Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:47 AM
Dark Reading
Dark Reading
Products and Releases

SonicWALL Gives Network Managers More Control With Management System

GMS 6.0 manages more devices, addresses more service provider needs

SAN JOSE, Calif., Jan. 5/PRNewswire-FirstCall/ --SonicWALL, Inc. (Nasdaq: SNWL), a leading secure network infrastructure company, today announced immediate availability of SonicWALL Global Management System (GMS) 6.0, the latest major release of GMS.

"With release 6.0 we have greatly expanded the applicability of GMS to our customer's networks. Many customers have been asking us for central management for SonicWALL Email Security and CDP appliances and now they have it - both at the individual device and the group level," said Jan Sijp, Director of Product Management, SonicWALL. "One of the main focus areas at SonicWALL and for GMS in particular is serving our Managed Service Provider [MSP] customers. Our MSP customers will benefits from a new Web Services Application Programming Interface [API] which MSPs can use to integrate GMS with their other in-house systems. GMS at its core is a productivity enhancement and expense management solution and GMS 6.0 builds on this foundation. Our new reverse inheritance feature closes the loop with the existing reverse inheritance functionality enabling customers to, among other things, copy configurations from one device to another or from one device to a group of devices."

Among many other new features, GMS 6.0 introduces the following capabilities:

-- SonicWALL Multi-Solution Management: With GMS 6.0, GMS administrators can define and push policies for Continuous Data Protection (CDP) and Email Security appliances at the device, device group, or global level. Expanding granular management coverage to the CDP and Email Security product lines enables enterprise and MSPs to centrally manage their entire SonicWALL infrastructure. -- Application Firewall reporting provides greater visibility into the impact and effectiveness of application firewall policies and increases employee productivity and efficiency of network usage. -- The ability to run custom reports for secure remote access devices allows administrators to use the raw logs collected from Aventail and SMB SSL VPN devices under management. -- Support for SonicOS 5.5 extends GMS capabilities to a wider range of UTM appliance features, making the GMS administrator more productive. -- A new Web services Application Programming Interface (API) facilitates integration between GMS and other management consoles and enterprise applications, thereby greatly increasing the productivity of the internal IT staff. -- Near real time live monitoring and alerting based on syslog messages from SonicWALL devices under management increases network uptime.

GMS 6.0 is available for download on www.mysonicwall.com to GMS customers with an active GMS support contract.

For more information and a more complete list of features introduced in GMS 6.0 please visit: http://www.sonicwall.com/us/products/14413.html.

About SonicWALL, Inc.

SonicWALL is committed to improving the performance and productivity of businesses of all sizes by engineering the cost and complexity out of running a secure network. Over one million SonicWALL appliances have been shipped through its global network of ten thousand channel partners to keep tens of millions of worldwide business computer users safe and in control of their data. SonicWALL's award-winning solutions include network security, secure remote access, content security, backup and recovery, and policy and management technology. For more information, visit the company web site at http://www.sonicwall.com/.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-03-09
Products.GenericSetup is a mini-framework for expressing the configured state of a Zope Site as a set of filesystem artifacts. In Products.GenericSetup before version 2.1.1 there is an information disclosure vulnerability - anonymous visitors may view log and snapshot files generated by the Generic ...
PUBLISHED: 2021-03-09
The `com.bmuschko:gradle-vagrant-plugin` Gradle plugin contains an information disclosure vulnerability due to the logging of the system environment variables. When this Gradle plugin is executed in public CI/CD, this can lead to sensitive credentials being exposed to malicious actors. This is fixed...
PUBLISHED: 2021-03-09
react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoke...
PUBLISHED: 2021-03-08
Dell iDRAC8 versions prior to contain a host header injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary ‘Host’ header values to poison a web-cache or trigger redirections.
PUBLISHED: 2021-03-08
Maxum Rumpus 8.2.13 and 8.2.14 is affected by a command injection vulnerability. The web administration contains functionality in which administrators are able to manage users. The edit users form contains a parameter vulnerable to command injection due to insufficient validation.