Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

2/23/2009
03:27 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Global DataGuard Enhances Network Security Zones Technology

NSZ module provides alternative or complement to cumbersome network access control systems

Dallas, Texas, February 23, 2009 " Global DataGuard, the premier provider of network behavior analysis-based (NBA) Enterprise Unified Threat Management for small and medium businesses to large enterprise environments, has enhanced its Network Security Zones (NSZ) technology, providing the industry with a cost-effective, easy-to-use alternative or complement to cumbersome network access control systems. Simple-to-install, the NSZ module provides a mechanism to set usage policies around critical assets and then efficiently monitors access to these systems by employees, customers and suppliers.

Whether it's an infrastructure-based (in-line), appliance-based or software-based NAC architecture, many analysts are predicting that 2009 will be the year when network access control technology finally proves its value. Both Forrester Research and Gartner are encouraging businesses to include NAC capabilities within their network infrastructures to monitor devices, map traffic and provide role-based access for employees. However, analysts warn that NAC systems may be extremely complex to deploy and can strain limited network, security and desktop IT resources. Global DataGuard's Network Security Zones system is a more cost- and IT-friendly option to other NAC and Identity and Access Management solutions on the market today. It can be installed in a few hours " not months " and it allows organizations to define what an individual can access within the network, at what time and from which location. Any violation of established boundaries will generate an unauthorized access alert. Plus, it works with drag-and-drop simplicity and is administered through a single, easy-to-use console. "Global DataGuard's NSZ solution is the first behavior-based network access and policy management system that's purpose-built. It enables network zones or access policies to be set for critical assets, ensuring continuous monitoring of secure relationships between specific network resources and users during specified time intervals," stated Scott Paly, chief executive officer for Global DataGuard. "This robust capability is a key component within our Enterprise UTM portfolio, which provides customers with highly adaptive, predictive security products that can be customized to fit their unique business requirements."

Uncompromising Network Security With the NSZ module, there's no need to install centralized network authentication equipment or host-based agents on clients; and there's no need to re-architect the network to accommodate in-line security devices. The NSZ system works with any device attempting to access network assets, and continually monitors for policy violations. Even attempts to communicate using different protocols or port numbers between defined objects will generate an unauthorized access alert.

The NSZ module integrates at the architectural level with all of Global DataGuard's industry proven, Enterprise UTM applications to provide early warnings of threats that other solutions may not see, reduce false positives, and enable unparalleled management of a company's total information security environment. Businesses can also efficiently achieve and maintain compliance with government and industry standards while realizing far better performance and service at a substantially reduced cost of ownership " up to 60% over other NAC and Identity/Access Management alternatives.

The Network Security Zones module is priced at $25,000 in the U.S., and it can be leased with turnkey managed services for $2,950 per month. It is a fully integrated component within the Global DataGuard Enterprise UTM++ portfolio, and custom configurations can be designed and priced based on an organization's unique network requirements.

About Global DataGuard, Inc. Global DataGuard is the technology leader in network behavior analysis-based Enterprise Unified Threat Management for small/medium business to large enterprise environments. The company has been arming Fortune 1000 companies with battle-tested, proven Enterprise UTM solutions and Security Risk Management (SRM) Managed Security Services since 2001. Today, Global DataGuard solutions are deployed on three continents in both corporate and managed services environments. For more information, call (972) 980-1444 or visit our web site at www.globaldataguard.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This gives a new meaning to blind leading the blind.
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21441
PUBLISHED: 2021-06-16
There is a XSS vulnerability in the ticket overview screens. It's possible to collect various information by having an e-mail shown in the overview screen. Attack can be performed by sending specially crafted e-mail to the system and it doesn't require any user intraction. This issue affects: OTRS A...
CVE-2020-9493
PUBLISHED: 2021-06-16
A deserialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution.
CVE-2021-28815
PUBLISHED: 2021-06-16
Insecure storage of sensitive information has been reported to affect QNAP NAS running myQNAPcloud Link. If exploited, this vulnerability allows remote attackers to read sensitive information by accessing the unrestricted storage mechanism. This issue affects: QNAP Systems Inc. myQNAPcloud Link vers...
CVE-2021-3535
PUBLISHED: 2021-06-16
Rapid7 Nexpose is vulnerable to a non-persistent cross-site scripting vulnerability affecting the Security Console's Filtered Asset Search feature. A specific search criterion and operator combination in Filtered Asset Search could have allowed a user to pass code through the provided search field. ...
CVE-2021-32685
PUBLISHED: 2021-06-16
tEnvoy contains the PGP, NaCl, and PBKDF2 in node.js and the browser (hashing, random, encryption, decryption, signatures, conversions), used by TogaTech.org. In versions prior to 7.0.3, the `verifyWithMessage` method of `tEnvoyNaClSigningKey` always returns `true` for any signature that has a SHA-5...