Tag Archives: network security

Cyberoam Rolls Out CyberoamOS 10.6.2 Offering Major Performance Improvements

Offers big leap in firewall, UTM, IPS and AV throughputs.

Edison, NJ (USA), January 20, 2015 — Cyberoam, a leading global network security provider, has announced a new firmware — CyberoamOS 10.6.2 for its UTM and NGFW security appliances. Among many updates included in the new firmware are the increase in Firewall throughputs by up to 430%, IPS throughputs by up to 210% and UTM throughputs by up to 190%; inclusion of User Threat Quotient (UTQ) offering security intelligence to spot risky users in network; availability of Cyberoam in Discover mode (popularly known as TAP mode) to help partners and customers evaluate Cyberoam security; and Application Visibility & Controls for HTTPS-based Micro-Apps.

Evolving IT trends like BYOD, application explosion, virtualization, and more, are putting tremendous pressure on today’s network security solutions to deliver higher throughputs and performance in order to keep networks secure and not let security become a bottleneck in network performance. CyberoamOS 10.6.2 meets these requirements of small offices, mid-market to large and distributed enterprises, with this performance advantage becoming available for the entire family of Cyberoam security appliances.

Says Mr. Abhilash Sonwane, SVP – Products & Technology, Cyberoam: “We moved many notches up in offering high-performance security at the time of launching our NG Series security appliances. With CyberoamOS 10.6.2, we have touched even higher scales by further leveraging the fast path technology over Cyberoam’s multi-core platform. Our new performance breakthroughs will help Cyberoam customers boost network security performance without changing their existing hardware.”

The higher performance and faster throughputs coming with CyberoamOS 10.6.2 will offer Cyberoam customers maximum protection out of Cyberoam security features (firewall, IPS, AV, UTM). The enhancements in CyberoamOS 10.6.2 also offer following new functionalities to customers on their security appliances:

User Threat Quotient (UTQ): Available as a report, UTQ harnesses information derived out of web traffic and offers patterns of user behavior to determine risky users in a network. UTQ is available on Cyberoam’s Next-Generation Firewall and UTM appliances.

Application Visibility and Control for Micro Apps: Provides deep-scanning for HTTPS based applications, allowing granular control over various micro-apps within the larger app ecosystems such as Facebook, Google and the like.

Among other key features becoming available include Radius Single-Sign-On (RSSO), IPv6 Traffic Load-balancing support in HA, Secure SMTP and availability of Discover Mode (popularly called TAP mode) that makes PoC evaluation of Cyberoam security appliances simpler, easier and faster.

Cyberoam continues to invest and focus on product innovation and development with important releases and updates to ensure continued success for its customers and partners. Staying steadfast in its product strategy, Cyberoam is committed to deliver the highest competitive advantage that its technology has, to yield the best possible combination of performance and price. Underscoring the same strategy, the new CyberoamOS ensures that large and small customers benefit from the performance improvements of its security appliances.

About Cyberoam Technologies Limited:
Cyberoam Technologies, a Sophos Company, is a global Network Security appliances provider, offering future-ready security solutions to physical and virtual networks in organizations with its Next-Generation Firewalls (NGFWs) and Unified Threat Management (UTM) appliances. The virtual and hardware Cyberoam Central Console appliances offer Centralized Security Management options to organizations, while Cyberoam iView allows intelligent logging and reporting with one-of-their-kind, in-depth reports. Cyberoam is accredited with prestigious global standards and certifications like EAL4+, CheckMark UTM Level 5 Certification, ICSA Labs, IPv6 Gold logo, and is a member of the Virtual Private Network Consortium. For more information, please visit http://www.cyberoam.com

Press & Media Contact:
Jitendra Bulani
Cyberoam Technologies Limited
505 Thornall Street, Suite # 304
Edison, NJ – 08837 – USA
+1-847-235-4684
jitendra.bulani@cyberoam.com
http://www.cyberoam.com

Global Technology Solutions provider Netswitch launches product to Maximize Network Security for all Businesses and Company COO and Chief Security Officer Launches eBook

When a computer virus infected the network at Crouse and Associates in San Francisco, the insurance services company ground to a halt during a weeklong outage — costing a significant amount of time and money to resolve.

