Quelling Mobile Threats

The two companies are considering launching a UTM appliance that would act as a gateway for secure VPN access to network-based applications from remote locations or mobile devices.

The appliance would monitor e-mail, Web and application traffic between a company&'s internal network and the Internet to detect, block and prevent various security threats.

“The box is designed to unify [Microsoft&'s Internet Security and Acceleration server] and offer protocol/traffic monitoring,” said one source, who requested anonymity.

Plans call for the appliance target companies with 100 to 1,000 employees, support more than 100 VPN connections and are priced at $2,500 to $4,500, sources said.

id
unit-1659132512259
type
Sponsored post

Although Microsoft and Nokia are in discussions about the appliance, it remains unclear when—or even if—the product would go to market. Both companies declined to comment.

Solution providers said the appliance would benefit Microsoft&'s security story and sales of both vendors&' smartphones.

“They are attempting to compete in the space with what is being termed a universal VPN,” said Phil Ernst, CTO of Convergence Technology Consulting, Bowie, Md.

“It&'s basically a special-purpose firewall with more features,” said Robert Tedesco, CTO of Resolute, Bellevue, Wash. “For some customers, the only way to get sick is from the network. This would be good.”

The appliance reportedly would be easy to install and integrate with Windows Active Directory and Exchange. It also would employ Nokia hardware and technologies to work well in mixed or non-Microsoft environments, sources said.

“Nokia has substantial experience in marketing hardware security appliances that use software from partners such as Check Point. However, these appliances have traditionally been Unix-based,” said Alex Zaltsman, managing director at Exigent, Morristown, N.J. “A VPN and network monitoring appliance that runs Microsoft&'s operating system is a good idea but may lead to some level of pushback from security-conscious administrators who typically prefer to separate those functions.”