Stonesoft Adds IPv6 Support to Security WaresStonesoft Adds IPv6 Support to Security Wares
StoneGate Solutions to enable global Internet expansion with production-ready IPv6 offerings by Q2 2008
November 7, 2007
ATLANTA -- Stonesoft, an innovative provider of integrated network security and resilient connectivity solutions, today announced that its StoneGate Firewall, VPN and Intrusion Prevention System (IPS) solutions will support IPv6. The first StoneGate IPv6 solutions are scheduled for release in the second quarter of 2008 in time to comply with the U.S. Federal Government’s deadline that all of its agencies be IPv6 ready by June 30, 2008.
IPv6 – the next generation Internet Protocol that has been under design and development for over 10 years – will increase the number of available addresses for Internet-enabled devices, delivering enhancements in security, quality of service (QoS), and auto-configuration capabilities. Yet global adoption has been slow due to the limited number of solutions supporting this protocol. With the U.S. Federal Government putting a stake in the ground, vendors – and their customers – are focused on meeting the deadline.
“The IPv6 era is beginning and we are ready to help our customers seamlessly migrate to this next-generation protocol, particularly since our solutions are built on Linux which recognizes IPv6 traffic today,” said Ilkka Hiidenheimo, the founder and CEO of Stonesoft. “Stonesoft sees great promise in the future of IPv6. As momentum increases, the StoneGate solutions will allow our customers globally to ensure the security of their IPv6 traffic and benefit from the added reliability and stability that are the hallmarks of IPv6. Stonesoft Corp.
About the Author(s)
You May Also Like
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks