mit Smart-Devices und anderen mobilen Rechnern einen kontrollierten Zugriff auf das Unternehmensnetz zu gewähren. Die Appliance wurde überarbeitet und die grafische Benutzeroberfläche erweitert, um die Konfiguration auch in komplexen Netzwerken zu vereinfachen. Durch die Integration verschiedener Dienste werden die Administrationsprozesse rationalisiert und weitere Sicherheitsfunktionen (Antivirus, IDS-Systeme, etc,) integriert.



mikado soft wird sich auf der CeBIT gemeinsam mit seinen Partnern Bücker EDV, P&W Netzwerk, alcera Kommunikationstechnik und DMN Solutions präsentieren, die Lösungen rund um das System macmon vorstellen werden.




NAC-Lösung macmon

macmon ist eine Hersteller unabhängige Network-Access-Control (NAC) Software, die IT-Prozesse sichert und das LAN vor unautorisierten, nicht sicheren Geräten und internen Angriffen schützt.



Als modulares System für unterschiedliche Sicherheitsanforderungen schafft macmon umfassende Transparenz im Netzwerk und bietet einen nachweisbaren Return-On-Investment durch leichte Integrierbarkeit, einen geringen Installations- und Betriebsaufwand, die Optimierung der Netzwerk-Administration sowie messbare Energie-Einsparungen. IT-Manager erlangen mit macmon zudem eine deutliche Arbeitsentlastung, da das Sicherheitsmanagement an einer zentralen GUI über das gesamte Unternehmensnetzwerk hinweg organisiert und überwacht werden kann.



Vorträge zum Engagement in IF-MAP Forschungsprojekten auf der CeBIT

mikado soft beteiligt sich an Forschungsprojekten zu neuen Sicherheits-Standards. Aktuell arbeitet das Unternehmen gemeinsam mit Partnern aus dem Forschungsbereich und der Industrie an der Weiterentwicklung des Standards "IF-MAP" der Trusted Computing Group und wird im zweiten Halbjahr 2011 eine Lösung anbieten. IF-MAP erlaubt den Austausch von Informationen zwischen verschiedenen Sicherheitssystemen, um durch eine Bewertung aller verfügbaren Daten die Sicherheitssituation deutlich zu erhöhen. Informationen stellt mikado in Vorträgen auf der Heise CeBIT Security Plaza vor.



mikado soft gmbh

Die deutsche mikado soft gmbh ist auf die Entwicklung, Pflege und den Vertrieb von Lösungen für die Netzwerk-Sicherheit spezialisiert. Die eigen entwickelte, Hersteller unabhängige und modulare NAC-Software macmon schützt das LAN vor unautorisierten, nicht sicheren Geräten und internen Angriffen.



mikado soft ist das jüngste Mitglied der mikado-Gruppe, angeführt von der mikado ag. Gegründet vor 25 Jahren in Berlin, ist die mikado ag als Beratungs- und Serviceunternehmen darauf spezialisiert, die Verfügbarkeit von IT-Prozessen in Unternehmen sicherzustellen. Die mikado Gruppe beschäftigt etwa 50 Mitarbeiter in Deutschland. Von den Security-Dienstleistungen und -Produkten profitieren europaweit Unternehmen unterschiedlicher Branchen. Zum Kundenstamm gehören u. a. Bundesministerien, Volkswagen, Müller Milch, Total, ZF, SWR, Vivantes, KfW Kreditanstalt für Wiederaufbau, Sparkassen und Volksbanken.

Firmensitz der mikado soft gmbh ist Berlin.



mikado ist Mitglied bei BITKOM, SIBB und der Trusted Computing Group.

(Ende)











Aussender: TC Communications


Ansprechpartner:


Thilo Christ

email: thilo.christ@tc-communications.de

Tel. +49(0)8081 954617


Websense unveils solution to protect data over email, social web



Websense unveils solution to protect data over email, social web
Announcement / Corporate February 04, 2011, 13:42 IST

Customer-proven TRITON solution now enabled with next-generation email security, hybrid deployment, and data loss prevention all from a single management console, single appliance and single vendor - Websense


Websense, Inc.(NASDAQ: WBSN) – In an age of borderless organizations, social media, cloud applications, WikiLeaks, tablets and smartphones – modern, blended security threats from Aurora to Zeus are slipping past standard security products unchecked. With no network perimeter or standard endpoint to secure, only Websense can secure the content itself by identifying, classifying and understanding content in all of its forms and wherever it travels so that it can be protected from attack, theft and misuse. Through this innovative approach, the Websense® TRITON™ solution is unique in its ability to remove threats and risks while enabling organizations to take advantage of rich internet applications, SaaS, social media and mobility.



