Vulnerabilities / Threats
8/31/2010
05:38 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

NETGEAR Rolls Out New ProSecure Appliance

New UTM50 Appliance Stops More Threats than the Competition while adding Active Directory Integration and Increased Throughput to Serve Growing Businesses

SAN JOSE, Calif., Aug. 30 /PRNewswire/ -- NETGEAR , Inc.(Nasdaq:NTGR), the global networking company that delivers innovative products to businesses, consumers and Internet service providers, today announced the introduction of the NETGEAR ProSecure UTM50 Unified Threat Management Appliance (UTM50). The UTM50 is the latest addition to NETGEAR's award winning ProSecure UTM line, which protects businesses from the exponentially growing number of virus and malware threats, dangerous websites, spam emails, and hackers that threaten business environments today. Optimized for larger businesses and built with scalability in mind, the UTM50 enables businesses to protect themselves through a wide array of tools including firewall, SSL and IPSec VPN, URL filtering, network antivirus, and antispam. Widely lauded and recognized worldwide in 2010 by leading security publications as a producer of industry-leading UTMs, NETGEAR continues to outpace the competition and challenge the existing order of small and mid-market business security solutions.

The ProSecure UTM50 is an extension of the award-winning ProSecure UTM10 and UTM25 Unified Threat Management series. In addition to the benefits of these appliances, the ProSecure UTM50 integrates with Microsoft Active Directory enabled environments for single-sign-on security policies - an almost universal requirement for larger businesses around the world.

"The integration of the UTM50's security policies with Microsoft Active Directory made the solution a great fit for our business," said Frank Burnham, O'Donnell, Ficenec, Wills & Ferdig, LLP, a professional services firm that specializes in Accounting, Tax, and Audit. "Given the dynamic threat environment facing organizations today, we found the ProSecure UTM50 to be the most effective device in offering us a full featured, centralized, and flexible security component essential for network operations. We were able to achieve increasing employee productivity on the Internet through the URL filtering features and reduce our threat exposure substantially."

"Businesses need a UTM that performs without having to make concessions on security checking or consuming administration time. We find that many vendors' solutions are too big, over-featured and complex for their customers' own good," said Eric Ogren, principal analyst at the Ogren Group. "With the addition of the UTM50 to their ProSecure line, NETGEAR addresses what businesses up to 100 users need to safely use public networks with security tasks performed at optimum efficiency."

In recent testing during August 2010, The Tolly Group in partnership with AVTest GmBH evaluated the ability of the UTM50 to stop malware threats entering over web traffic via the HTTP protocol. The test found NETGEAR ProSecure to be particularly effective at stopping zoo malware, threats that appliance manufacturers often choose not to concentrate on for reasons of cost and complexity. NETGEAR ProSecure UTM50 dominated the test at 92.29 percent efficacy, followed by SonicWall with 50.19 percent and Fortinet with 39.43 percent. Other test case scenarios are ongoing and a complete report on the findings will be available in September 2010.

"Our test results determined that NETGEAR's ProSecure UTM50 surpassed the other UTM models in this test in stopping threats. Because the malware universe is huge, most appliance vendors concentrate on a limited subset of threats. UTM vendors typically do very well against such wildlist threats - NETGEAR included," said Kevin Tolly, founder of the Tolly Group. "However, zoo malware, which often mutates into new forms that threaten networks worldwide, is a clear and present danger, a danger that vendors often ignore at their customers' peril. NETGEAR shows exceptional strength at stopping both wildlist and zoo malware threats."

"NETGEAR has drawn on its unparalleled expertise in business and consumer internet user patterns to develop the industry-leading ProSecure UTM product line for business," said Jason Leung, senior product line manager, security solutions at NETGEAR. "The line in most work environments is definitely blurred between personal and business use of the web - and since 80 percent of all threats come from web surfing, businesses need smart products to protect from potential threats while keeping their core IT functions operating at the highest efficiency."

The NETGEAR ProSecure UTM50 is available now in the US for $899.00 MSRP and includes one year of web and email subscription services, 24/7 technical support and an advanced exchange warranty. It is available from leading value-added resellers, direct marketers and e-commerce sites with a novel risk-free 30-Day trial program that allows customers to try the appliance in their specific environment first before purchase.

For more information, please visit: http://www.netgear.com/products/business/proSecure-brand/UTM-series/UTM50.aspx

About NETGEAR, Inc.

NETGEAR (NASDAQGM: NTGR) designs innovative, branded technology solutions that address the specific networking, storage, and security needs of Small- to Medium-sized Businesses (SMBs) and home users. The company offers an end-to-end networking product portfolio to enable users to share Internet access, peripherals, files, multimedia content, and applications among multiple computers and other Internet-enabled devices. Products are built on a variety of proven technologies such as wireless, Ethernet and powerline, with a focus on reliability and ease-of-use. NETGEAR products are sold in over 27,000 retail locations around the globe, and via more than 36,000 value-added resellers. The company's headquarters are in San Jose, Calif., with additional offices in 25 countries. NETGEAR is an ENERGY STAR partner. More information is available at http://www.NETGEAR.com or by calling (408) 907-8000. Connect with NETGEAR at http://twitter.com/NETGEAR and http://www.facebook.com/NETGEAR.

2010 NETGEAR, Inc. NETGEAR, the NETGEAR logo, and ProSecure are trademarks or registered trademarks of NETGEAR, Inc. in the United States and/or other countries. Other brand and product names are trademarks or registered trademarks of their respective holders. Information is subject to change without notice. All rights reserved.

Safe Harbor Statement under the Private Securities Litigation Reform Act of 1995 for NETGEAR, Inc.:

This press release contains forward-looking statements within the meaning of the U.S. Private Securities Litigation Reform Act of 1995. Specifically, statements concerning NETGEAR's business and the expected performance characteristics, specifications, reliability, market acceptance, market growth, specific uses, user feedback and market position of NETGEAR's products and technology are forward-looking statements within the meaning of the Safe Harbor. These statements are based on management's current expectations and are subject to certain risks and uncertainties, including, without limitation, the following: the actual price, performance and ease of use of NETGEAR's products may not meet the price, performance and ease of use requirements of customers; product performance may be adversely affected by real world operating conditions; failure of products may under certain circumstances cause permanent loss of end user data; new viruses or Internet threats may develop that challenge the effectiveness of security features in NETGEAR's products; the ability of NETGEAR to market and sell its products and technology; the impact and pricing of competing products; and the introduction of alternative technological solutions. Further information on potential risk factors that could affect NETGEAR and its business are detailed in the Company's periodic filings with the Securities and Exchange Commission, including, but not limited to, those risks and uncertainties listed in the section entitled "Part II - Item 1A. Risk Factors," pages 36 through 52, in the Company's quarterly report on Form 10-Q for the fiscal second quarter ended June 27, 2010, filed with the Securities and Exchange Commission on August 5, 2010. NETGEAR undertakes no obligation to release publicly any revisions to any forward-looking statements contained herein to reflect events or circumstances after the date hereof or to reflect the occurrence of unanticipated events.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5485
Published: 2014-09-30
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

CVE-2012-5486
Published: 2014-09-30
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

CVE-2012-5487
Published: 2014-09-30
The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.

CVE-2012-5488
Published: 2014-09-30
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject.

CVE-2012-5489
Published: 2014-09-30
The App.Undo.UndoSupport.get_request_var_or_attr function in Zope before 2.12.21 and 3.13.x before 2.13.11, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote authenticated users to gain access to restricted attributes via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.