Analytics
12/19/2012
07:14 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

GravityZone By Bitdefender Hits Market February 2013

GravityZone provides full scale enterprise-wide management of physical, virtual, and mobile endpoints

Wednesday, December 19, 2012 - Bucharest, Romania– Bitdefender, an award-winning provider of innovative security solutions, today announced GravityZone will be available for on February 25, 2013. The company launched its GravityZone beta program on November, 2012, and early results demonstrate significant positive feedback.

GravityZone is built on Bitdefender Gravity Architecture, which is a centralized security management system. Using cloud computing architecture, GravityZone represents a breakthrough in its integration with VMware, Citrix and Microsoft, and it offers unprecedented time and cost savings due to its ability to offload scanning and deduplication functionality for physical and virtual environments. The first of its kind, GravityZone provides full scale enterprise-wide management of physical, virtual and mobile endpoints.

"Based on what we're hearing from our beta testers, other solutions on the market may be well-marketed, but do not deliver in terms of scalability or competitive solutions are still considered 'first generation'," said Gavin Hill, Director of Product Marketing, Bitdefender. "GravityZone is built based on the vision that enterprises need to centralize the management of all endpoints, they need to do it in a highly scalable way, and they need to do it without draining resources."

"We've been testing GravityZone since the beta program started, and its proving to deliver the kind of security management solution for all endpoints in a mixed environment – physical, virtual and mobile," said Dennis Derks, ICT Consultant, FlexVirtual. "From the beginning, we noticed that deploying GravityZone took very little time than we have experienced with competitive solutions on the market. In our company datacenter we are testing GravityZone with VMware vShield, Windows 8 and the latest Android platform, and this has been one of the quickest and most reliable tools we've implemented. Furthermore, unlike other solution providers, the Bitdefender support and development teams have been highly responsive and dependable for any needs or updates we require. We've been very impressed."

"GravityZone has a special appeal to service providers of all kinds, especially MSPs who are responsible for the management and performance of their customers' IT operations, and who may fall under regulatory compliance laws such as HIPPA, SOX, PCI-DSS, GLBA, FISMA and others," said added Gavin Hill. "All organizations, which face dealing with security management for BYOD and hybrid environments, now have an easy, modular solution that scales to meet the unique needs of today's enterprises."

"Innovative solutions like GravityZone will be added to FlexVirtual's solution stack for End User Computing, because of its simplicity during implementation and effectiveness in production environments," said Alex Pelster, Director, FlexVirtual.

GravityZone licensing will be modular and flexible, based on CPU or VMs (virtualization) or protected endpoints (physical and mobile).

GravityZone appeals to customers of all sizes, GravityZone-in-a-Box is an all-in-one virtual appliance that caters to less than 250 seats, providing physical, virtualization and mobile security from one console. GravityZone is designed for customers of 250 seats and above, scaling very rapidly to hundreds of thousands of users, all managed from one console. To sign up for the beta visit http://enterprise.bitdefender.com/en/solutions-and-services/enterprises/GravityZone.html

-- Ends --

Citrix is a trademark of Citrix Systems, Inc in the United States and other countries. Windows is a registered trademark of Microsoft Corporation in the United States and other countries. VMware, VMware vShield and VMware vShield Endpoint are registered trademarks and/or trademarks of VMware, Inc. in the United States and/or other jurisdictions. All other trademarks and registered trademarks are property of their respective owners.

About FlexVirtual

FlexVirtual is a specialized solution company with a 100% focus on Virtualization & Cloud Computing. Our experienced consultants offer consultancy and project skills to the large corporate and medium size businesses in The Netherlands. In a logical way our consultants link virtualization solutions to the different layers in the customer's IT infrastructure. With our background of working at large system integrators combined with years of experience in big virtualization and Cloud projects, FlexVirtual is truly a specialized organization. For more information please visit http://www.flexvirtual.nl or email us at info@flexvirtual.nl

About Bitdefender

Bitdefender is a global security technology company that delivers solutions in more than 200 countries through a network of value-added alliances, distributors and reseller partners. Since 2001, Bitdefender has consistently produced award-winning business and consumer security technology, and is a leading security provider in virtualization and cloud technologies. Through R&D, alliances and partnership teams, Bitdefender has elevated the highest standards of security excellence in both its number-one-ranked technology and its strategic alliances with the world's leading virtualization and cloud technology providers. For more information please visit http://enterprise.bitdefender.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4594
Published: 2014-10-25
The Payment for Webform module 7.x-1.x before 7.x-1.5 for Drupal does not restrict access by anonymous users, which allows remote anonymous users to use the payment of other anonymous users when submitting a form that requires payment.

CVE-2014-0476
Published: 2014-10-25
The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.

CVE-2014-1927
Published: 2014-10-25
The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "$(" command-substitution sequences, a different vulnerability than CVE-2014-1928....

CVE-2014-1928
Published: 2014-10-25
The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulner...

CVE-2014-1929
Published: 2014-10-25
python-gnupg 0.3.5 and 0.3.6 allows context-dependent attackers to have an unspecified impact via vectors related to "option injection through positional arguments." NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.