Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:13 PM
Dark Reading
Dark Reading
Products and Releases

WatchGuard Technologies Extends Email And Web Gateway Security Features

WatchGuard XCS 10 adds Microsoft Hyper-V support, expands IPv6 capabilities, and enables custom policy enhancements

DUBAI, United Arab Emirates, Oct. 24, 2013 /PRNewswire/ -- GiTex Technology Week

2013 -- WatchGuard Technologies, a global leader in integrated, multi-function network security platforms, today announced the latest operating system for its email and web-based security appliance, WatchGuard XCS Version 10. With new Microsoft Hyper-V(r) support for XCSv, IPv6 support, and outbound anti-spam capabilities, XCS 10 streamlines the implementation and management of content security strategies for small, medium and large enterprises.

"WatchGuard XCS delivers an effective defense-in-depth platform for email, Web and data loss prevention. The latest upgrade to our operating system is designed to make deployment and management easier for IT security professionals, and deliver new functionality that can help meet today's challenges around virtualization and IPv6," said Roger Klorese, director of product management at WatchGuard Technologies.

The WatchGuard XCS appliance is one of the top-rated email security and content management appliances on the market today, according to SC Magazine.1 It delivers the industry's most effective defense-in-depth for email and Web, including powerful data loss prevention. XCS provides protection from email and web-based threats including spam, viruses, compromised websites, blended threats, and network attacks.

"Email and Web are two of the most commonly virtualized enterprise applications and the ability to protect them within the same cloud or virtualized environment gives our IT organizations increased flexibility and business continuity," said Jakob Roemer, technical manager at Montes A/S. "We can now leverage the best-of-breed security features in XCS - such as anti-virus, anti-spam, anti-phishing, anti-malware, data loss protection, email encryption and more - and align our content security policies across these virtualized platforms."

XCS also includes new IPv6 support. With the number of IPv6 devices growing and many areas of the world running out of (Asia), or running low on, IPv4 addresses, the move to IPv6 is underway. According to Gartner, Inc.,2 "As IPv6 adoption grows, security researchers and attackers will focus more on discovering IPv6 vulnerabilities. Strong vulnerability management processes will be critical to a successful IPv4 to IPv6 migration." XCS allows organizations to apply the same rich security controls to their email when migrating to IPv6 or mixed-addressing environments.

Furthermore, with the proliferation of BYOD and guest network access, IT organizations can no longer count on attacks coming only from outside the business. To help combat this problem, WatchGuard XCS 10 now includes out-bound anti-spam controls to clean outbound email and help preserve corporate reputation.

XCS Version 10 is a free upgrade available to all users of the XCS hardware and XCSv virtual appliances with LiveSecurity subscriptions. For more details, please click here.

About WatchGuard Technologies, Inc.

WatchGuard(r) Technologies, Inc. is a global leader of integrated, multi-function business security solutions that intelligently combine industry standard hardware, Best-of-Breed security features, and policy-based management tools.

WatchGuard provides easy-to-use, but enterprise-powerful protection to hundreds of thousands of businesses worldwide. WatchGuard products are backed by WatchGuard LiveSecurity(r) Service, an innovative support program. WatchGuard is headquartered in Seattle, Wash. with offices throughout North America, Europe, Asia Pacific, and Latin America. To learn more, visit WatchGuard.com.

For additional information, promotions and updates, follow WatchGuard on Twitter @WatchGuardTech on Facebook, or on the LinkedIn Company page.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-13
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.