Fidelis Upgrades SoftwareFidelis Upgrades Software
Fidelis unveiled the latest release of the Fidelis Extrusion Prevention System, Fidelis XPS, in production on customer networks
February 8, 2007

BETHESDA, Md. -- Fidelis Security Systems, the authority on extrusion prevention, today unveiled the latest release of the Fidelis Extrusion Prevention System, Fidelis XPS, in production on customer networks. The newest version of the network appliance offers the industry’s most extensive protection from data leakage with new capabilities that extend and automate prevention of unwanted outbound network traffic. As a result, organizations can reduce the risks of data leakage with more accuracy and with greater efficiency than ever before.
Fidelis XPS™ is the only system able to identify and stop data leakages before they occur across all channels on all ports on the network at gigabit speeds. A uniquely powerful rules-based approach to identifying privacy-sensitive information eliminates the need for time-consuming data registration that is difficult to maintain. Organizations can manage and enforce policies regarding use of content and the network with unprecedented granularity of control. Fidelis XPS is a network appliance that fits seamlessly into existing IT infrastructure with minimal impact, requiring no configuration changes to network devices, servers or desktops.
“With incidents of data leakage up sharply in recent years, and the ramifications of leakage increasing on a daily basis, the IT executives we talk with realize that the need for extrusion prevention is real, significant, and is high on their priority lists to act on,” said Jerald Murphy, Director of Research for Robert Frances Group. “Organizations need a solution that can monitor and control digital assets to actually prevent data leakage, versus reporting on it after it occurs. At the same time, the solution must be deployable, scalable, work across a broad range of data and applications, while offering a manageable cost of ownership.”
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023