Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:02 AM
Dark Reading
Dark Reading
Products and Releases

nexTier Networks Releases DLP Solution For SMBs

Compliance Enforcer 100 and 200 appliances combine DLP algorithms with semantic DNA analysis to mitigate data security risks

SANTA CLARA, CA---(July 21, 2009) - nexTier Networks, the company redefining data leak prevention (DLP) with semantic analysis, today announced the immediate availability of a new class of DLP products designed to help small and mid-sized businesses (SMBs) mitigate data security risks. The new Compliance Enforcer 100 and 200 appliances leverage nexTier's powerful DLP algorithms with semantic DNA analysis for advanced accuracy, automated security policy management and compliance reporting in a single, centralized administrator's console. As a result, companies can reduce data security and compliance administration and enforcement from weeks to just minutes while minimizing data breaches and internal malicious threats. According to a recent study by IDC, 60 percent of all corporate data is accessed via an endpoint. As the perimeter of SMB endpoints continues to expand, encryption is no longer a viable protection option for company data. The nexTier solution delivers data security far beyond encryption and protects companies against both inadvertent and malicious attacks while complying with government and regulatory mandates. Using a unique DLP approach with a highly defensible, patented technology for data leak prevention, nexTier safeguards both structured and unstructured data with rapid deployment and minimal human intervention.

One of the biggest challenges for companies today is protecting ever-increasing amounts of sensitive data, and that data is increasingly unstructured and harder to discover. Access to sensitive documents needs to be tightly controlled. nexTier's Compliance Enforcer solution enables organizations to identify and protect their information no matter where it is located in the enterprise by automatically discovering sensitive information and applying semantic intelligence to determine what the document's content is, who can access what data, and where it can and cannot be sent to enforce business policies and compliance.

The result is increased visibility into all information across the business and greater control and protection of that information. Additionally, nexTier's language-independent algorithms interpret and correlate the unique DNA of data to determine and apply security policies in real-time. Highly resistant to evasion, nexTier's algorithm can determine the origin of information even if data has been retyped into a brand new document, or rearranged and reworded in an evasive or subversive manner - minimizing internal threats and malicious intent.

"Recent trends clearly show that enterprises are taking serious interest in implementing technologies that could aid in securing sensitive enterprise data from being extruded and used with malicious intent," said Frost & Sullivan Research Analyst, Achyuthanandan Sampath. "nexTier Networks' unique approach to DLP could comprehensively secure data leaks by automatically identifying sensitive information and preventing leakage by applying security policies in real-time. In a short time span, the company has emerged into a leading innovator in the DLP domain."

Aimed at enabling small businesses to address increased security threats in the face of budgetary pressures and stringent data compliance regulations, nexTier's Compliance Enforcer is now available as a 1U or 2U rack-mountable server appliance. The appliances proactively protect information at the gateway, departmental level or across the enterprise, delivering a simple, plug and play approach to DLP. Built from the ground up to significantly reduce deployment time to less than an hour, Compliance Enforcer cuts configuration and initial set-up time to minutes and eliminates the requirement of on-going manual pre-tagging and pre-processing of sensitive data. This reduces both short and long-term total cost of ownership.

Using nexTier's patented advanced identity and role-based contextual DLP paradigm, the Compliance Enforcer leverages existing enterprise directories (LDAP, Active Directory, RADIUS, Human Resources databases) and other information repositories for fast and consistent policy deployment. An advanced DLP Policy Synthesis Engine eliminates laborious policy setting processes further by automatically applying technology to achieve the highest granularity found in DLP solutions. Once installed, security personnel may use nexTier's Conceptual-Contextual Policy settings to monitor and control who can access and send what information to whom and through what protocol or application.

"Enterprises of all sizes are increasingly being required to meet the mounting demands of regulatory compliance, putting the SMB at a distinct disadvantage in terms of cost and personnel," said Tarique Mustafa, CEO and founder of nexTier Networks. "nexTier's Compliance Enforcer appliances give small businesses an affordable, easy-to-deploy DLP solution that protects data in real-time, while identifying threats and performing remediation activities with recommended actions. nexTier's DLP technology also addresses the significant limitations of other DLP products by greatly reducing deployment time and keeping data storage requirements to a minimum."

Pricing & Availability nexTier Networks' Compliance Enforcer products are now shipping as pre-built and pre-configured appliances. Compliance Enforcer is easily customizable and starts at US $30,000 for 100 users. With its Compliance Enforcer product, nexTier offers the most affordable DLP with unprecedented accuracy and real-time analysis, providing best return on investment to meet compliance and security needs. For more information contact: [email protected]

About nexTier Networks Headquartered in the heart of Silicon Valley USA, nexTier Networks introduced the industry's first semantically-aware data leak prevention technology. nexTier's DLP protects data based on its contextual and conceptual meaning, using a powerful correlation engine and security algorithms to identify, classify and protect large volumes of information in real-time, with unprecedented accuracy. nexTier was named IDG's Network World "10 IT Security Companies To Watch" List and was awarded Frost & Sullivan's 2009 North American Network Security Infrastructure Protection Excellence in Technology of the Year Award, recognizing the company's achievement in creating innovative technology. The company was founded by Silicon Valley security veteran Tarique Mustafa and is backed by a team, board and advisors that include leading authorities from companies like Symantec, McAfee, VeriSign, Cisco, Juniper, GreenBorder, Sygate and Securify. For more information, see http://nextiernetworks.com/.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/13/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-13
The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in th...
PUBLISHED: 2020-07-13
The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the co...
PUBLISHED: 2020-07-13
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
PUBLISHED: 2020-07-13
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
PUBLISHED: 2020-07-13
A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version allows unauthenticated remote attackers to start a telnetd service on the device.