25 Hot Products To Watch At RSA7:24 PM EST Fri. Feb. 26, 2010
Interfering factors like Internet congestion and cell network issues can negatively affect e-mail performance, impacting the demands of today's mobile workforce. For fast, reliable, and secure e-mail on-the-go, AppRiver has introduced the only Akamai-optimized hosted Exchange solution that improves mobile e-mail performance by 50 percent. Compuware Gomez's mobile performance monitoring testing data is reflected in the accompanying image.
Astaro RED (Remote Ethernet Device) is a new feature in branch office security that offers complete and centrally managed UTM security that can be set up in minutes without requiring any technical skills at the branch. The Astaro Remote Ethernet Devices is expected to be available in April 2010.
Axway's File Transfer Direct enables file transfer for large files up to 50GB directly via an e-mail interface or Web-based client. File Transfer Direct integrates Data Leak Prevention (DLP) into large file transfers, which minimizes risk and liability by proactively filtering e-mail attachments, tracking and confirming file and message delivery, and generating a complete audit trail for compliance.
The Barracuda NG Firewall is a family of hardware and virtual appliances designed to protect network infrastructure, improve site-to-site connectivity and simplify administration of network operations. Beyond its powerful network firewall and VPN technologies, the Barracuda NG Firewall integrates a comprehensive set of next generation firewall technologies, including Layer 7 application profiling, intrusion prevention, Web filtering, anti-virus, anti-spam and network access control. Available immediately, the Barracuda NG Firewall is offered in seven hardware models ranging from small branch office to large enterprises and datacenters as well as a corresponding offering of virtual appliances. U.S. prices range from $599 to $40,000. Barracuda Networks will be demonstrating the Barracuda NG Firewall at booth #1549 at RSA.
Privilege Manager enables organizations to remove administrative rights from end-users, while allowing them to run approved Windows applications, processes, and ActiveX controls. The latest version adds the capability to elevate the user's Internet privileges to install Web-based applications and software updates from approved URLs. New features also enable wildcard characters in policy rules and allow policies to vary based on a user's network access, time of day or the frequency privileges are used.
Most IT organizations have privileged user accounts for their IT administrators, giving them extensive access to IT systems that allow them to do their jobs effectively. However, privileged access that isn't properly controlled may be difficult or impossible to audit. That uncontrolled access represents a serious security threat illustrated by numerous high profile breaches over the past several years.
CA Access Control 12.5 helps manage regulatory compliance mandates by enforcing policy-based control for privileged users, controlling the system resources users can access and determining what they can do under specific circumstances. The image (left) show where a privileged account can be modified and a password policy configured.
Abra is an encrypted USB drive that can turn any PC into a secure, virtual workspace. By combining proven Check Point virtualization, VPN and security technologies with an encrypted SanDisk USB drive, users can plug Abra into any Windows-based PC and instantly have access to their personalized desktops, including company e-mails, files, and applications.
With integrated VPN connectivity and virtualization technology, the device isolates an Abra work session from the host PC, ensuring sensitive data on Abra remains protected. Telecommuters, contractors or employees working from home, internet cafes and business centers can now securely connect to the corporate network from any location.
Key features device utilizes several advanced security measures, including:
-- Hardware and software encryption that protects data at rest and data in use'
-- Program Control that regulates select application types;
-- Virtualization technology that isolates an Abra work session from the host PC.
Availability: March 31st
Cisco surpasses traditional security approaches through Cisco Secure Borderless Network architecture. Cisco enables businesses with increasingly mobile workforces by applying new forms of Web-based collaboration and communication to access information from connected mobile devices with identity and granular control over policy from almost any location. Cisco's new Secure Borderless Network architecture touts a new ease of use and ensures persistent security and protection by focusing on four critical anchors: enterprise endpoints (mobile or fixed), the Internet edge, the data center, and policy that is context- and location-aware.
Damballa's real-time Active Threat Termination technology severs criminal remote control over enterprise computers. This new release of FailSafe 4.0 detects and terminates botnets, advanced persistent threats (APTs) and other crimeware activity that relies on network-based Command-and-Control (CnC) to commit fraud, steal confidential information and use compromised systems for criminal attacks against other organizations. Damballa's Active Threat Termination technology identifies and stops malicious network activity without disrupting employee productivity or legitimate communications.
Fortinet introduced a secure wireless LAN strategy with a new enterprise-class FortiAP thin access point (AP) product line. The FortiAP-210 and FortiAP-220, which support the latest IEEE 802.11n standards, are designed to provide wireless networking capabilities for mid-enterprise and service-provider customers supporting a total user-base or distributed networks of 250-5000 users.
