Analytics
5/1/2012
05:17 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Cymtec Introduces Sentry 4.0 With Context-Aware Network Visibility, Control And Reporting

Sentry 4.0 architecture correlates network visibility and control functions

SANTA CLARA, Calif., May 1, 2012 /PRNewswire-iReach/ -- Cymtec®, an innovative provider of context-aware network solutions that simplify the complexities of enterprise network visibility, control and regulatory compliance reporting challenges, today announced the availability of Sentry 4.0.

(Photo: http://photos.prnewswire.com/prnh/20120501/CG97725)

Release 4.0 introduces context-awareness to the Sentry platform, with a highly intuitive user experience that provides IT-staff complete network visibility and control. The Sentry 4.0 architecture correlates network visibility and control functions for users, applications, web traffic and malware threats. This unique correlation allows IT-staff to quickly identify the root cause of increasingly complex network problems and take informed corrective actions. Sentry 4.0 empowers IT managers with one comprehensive network tool that solves problems in minutes rather than hours and places critical network events into context.

The context-awareness of the Sentry architecture is empowered by industry leading best-of-breed technologies from McAfee, Webroot and Vineyard Networks and simplifies the traditional complexities that other network monitoring and management point products typically provide.

"Multiple networked devices per employee are the norm today. Bandwidth hungry phones, tablets and notebooks, most user-owned are not only consuming critical corporate network capacity, but they also introduce uncontrolled security risks." Commented Andrew Rubin, CEO of Cymtec, "Exercising visibility and control over these devices, both centrally and at remote locations is one of the biggest challenges that IT-organizations face today. Sentry integrates, correlates and simplifies these functions and provides one context-aware network tool that solves it all."

"We are constantly searching for disruptive products, solutions or delivery models for our customers and Cymtec Sentry gives us all three." Said Scott Mayers, Principal at Cymtec channel partner Align Communications. "Sentry brings together the ultimate network visibility, control and reporting tool, along with a unique context-aware architecture, solving customer pain-points in a unique and differentiated manner. Our Cymtec Sentry deployments have been successful every time and our customers' expectations have been exceeded."

Sentry 4.0 is available today, through Cymtec authorized channels and is supported on all Sentry appliance models. For more information please contact Cymtec on +1.408.200.5100 or send an email to info@cymtec.com.

About Cymtec:

Cymtec's products and services are broadly and strongly endorsed by customers in industries including financial services, legal, professional services, retail, manufacturing and many more. By delivering simple, scalable and highly functional products in a cost-effective deployment model, Cymtec has aggressively expanded its geographic footprint, now inclusive of 30+ countries throughout the Americas, Europe and Asia. Our customers range in size from 20 to 20,000 users and have networks spanning the globe.

Learn more about Cymtec on: www.cymtec.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-4988
Published: 2014-07-09
Heap-based buffer overflow in the xjpegls.dll (aka JLS, JPEG-LS, or JPEG lossless) format plugin in XnView 1.99 and 1.99.1 allows remote attackers to execute arbitrary code via a crafted JLS image file.

CVE-2014-0207
Published: 2014-07-09
The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.

CVE-2014-0537
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-0539
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-3309
Published: 2014-07-09
The NTP implementation in Cisco IOS and IOS XE does not properly support use of the access-group command for a "deny all" configuration, which allows remote attackers to bypass intended restrictions on time synchronization via a standard query, aka Bug ID CSCuj66318.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.