The Websense TRITON solution stands in marked contrast to traditional firewall UTMs, which do not scale to solve today’s security threats, and other legacy controls like antivirus and URL filters that look only at the file and website. The TRITON solution is the first, and only, content UTM delivering uncompromising security in a consolidated appliance solution. And with the innovation delivered in this release, Websense TRITON marks the beginning of the era of the content-secure enterprise.

The new flagship offering, Websense TRITON Security Gateway Anywhere, combines Websense Web and Email Security Gateway technology, including hybrid deployment and data loss prevention (DLP), into the world’s first unified content security gateway. The TRITON gateway consolidates on-premises email and Web security on a single Websense V-Series™ appliance, complemented by cloud-based SaaS components, for ultimate efficiency and effectiveness, and DLP to prevent the loss of confidential information and aid in compliance.


The TRITON architecture is a modular system, so customers can easily and efficiently expand coverage and services as their needs grow. Included in this release, for example, and ideal for existing Websense Web Filter customers, is support for Websense Web Security on the V-Series appliance. This provides Web Filter customers with enhanced security, consolidation and expandability to other TRITON services. Modular design like this helps organizations build and adapt their TRITON solution, and delivers a platform for the future, supporting soon-to-be announced Websense Mobile DLP™ and Cloud DLP™ services.


The innovative, first of its kind TRITON gateway unites the next generation of email security into the TRITON solution. Based on more than 10 years of proven email security expertise, this revolutionary new email security incorporates enterprise-class DLP, advanced encryption and archiving for email. Unlike “lite” DLP offered by other companies, Websense TruEmail DLP™ uses Websense market-leading DLP technology to accurately identify confidential data, virtually eliminating false positives and negatives and delivering full workflow and reporting. It also benefits from TruHybrid™ deployment capabilities so that spam is filtered in the cloud before it hits customer’s networks and confidential data can be secured on premises before it leaves the network.


“Websense already leads the content security software market,” said John McCormack, president, Websense. “Everybody else is providing a portfolio of point products. Only Websense made a four-year investment to build a platform that truly unifies and consolidates Web security, email security and DLP in a way that is greater than the sum of its parts AND reduces costs.”



The unique way that the TRITON architecture unifies and consolidates security eliminates bloated duplication of systems, saving customers capex and opex. The unified elements also share intelligence with each other for the most effective protection against blended data-stealing attacks and internal threats. Through this unification, Websense TRITON dramatically lowers the total cost of ownership by 45 percent over competitive offerings.


Sharing more than 10 years of real-time intelligence gathered by the Websense ThreatSeeker™ Network and the Websense Advanced Classification Engine (ACE), the TRITON solutions are more effective at battling blended threats that have rendered traditional defenses obsolete. For example, Websense doesn’t just block Web threats in browsers, the malicious links can also be stripped from incoming emails. Also, the Websense Web solution is data aware to stop important documents from being leaked or stolen. ACE combines multiple content analysis services to identify security threats and inappropriate content that bypass traditional security technologies and it does it all in real time.


“Websense hybrid deployments give us the confidence we need as a leading pan-European operator with thousands of remote workers,” said David Rigby, IT Network Manager, P&O Ferrymasters (A Dubai World Company). “It’s all about the right access to the right data for the right people, whether on-premises or off. As a shipping and logistics company, we always have employees at customer sites, and they are entering and communicating confidential data like manifests and invoices. With Websense TRITON-based products, like their Web Security Gateway and email security, we feel confident that our systems stay clean of malware and the integrated DLP helps make sure that sensitive data stays where it should, without fear of data loss.”


“There is no question that the threat landscape is evolving at a rapid pace,” stated Michael Suby, VP of Research at Stratecast (a Division of Frost & Sullivan). “Furthermore, cyber perpetrators will readily pounce on exploitable gaps in legacy security products. What Websense is accomplishing with its TRITON architecture is providing businesses with an extensible and adaptable mechanism to fight fire with fire.”


For more information, watch this Websense TRITON video. Learn more at websense.com.