10:02 AM
Dark Reading
Dark Reading
Products and Releases

nexTier Networks Releases DLP Solution For SMBs

Compliance Enforcer 100 and 200 appliances combine DLP algorithms with semantic DNA analysis to mitigate data security risks

SANTA CLARA, CA---(July 21, 2009) - nexTier Networks, the company redefining data leak prevention (DLP) with semantic analysis, today announced the immediate availability of a new class of DLP products designed to help small and mid-sized businesses (SMBs) mitigate data security risks. The new Compliance Enforcer 100 and 200 appliances leverage nexTier's powerful DLP algorithms with semantic DNA analysis for advanced accuracy, automated security policy management and compliance reporting in a single, centralized administrator's console. As a result, companies can reduce data security and compliance administration and enforcement from weeks to just minutes while minimizing data breaches and internal malicious threats. According to a recent study by IDC, 60 percent of all corporate data is accessed via an endpoint. As the perimeter of SMB endpoints continues to expand, encryption is no longer a viable protection option for company data. The nexTier solution delivers data security far beyond encryption and protects companies against both inadvertent and malicious attacks while complying with government and regulatory mandates. Using a unique DLP approach with a highly defensible, patented technology for data leak prevention, nexTier safeguards both structured and unstructured data with rapid deployment and minimal human intervention.

One of the biggest challenges for companies today is protecting ever-increasing amounts of sensitive data, and that data is increasingly unstructured and harder to discover. Access to sensitive documents needs to be tightly controlled. nexTier's Compliance Enforcer solution enables organizations to identify and protect their information no matter where it is located in the enterprise by automatically discovering sensitive information and applying semantic intelligence to determine what the document's content is, who can access what data, and where it can and cannot be sent to enforce business policies and compliance.

The result is increased visibility into all information across the business and greater control and protection of that information. Additionally, nexTier's language-independent algorithms interpret and correlate the unique DNA of data to determine and apply security policies in real-time. Highly resistant to evasion, nexTier's algorithm can determine the origin of information even if data has been retyped into a brand new document, or rearranged and reworded in an evasive or subversive manner - minimizing internal threats and malicious intent.

"Recent trends clearly show that enterprises are taking serious interest in implementing technologies that could aid in securing sensitive enterprise data from being extruded and used with malicious intent," said Frost & Sullivan Research Analyst, Achyuthanandan Sampath. "nexTier Networks' unique approach to DLP could comprehensively secure data leaks by automatically identifying sensitive information and preventing leakage by applying security policies in real-time. In a short time span, the company has emerged into a leading innovator in the DLP domain."

Aimed at enabling small businesses to address increased security threats in the face of budgetary pressures and stringent data compliance regulations, nexTier's Compliance Enforcer is now available as a 1U or 2U rack-mountable server appliance. The appliances proactively protect information at the gateway, departmental level or across the enterprise, delivering a simple, plug and play approach to DLP. Built from the ground up to significantly reduce deployment time to less than an hour, Compliance Enforcer cuts configuration and initial set-up time to minutes and eliminates the requirement of on-going manual pre-tagging and pre-processing of sensitive data. This reduces both short and long-term total cost of ownership.

Using nexTier's patented advanced identity and role-based contextual DLP paradigm, the Compliance Enforcer leverages existing enterprise directories (LDAP, Active Directory, RADIUS, Human Resources databases) and other information repositories for fast and consistent policy deployment. An advanced DLP Policy Synthesis Engine eliminates laborious policy setting processes further by automatically applying technology to achieve the highest granularity found in DLP solutions. Once installed, security personnel may use nexTier's Conceptual-Contextual Policy settings to monitor and control who can access and send what information to whom and through what protocol or application.

"Enterprises of all sizes are increasingly being required to meet the mounting demands of regulatory compliance, putting the SMB at a distinct disadvantage in terms of cost and personnel," said Tarique Mustafa, CEO and founder of nexTier Networks. "nexTier's Compliance Enforcer appliances give small businesses an affordable, easy-to-deploy DLP solution that protects data in real-time, while identifying threats and performing remediation activities with recommended actions. nexTier's DLP technology also addresses the significant limitations of other DLP products by greatly reducing deployment time and keeping data storage requirements to a minimum."

Pricing & Availability nexTier Networks' Compliance Enforcer products are now shipping as pre-built and pre-configured appliances. Compliance Enforcer is easily customizable and starts at US $30,000 for 100 users. With its Compliance Enforcer product, nexTier offers the most affordable DLP with unprecedented accuracy and real-time analysis, providing best return on investment to meet compliance and security needs. For more information contact: [email protected]

About nexTier Networks Headquartered in the heart of Silicon Valley USA, nexTier Networks introduced the industry's first semantically-aware data leak prevention technology. nexTier's DLP protects data based on its contextual and conceptual meaning, using a powerful correlation engine and security algorithms to identify, classify and protect large volumes of information in real-time, with unprecedented accuracy. nexTier was named IDG's Network World "10 IT Security Companies To Watch" List and was awarded Frost & Sullivan's 2009 North American Network Security Infrastructure Protection Excellence in Technology of the Year Award, recognizing the company's achievement in creating innovative technology. The company was founded by Silicon Valley security veteran Tarique Mustafa and is backed by a team, board and advisors that include leading authorities from companies like Symantec, McAfee, VeriSign, Cisco, Juniper, GreenBorder, Sygate and Securify. For more information, see

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-04-25
In osTicket before 1.12, XSS exists via /upload/file.php, /upload/scp/users.php?do=import-users, and /upload/scp/ajax.php/users/import if an agent manager user uploads a crafted .csv file to the User Importer, because file contents can appear in an error message. The XSS can lead to local file inclu...
PUBLISHED: 2019-04-25
The Wordfence plugin 7.2.3 for WordPress allows XSS via a unique attack vector.
PUBLISHED: 2019-04-25
SEP (Mac client) prior to and including 12.1 RU6 MP9 and prior to 14.2 RU1 may be susceptible to a CSV/DDE injection (also known as formula injection) vulnerability, which is a type of issue whereby an application or website allows untrusted input into CSV files.
PUBLISHED: 2019-04-25
SQL injection vulnerabilities in CMG Suite 8.4 SP2 and earlier, could allow an unauthenticated attacker to conduct an SQL injection attack due to insufficient input validation for the changepwd interface. A successful exploit could allow an attacker to extract sensitive information from the database...
PUBLISHED: 2019-04-25
DaviewIndy 8.98.7 and earlier versions have a Integer overflow vulnerability, triggered when the user opens a malformed Image file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution.