Analytics

7/24/2009
10:02 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

nexTier Networks Releases DLP Solution For SMBs

Compliance Enforcer 100 and 200 appliances combine DLP algorithms with semantic DNA analysis to mitigate data security risks

SANTA CLARA, CA---(July 21, 2009) - nexTier Networks, the company redefining data leak prevention (DLP) with semantic analysis, today announced the immediate availability of a new class of DLP products designed to help small and mid-sized businesses (SMBs) mitigate data security risks. The new Compliance Enforcer 100 and 200 appliances leverage nexTier's powerful DLP algorithms with semantic DNA analysis for advanced accuracy, automated security policy management and compliance reporting in a single, centralized administrator's console. As a result, companies can reduce data security and compliance administration and enforcement from weeks to just minutes while minimizing data breaches and internal malicious threats. According to a recent study by IDC, 60 percent of all corporate data is accessed via an endpoint. As the perimeter of SMB endpoints continues to expand, encryption is no longer a viable protection option for company data. The nexTier solution delivers data security far beyond encryption and protects companies against both inadvertent and malicious attacks while complying with government and regulatory mandates. Using a unique DLP approach with a highly defensible, patented technology for data leak prevention, nexTier safeguards both structured and unstructured data with rapid deployment and minimal human intervention.

One of the biggest challenges for companies today is protecting ever-increasing amounts of sensitive data, and that data is increasingly unstructured and harder to discover. Access to sensitive documents needs to be tightly controlled. nexTier's Compliance Enforcer solution enables organizations to identify and protect their information no matter where it is located in the enterprise by automatically discovering sensitive information and applying semantic intelligence to determine what the document's content is, who can access what data, and where it can and cannot be sent to enforce business policies and compliance.

The result is increased visibility into all information across the business and greater control and protection of that information. Additionally, nexTier's language-independent algorithms interpret and correlate the unique DNA of data to determine and apply security policies in real-time. Highly resistant to evasion, nexTier's algorithm can determine the origin of information even if data has been retyped into a brand new document, or rearranged and reworded in an evasive or subversive manner - minimizing internal threats and malicious intent.

"Recent trends clearly show that enterprises are taking serious interest in implementing technologies that could aid in securing sensitive enterprise data from being extruded and used with malicious intent," said Frost & Sullivan Research Analyst, Achyuthanandan Sampath. "nexTier Networks' unique approach to DLP could comprehensively secure data leaks by automatically identifying sensitive information and preventing leakage by applying security policies in real-time. In a short time span, the company has emerged into a leading innovator in the DLP domain."

Aimed at enabling small businesses to address increased security threats in the face of budgetary pressures and stringent data compliance regulations, nexTier's Compliance Enforcer is now available as a 1U or 2U rack-mountable server appliance. The appliances proactively protect information at the gateway, departmental level or across the enterprise, delivering a simple, plug and play approach to DLP. Built from the ground up to significantly reduce deployment time to less than an hour, Compliance Enforcer cuts configuration and initial set-up time to minutes and eliminates the requirement of on-going manual pre-tagging and pre-processing of sensitive data. This reduces both short and long-term total cost of ownership.

Using nexTier's patented advanced identity and role-based contextual DLP paradigm, the Compliance Enforcer leverages existing enterprise directories (LDAP, Active Directory, RADIUS, Human Resources databases) and other information repositories for fast and consistent policy deployment. An advanced DLP Policy Synthesis Engine eliminates laborious policy setting processes further by automatically applying technology to achieve the highest granularity found in DLP solutions. Once installed, security personnel may use nexTier's Conceptual-Contextual Policy settings to monitor and control who can access and send what information to whom and through what protocol or application.

"Enterprises of all sizes are increasingly being required to meet the mounting demands of regulatory compliance, putting the SMB at a distinct disadvantage in terms of cost and personnel," said Tarique Mustafa, CEO and founder of nexTier Networks. "nexTier's Compliance Enforcer appliances give small businesses an affordable, easy-to-deploy DLP solution that protects data in real-time, while identifying threats and performing remediation activities with recommended actions. nexTier's DLP technology also addresses the significant limitations of other DLP products by greatly reducing deployment time and keeping data storage requirements to a minimum."

Pricing & Availability nexTier Networks' Compliance Enforcer products are now shipping as pre-built and pre-configured appliances. Compliance Enforcer is easily customizable and starts at US $30,000 for 100 users. With its Compliance Enforcer product, nexTier offers the most affordable DLP with unprecedented accuracy and real-time analysis, providing best return on investment to meet compliance and security needs. For more information contact: [email protected]

About nexTier Networks Headquartered in the heart of Silicon Valley USA, nexTier Networks introduced the industry's first semantically-aware data leak prevention technology. nexTier's DLP protects data based on its contextual and conceptual meaning, using a powerful correlation engine and security algorithms to identify, classify and protect large volumes of information in real-time, with unprecedented accuracy. nexTier was named IDG's Network World "10 IT Security Companies To Watch" List and was awarded Frost & Sullivan's 2009 North American Network Security Infrastructure Protection Excellence in Technology of the Year Award, recognizing the company's achievement in creating innovative technology. The company was founded by Silicon Valley security veteran Tarique Mustafa and is backed by a team, board and advisors that include leading authorities from companies like Symantec, McAfee, VeriSign, Cisco, Juniper, GreenBorder, Sygate and Securify. For more information, see http://nextiernetworks.com/.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12480
PUBLISHED: 2018-11-15
Mitigates an XSS issue in NetIQ Access Manager versions prior to 4.4 SP3.
CVE-2015-9274
PUBLISHED: 2018-11-15
HarfBuzz before 1.0.4 allows remote attackers to cause a denial of service (invalid read of two bytes and application crash) because of GPOS and GSUB table mishandling, related to hb-ot-layout-gpos-table.hh, hb-ot-layout-gsub-table.hh, and hb-ot-layout-gsubgpos-private.hh.
CVE-2018-19286
PUBLISHED: 2018-11-15
The server in mubu note 2018-11-11 has XSS by configuring an account with a crafted name value (along with an arbitrary username value), and then creating and sharing a note.
CVE-2018-19287
PUBLISHED: 2018-11-15
XSS in the Ninja Forms plugin before 3.3.18 for WordPress allows Remote Attackers to execute JavaScript via the includes/Admin/Menus/Submissions.php (aka submissions page) begin_date, end_date, or form_id parameter.
CVE-2018-19288
PUBLISHED: 2018-11-15
Zoho ManageEngine OpManager 12.3 before Build 123223 has XSS via the updateWidget API.