The FortiAP line will work in conjunction with Fortinet's FortiGate multi-threat security appliances, acting as the thin access-point controller, to provide a single platform that combines high-performance wireless networking with the industry's broadest integrated network protection. In addition, the FortiGate platform enables customers to have a highly scalable infrastructure with the ability to manage a few to several thousand access points within a wireless LAN.
HyTrust Appliance is a network-based policy management solution for virtual infrastructure that provides administrative access control, hypervisor hardening, and audit-quality logging. HyTrust empowers organizations to fully leverage their investment in virtualization by delivering enterprise-class controls for access, accountability and visibility.
Kaspersky Lab will demo its new smartphone security software -- Kaspersky Mobile Security 9 -- at its RSA Conference booth (#1145). Kaspersky Mobile Security 9 comes with a bevy of anti-theft features, including the ability to lock-down or remotely wipe data from a stolen device, while letting users track the missing smartphone by GPS. New to this version are user interface enhancements, and a privacy feature that allow users to designate certain contacts as "private" and hide all communication from those individuals. Kaspersky Mobile Security 9 also lets users encrypt data and offers protection from mobile malware.
Lieberman Software's Enterprise Random Password Manager (ERPM) provides new levels of visibility and control for cloud service providers and large enterprises to secure privileged identities. ERPM now delivers fine-grain management features to protect every asset in the cloud infrastructure -- including physical and virtual computers and network appliances, hypervisors, databases, middleware, line-of-business applications and more. With this version of ERPM, cloud service providers can assure both customers and IT auditors that privileged access to sensitive data is continuously monitored and secured. ERPM is available now. For more information please visit our Web site at www.liebsoft.com.
As part of its Lumension Endpoint Management and Security Suite, Lumension's Intelligent Whitelisting focuses on leveraging the best of blacklisting (Antivirus) and whitelisting approaches to deliver a more effective and operational endpoint security solution that meets the needs of organizations without impacting employee productivity. The approach extends beyond detecting malicious threats; rather, it determines whether change should be allowed to occur in the IT environment by providing the necessary controls to define and enforce security policies without disrupting business operations. (Availability: Q3 2010)
McAfee has extended its agent-less malware detection capabilities in McAfee Vulnerability Manager solution to include a weekly top 50 new malware and top 100 most detected malware content feed. As the volume of threats continues to increase, businesses need to know how they are impacted immediately. By leveraging the existing and new malware detection capabilities, McAfee Vulnerability Manager customers are able to mitigate threats before serious damage is done on their network.
Powered by Global Threat Intelligence from McAfee -- real-time, "in-the-cloud" data collection and intelligence distribution service that correlates and analyzes data from millions of data points across all threat vectors -- McAfee Vulnerability Manager solution receives weekly updates that contain that week's top 50 new malware and top 100 most detected malware content packages. This new dynamic content capability allows customers to scan the most dangerous malware within their network as part of their ongoing vulnerability assessment workflow.
The Mykonos Security Appliance gives system administrators and security staff a real-time view of hackers as they infiltrate Web applications. It profiles hackers in real-time, ascertaining their location, skill level and other critical data, while enabling IT staff to instantly deploy counter-measures.
The Mykonos Security Appliance is targeted at financial services and insurance companies, healthcare companies, e-commerce companies, government entities, and other high profile targets of Web-based hacking attempts.
NitroView Enterprise Log Manager (ELM) provides a single-click, granular access to source log records while leveraging the industry's fastest SIEM -- via integration with NitroView Enterprise Security Manager. Specifically, the NitroView Enterprise Log Manager (ELM) reduces post-event correlation, analysis and forensics from hours to seconds and integrates log management and SIEM capabilities tighter than ever before. Every event is presented for full, real-time analysis, representing every value of the source log record in the NitroView console for in-depth analysis, correlation, and reporting. The product also includes the full contents of the source log record right in the UI, eliminating the need to manually search log files.
Passlogix will use the 2010 RSA Conference to launch its v-GO Universal Authentication Manager (v-GO UAM), a strong authentication solution that will enable Microsoft Windows to accept any identification device for logon -- including door access (RFID) badges, government-issued citizen identity cards, standalone or built-in laptop biometrics, one time passwords via mobile phones, and question and answer sequences. The new Authentication Manager provides fast and secure network access, while lowering costs by more than 85%. Its open architecture supports any type of device from any manufacturer, rather than locking organizations into a single proprietary method.
This approach gives channel partners the ability to provide customers physical access control infrastructure for network logon, acquire new authentication credentials from any vendor, switch authenticators, and support multiple authentication methods possibly required by different end users -- all from a single administrative interface. v-GO UAM is available both on a standalone basis at $15 per user and as part of Passlogix's v-GO Access Accelerator Suite. Volume discounts are also available.
