Attacks/Breaches
12/19/2012
07:20 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

WatchGuard Rolls Out Enhanced XCS 280 And XCS 580 Security Appliances

Provides SMBs with a centralized management dashboard

SEATTLE, Dec. 19, 2012 /PRNewswire/ -- WatchGuard® Technologies, a global leader in manageable business security solutions, today announced the availability of its enhanced Extensible Content Security (XCS) solutions for small and mid-sized businesses (SMBs). The XCS 280 and XCS 580 models offer improved value for customers. The XCS 580 and XCS 280 provide the same trusted content protection with performance improvements up to 50% at a more affordable price point than prior models.

Available to customers now, the XCS 280 and XCS 580 provides SMBs with a centralized management dashboard, making it easier for customers to manage security options and create reports. In addition, customers have instant access to WatchGuard LiveSecurity Plus, which provides 24/7 web or phone-based support services.

WatchGuard XCS 280 and 580 appliances have been optimized for ease-of-use for SMB customers who may not have a dedicated IT security team. The Data Loss Prevention Wizard, ReputationAuthority and Web Security subscriptions all make it easier for customers with limited IT resources to deploy and maintain an enterprise-class content security solution at an affordable price point.

"With increased security threats targeting small and medium-sized business, it is essential for business owners to keep their important and sensitive information safe," said Roger Klorese, WatchGuard's Director of Product Management. "The WatchGuard XCS solution provides the web and email content security, management and reporting features that SMBs need to maintain the highest level of security and defend against attacks."

WatchGuard offers five XCS models to provide organizations of all sizes with a suite of content security functionality, including email security, web security and data loss prevention. These solutions provide the most effective defense from email and web-based threats, including spam, viruses, malware, URL filtering, blended threats, spyware and network attacks, and block 98% of threats and spam at the network perimeter.

About WatchGuard Technologies, Inc.

Since 1996, WatchGuard® Technologies, Inc. has been a global leader of business security solutions that solve real world security problems. WatchGuard provides easy-to-use but enterprise-powerful protection to hundreds of thousands of businesses worldwide. The WatchGuard family of threat management devices provides network, application and data protection, with unparalleled levels of manageability, usability, and visibility. WatchGuard products are backed by WatchGuard LiveSecurity® Service, an innovative support program. WatchGuard is headquartered in Seattle, Wash. with offices throughout North America, Europe, Asia Pacific, and Latin America. To learn more, visit www.watchguard.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: nice post
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1750
Published: 2015-07-01
Open redirect vulnerability in nokia-mapsplaces.php in the Nokia Maps & Places plugin 1.6.6 for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the href parameter to page/place.html. NOTE: this was originally reported as cross-sit...

CVE-2014-1836
Published: 2015-07-01
Absolute path traversal vulnerability in htdocs/libraries/image-editor/image-edit.php in ImpressCMS before 1.3.6 allows remote attackers to delete arbitrary files via a full pathname in the image_path parameter in a cancel action.

CVE-2015-0848
Published: 2015-07-01
Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image.

CVE-2015-1330
Published: 2015-07-01
unattended-upgrades before 0.86.1 does not properly authenticate packages when the (1) force-confold or (2) force-confnew dpkg options are enabled in the DPkg::Options::* apt configuration, which allows remote man-in-the-middle attackers to upload and execute arbitrary packages via unspecified vecto...

CVE-2015-1950
Published: 2015-07-01
IBM PowerVC Standard Edition 1.2.2.1 through 1.2.2.2 does not require authentication for access to the Python interpreter with nova credentials, which allows KVM guest OS users to discover certain PowerVC credentials and bypass intended access restrictions via unspecified Python code.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report