Risk
12/3/2013
03:22 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Forum Systems Teams With immixGroup To Deliver Security Solutions To The Public Sector

Forum Systems' FIPS-certified Forum Sentry API Security Gateway will be available through immixGroup’s contract vehicles

WASHINGTON, GOVERNMENT IT FORUM, BOOTH #201A, and BOSTON, December 3, 2013 – Forum Systems Inc. is partnering with immixGroup, Inc. to deliver its FIPS-certified Forum Sentry API Security Gateway to public sector IT organizations through immixGroup's contract vehicles. The announcement comes in conjunction with the Government IT Forum where Forum Systems is showcasing Forum Sentry in Booth #201A.

Processing and securing more than 10 billion transactions per day worldwide, Forum Sentry significantly reduces the cost and complexity of centralizing security, identity and governance for hundreds of global organizations, including some of the world's largest federal agencies. The industry leader in SOA, XML and Mobile Gateway technology, Forum Sentry provides FIPS 140-2 level security, has been independently certified by NIST, DoD and the U.S. Treasury, and holds the industry's only patent for cryptographic acceleration of security processing.

Since 1997, immixGroup has helped technology companies do business with the government. Its public sector aggregation programs give software and hardware manufacturers the resources and expertise they need to grow their public sector business. Government agencies rely on immixGroup to provide them with reliable access to the leading technologies needed to complete their mission objectives.

"Opening up communications between government entities has been a boon for conducting business – but in exposing their critical back-office systems and processes to external partners, those agencies have created a larger attack surface area. That, in turn, is increasing their cyber security risk," said Bruce Herron, Vice President of Worldwide Sales for Forum Systems. "By partnering with immixGroup, we are reaffirming our long-standing commitment to the public sector in delivering patented, industry-leading gateway technology that accelerates and secures the interagency communication that drives efficient, effective and safer B2B exchange."

In October, Forum Systems unveiled the latest version of its flagship Forum Sentry. Expanding on its market-leading capabilities, Forum Sentry features intelligent edge caching for network optimization, Amazon S3 integration for secure enterprise-to-cloud storage and expanded OAuth 2.0 support to simplify mobile SSO. Notably, Forum Sentry is the industry's only FIPS 140-2 secured edge caching solution that provides tight integration with all enterprise-class identity stores to satisfy mobile users' demand for anytime, anywhere access while ensuring the highest levels of network security.

"Forum Sentry is a FIPS-certified security gateway that meets the unique, exacting requirements of public sector IT organizations," said Chris Wilkinson, Director of Cyber Security Technologies at immixGroup. "We are pleased to partner with Forum Systems and offer the company's API Security Gateway through our contract vehicles, enabling government agencies to procure this technology to help meet their business and organizational objectives."

About immixGroup, Inc.

immixGroup helps technology companies do business with the government. immixGroup's unique platform of services enables software and hardware manufacturers and their channel partners to grow their public sector business and accelerate the sales cycle. Since 1997, immixGroup has delivered the specialized resources and expertise these companies need to increase their revenue, support their demand creators, and operate efficiently. And government agencies trust immixGroup to provide leading IT products through their preferred contracts and business partners. For more information, contact immixGroup, Inc. at 703-752-0610, via email at info@immixgroup.com, or on the Web at www.immixgroup.com.

About Forum Systems

Forum Systems, a wholly owned subsidiary of Crosscheck Networks, Inc., is the innovation leader in content security gateway technology. The industry's most comprehensive solution for centralized security, identity and governance for SOA, REST and mobile communications, Forum Sentry enables comprehensive threat mitigation and trust enablement, providing enterprises and government organizations worldwide with the foundation for achieving Secure Service Mediation. Processing more than 10 billion transactions per day worldwide, the FIPS- and DoD-certified Forum Sentry API Security Gateway delivers unparalleled protection against HTML-, XML-, SOAP- and REST-based vulnerabilities. Notably, Forum Systems products provide simplified integration and task processing with over 100 built-in, standards-based processing tasks. For more information, please visit www.forumsys.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web