PGP Corporation is announcing a new PGP Key Management Server to provide global enterprises better manageability and visibility of encrypted data that enables trusted data protection. Enterprises today are struggling to manage the vast amount of keys and certificates that they have collected over the years while trying to address new data breach legislation and comply with industry regulations. The new PGP Key Management Server delivers open enterprise key and certificate management, enabling global enterprises to address often disparate key management systems with strong management and policy capabilities and interoperability with third party applications, all based on industry standards.
Deployment and the need to manage encryption technology has grown dramatically as hard drives, servers, databases, smartphones and flash drives virtually all come provisioned with encryption. Additionally, SSL certificates are ubiquitous in server and cloud environments, and bring their own set of administrative challenges. Each new encryption product introduces yet another set of key management responsibilities that compound the administrative overhead and cost for IT and security departments. The PGP Key Management Server 3.0 provides enterprises with a unified enterprise key management platform essential for streamlining security operations and providing the highest level of data protection.
QualysGuard Malware Detection is a free service that allows organizations to proactively automatically scan their Web sites daily for malware infections and threats, providing them with automated alerts and in-depth reporting for effective remediation.
Qualys GO SECURE allows businesses of all sizes to scan their Web sites for the presence of malware, network and Web application vulnerabilities, as well as SSL certificate validation. Once a Web site passes these four comprehensive security scans, the Qualys GO SECURE service generates a Qualys SECURE seal for the merchant to display on their Web site demonstrating to online customers that the company is maintaining a rigorous and proactive security program.
Sophos Endpoint Security and Data Protection offers a single integrated solution for both anti-malware and data protection. A single agent delivers anti-virus and anti-spyware protection, client firewall, data leakage prevention (DLP) content monitoring, and management of removable storage devices, while detecting and blocking unauthorized software. Combined with integrated network access control (NAC) and encryption to ensure policy compliance and secure data, Sophos Endpoint Security and Data Protection gives users a strong preventive endpoint and data protection, saving customers time, money and resources. A single license protects all users and computers across Windows, Mac, Linux, UNIX and other non-Windows platforms.
The Sophos Web Appliances -- part of Sophos Web Security and Control -- block Web threats at the gateway, create and enforce acceptable use policies and provide essential safeguards for data loss. The Web appliance blocks spyware, viruses, phishing, malware and unwanted applications at the gateway, searching for and blocking anonymizing proxies, and enabling comprehensive Web access control for safe, productive web browsing. The scanning engine detects all threats through a unique combination of reputation-based filtering, real-time predictive threat filtering, and content-based filtering. Its easy-to-use management console and powerful reporting tools that deliver rapid insight into web traffic, threats and user behavior, enable secure browsing without the complexity of traditional web filters. As a managed appliance, the Sophos Web Appliance features remote "heartbeat" monitoring and on-demand remote assistance.
Ideal for mid-market enterprise organizations with up to 1,500 users, the WatchGuard XTM 5 Series resets the definition of high-security and performance for protecting commercial networks, applications and data.
Product Name: XTM 5 Series
Pricing: The XTM 5 Series begins at $1,590, including Live Security Service.
Built with the channel in mind, Webroot Security SaaS solutions deliver enterprise-class security with better manageability, better value and better protection than appliances and server-based solutions. Webroot Web Security SaaS is part of the Webroot Security SaaS family and provides URL and Web content filtering, plus proactive protection against Web-based malware for corporate and mobile laptop users. Webroot Channel Chief Jerry Jalaba says the latest Webroot Web security service protects businesses from data-stealing malware, Web 2.0 threats and attackers that employ an increasingly complex array of Web-based attack methods. The company also provides businesses with e-mail security and archiving services sold through the channel.
Unveiled earlier this year, Websense TRITON is one of the IT industry's only unified content security architectures. With TRITON, Websense has integrated its Web, e-mail and data security technologies into a single solution set -- bringing to market a security solution that proactively protects against modern threats and radically reduces the total cost of ownership (TCO).
Gone are the days of choosing between on premise and SaaS. Now with Websense TruHybrid deployment and the new TRITON Console, Websense partners can offer the best of both worlds and easily set, monitor and manage a customer's security policies across distributed offices and remote workers. In addition, the Websense TRITON Advanced Classification Engine (ACE) delivers a powerful set of content identification and classification technologies which now spans across all Websense Web, email, and data security products. Available now, these advanced technologies form the TRITON solution, creating Websense TruContent intelligence that works to proactively to prevent inbound threats and outbound data loss from impacting customers' networks.