Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

3/30/2009
02:05 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Palisade Systems Announces PacketSure 7.5 DLP Tool For Small Businesses

Features include instant messaging proxy, HTTP and SMTP proxy enhancements, and new reporting options

AMES, Iowa, March 30 /PRNewswire/ -- Palisade Systems, a leading provider of data loss prevention solutions, today announced the latest release of its award-winning network appliance PacketSure 7.5, which includes several new and enhanced features such as instant messaging proxy, rule agent enhancements, discovery agent enhancements for data-at-rest, etc. These features, along with PacketSure's "plug and play" capability, which enables it to be operational within an hour of installation on an organization's network, are important reasons why a number of new enterprise customers have chosen Palisade Systems over competing data loss prevention vendors.

The introduction of PacketSure 7.5 marks twelve months of extensive research and testing from the time the previous version was launched in February 2008. The rich feature set in PacketSure 7.5 is a direct result of working with hundreds of Palisade's DLP.

"The free secure assessments we've been performing for hundreds of customers each year demonstrate a real-world need for a DLP solution like PacketSure 7.5 that can not only identify, monitor and block sensitive data, but also provide assistance in locking down nearly two hundred network communication protocols that are used to improperly access unauthorized content," said Kurt Shedenhelm, CEO and president of Palisade Systems. "By becoming a business partner in our customers' efforts to contain their data loss we will be able to build better DLP solutions that not only address their needs today but also solve future challenges."

New and enhanced features included in PacketSure 7.5 include:

-- Instant messaging proxy: blocking of instant messages based on user-determined content such as keywords, numbers, fingerprinted documents, and more. With this feature, end users can prevent sensitive information from leaving the organization's network through the following instant-messaging applications:

  • AIM5
  • MSN
  • Yahoo
  • Jabber/Google -- Discovery agent enhancements for data-at-rest: PacketSure 7.5 can now scan data-at-rest for the same potential data leaks as data-in-motion.
  • Scan remote drives: The discovery agent now has the ability to scan drives housed on different operating systems (Windows, Mac, Linux, etc), for organizations that may have employees working on different OS's within the same company.
  • Added detection methods: the administrator can now determine whether individuals may be storing or hoarding sensitive data on their computers, and can choose to monitor these users or request that the data be removed. -- Rule engine enhancements: Allows administrators to more easily customize the way that policies are dictated.
  • More granular content analysis allows administrators to pick and choose the actions to be taken for different user groups, streamlining the reporting and blocking process to better fit the organization's needs.
  • User can select different content analysis methods per rule: For example, an administrator could set the appliance to only log instances of Social Security number usage for users in the HR department, but to block SSNs for users outside of HR. -- HTTP proxy enhancements
  • Control based on user groups/zones: The administrator can set different actions to be taken for specific users or groups during Web browsing activities such as webmail
  • Actions can be based on content analysis type , such as PCI, PHI, SSN, etc. Administrators can choose to block some types of content while simply logging others. -- SMTP proxy enhancements
  • Control based on sender ID: Administrators can control what information can and cannot be passed from specific users of corporate e-mail accounts. If the administrator knows that particular individuals have clearance to deal with certain types of sensitive data, those individuals can be given clearance while others are blocked.
  • Actions can again be based on content analysis type -- Enhanced advanced reporting and alerting features allow for highly customized deep analysis. For example, an administrator can set up alerts or run reports based on "either-or" queries specific to e-mail addresses, users, and content types - completely customizing how sensitive data is tracked, reported, and blocked. -- URL filtering bypass option - passwords to bypass Web filtering protocols can be given to chosen users

    "DLP is emerging as an important information security control, with capabilities beyond those traditionally affiliated with monitoring. The DLP market, although still comparatively new, is rapidly becoming mainstream in the U.S., and is gaining significant attention and traction in Europe and Asia," notes Gartner, Inc., in "Magic Quadrant for Content Monitoring and Filtering and Data Loss Prevention," Eric Ouellet and Paul Proctor, June, 2008.

    Pricing and Availability:

    PacketSure 7.5 will begin shipping on or around April 1, 2009 and is available through any of Palisade's more than 130 authorized channel partners. Pricing begins at $8,000 annually. For more information, please contact Palisade's sales department at 1.888.824.0720.

    About Palisade Systems, Inc.

    Palisade Systems, Inc., is the leading pioneer of enterprise content security and data loss prevention (DLP) solutions, with over 800 domestic and global customers. Palisade's patented DLP product, PacketSure, is the industry's only all-in-one appliance that can be installed and running in less than one hour; a cost savings to customers of hundreds of thousands of dollars. PacketSure helps organizations proactively secure intellectual property and private client information from leaking outside the network, define and enforce access to internal network resources, and enforce compliance with federal privacy and industry security regulations. Palisade Systems customers include prominent clients in healthcare, financial services, insurance industries, along with universities and school districts. For more information, please visit http://www.palisadesystems.com or contact Palisade's sales department at 1.888.824.0720.

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    How to Better Secure Your Microsoft 365 Environment
    Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
    Attackers Leave Stolen Credentials Searchable on Google
    Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win an Amazon Gift Card! Click Here
    Latest Comment: This comment is waiting for review by our moderators.
    Current Issue
    2020: The Year in Security
    Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
    Flash Poll
    Assessing Cybersecurity Risk in Today's Enterprises
    Assessing Cybersecurity Risk in Today's Enterprises
    COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-4682
    PUBLISHED: 2021-01-28
    IBM MQ 7.5, 8.0, 9.0, 9.1, 9.2 LTS, and 9.2 CD could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization of trusted data. An attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 186509.
    CVE-2020-4888
    PUBLISHED: 2021-01-28
    IBM QRadar SIEM 7.4.0 to 7.4.2 Patch 1 and 7.3.0 to 7.3.3 Patch 7 could allow a remote attacker to execute arbitrary commands on the system, caused by insecure deserialization of user-supplied content by the Java deserialization function. By sending a malicious serialized Java object, an attacker co...
    CVE-2020-13569
    PUBLISHED: 2021-01-28
    A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can...
    CVE-2021-20620
    PUBLISHED: 2021-01-28
    Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
    CVE-2021-20621
    PUBLISHED: 2021-01-28
    Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.