Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/21/2010
01:17 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Portcullis Adds App Accleration To UAG

Ballista provides code optimization, compression and cache control for Web-based application traffic

MARLBOROUGH, MA September 21, 2010 Portcullis Systems, Inc., (www.portcullissystems.com) a global OEM partner with Microsoft™ and HP™, today announced BallistaTM, a proprietary engine built to provide code optimization, compression and cache control for web-based application traffic. The addition of the Ballista application acceleration to the Portcullis Systems Unified Access Gateway (UAG) appliances provides an industry first combination of advanced security providing secure remote access for applications and information resources. Now, with BallistaTM, user productivity is improved, and application server load is reduced and organizations regain up 70% of precious bandwidth.

BALLISTATM is easy to deploy and offers these features:

Clientless – no additional software is required on client devices

Minimizes the amount of traffic passed to clients

Reduces page load times, even on mobile devices

Decreases load on back-end applications and networks

Provides seamless integration with UAG without compromising any of the UAG security controls

Intuitive interface simplifies configuration and management

Integrates reporting and provides real-time efficiency analysis

Requires no changes to back-end applications

“Many organizations require the advanced security and comprehensive access control provided by our UAG Gateway appliances,” said Portcullis Systems CEO Michael Oldham. “BallistaTM adds the ability to dramatically improve the performance of web-based applications published through our gateways. By utilizing a combination of our Patent Pending technologies, we are able to improve end-user response times, increase the efficiency of application servers and substantially reduce the amount of information transferred to the end-user’s machine. The combination of application acceleration with next-generation security technologies creates outstanding value for our customers.”

UAG’s flexibility is represented in BallistaTM allowing clients to easily optimize any web application published. Clients can accelerate their chosen applications whether they are standard commercial products or products developed in-house. BallistaTM operates silently on the UAG appliance, continually analyzing and optimizing application traffic in a non-invasive manner. Data is routed into the Ballista engine and seamlessly returned to UAG with the applied optimization methods chosen. Administrators have the ability to select application specific optimization methods and activate or deactivate these on the fly without needing to reboot. Every application optimized through BallistaTM provides a graphical efficiency report for review in real-time or for historical view.

“We are very excited to have this technology in place for the UAG appliance,” said Oldham. “UAG offers the advanced security that customers need to control access to critical business resource. With BallistaTM on board, we not only offer the highest level of security for remote users and their companies, we can actually increase the speed that users can work, boosting productivity and saving on valuable company resources.”

# # #

About Portcullis Systems

Founded in 2008 as, Portcullis Systems provides substantial expertise around the Microsoft Forefront Security products. As a recognized leader within their market, they provide significant value to customers seeking world-class security and acceleration products.

Portcullis Systems currently has hundreds of customers worldwide representing some of the world’s largest financial institutions, government ministries, defense departments, healthcare organizations and industry-leading enterprises.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27218
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.