San Francisco, CA, August 31, 2014 – When a computer virus infected the network at Crouse and Associates in San Francisco, the insurance services company ground to a halt during a weeklong outage — costing a significant amount of time and money to resolve. The company does not have a large IT staff or a chief information security officer, it can’t afford to employ security experts and it doesn’t have the time or expertise to wade through the complicated Internet security landscape filled with intimidating terminology like “botnets,” “kill-chains,” “application firewalls” and “advanced persistent threats.”

So the busy company left it all up to global technology solutions provider Netswitch and its innovative MADROC® Integrated Security Platform that maximizes network security for more than 2,500 global businesses, large and small. MADROC® provides complete intrusion detection and prevention along with event management and immediate alerting and remediation — complete peace of mind within a monthly subscription plan.

The future is very clear: Cyber-crime is growing rapidly and as security gets better, the criminals get smarter. To respond to this real problem, Netswitch has revolutionized the way IT security is delivered — controlling and monitoring a heterogeneous mix of IT technology from top to bottom at every touch point; a true Defense in Depth security strategy. A MADROC® subscription includes all engineering, configuration, tuning, licenses and maintenance, along with a dedicated Security Operations Control Center providing support around the clock, with 15 minute response and immediate remediation.

“Netswitch is applying technology to important security and social issues that I care deeply about,” said Ken Chrisman, Board Member of Netwitch. “This is an important opportunity to use technology to protect personal information and doctor/patient confidentiality. I believe MADROC® is poised to revolutionize the personal information security space with enhanced security protection through advanced behavioral analytics while leveraging the cloud to manage the massive data being generated.”

For more information go to http://www.netswitch.net/.

MADROC® Integrated Security Platform Customer Testimonial:

Pam Quilici, executive vice president of Crouse and Associates

“We chose MADROC® to ensure that our network will be secure and that we are protected from similar attacks in the future,” said Pam Quilici, executive vice president of Crouse and Associates. “Netswitch has been a trusted supplier of IT services for years. We love the way the MADROC® service is designed and we know we can always count on Netswitch for the smartest and most professionally responsive support.”

Shane Isaaks, the CIO of the Peninsula Hotel Group and Hongkong and Shanghai Hotels Group:  (See detailed information on this case study below)

“We have used Netswitch Security Services and their experts for years to insure that the Peninsula Hotels are protected against data breaches and other security threats. Their new MADROC program is revolutionary in that it combines all levels of protection in a single service package that is amazingly affordable. We are looking forward to a threat-free future.”

e-Book Breach Launches
In addition to the launch of MADROC® Integrated Security Platform, Netswitch COO and Chief Security Officer Steve King has launched an eBook called “Breach” that describes the current state of data breaches, and what you can do to protect your company.

Excerpt from eBook Breach: We have seen the trends in cyber-crime and malware attacks. With these attacks evolving at such an astounding pace, your organization needs security solutions today that address head-on every attack vector from the surface to the core, aka Defense in Depth. We believe that the principle of Defense in Depth should be the foundation strategy for any and all business security policies and approaches. Defense in Depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.

In terms of computer network defense, Defense in Depth measures should not only prevent security breaches, but will also buy an organization time to detect and respond to an attack, thereby reducing and mitigating the consequences of a breach.

“I wrote this book because I wanted to help business leaders sort through all of the jargon and arcane references in the data security world so that they could understand both the actual threats, the dangers of doing nothing and the easiest, simplest and lowest cost ways to insure against the inevitable data breaches that will occur in the future,” said King.  “One of the many dangers in doing nothing is that it will invite the government (both) to insert themselves into the process of “protecting consumer personal information”. The costs of compliance with Sarbanes-Oxley have risen more than 60% over the last 10 years and have had significant unintended consequences in area like IPOs and increased compensation for lawyers, auditors and run-away consulting fees. It would be much worse with a Federal Security Compliance Act.”

NOTE:  On Tuesday, August 26th the first of many bills to come is on Jerry Brown’s desk imposing government rules and protection legislation on businesses (who do not do it themselves) to insure against the loss of consumer and personal information and to offer one year free credit access to consumers whose financial information has been compromised.
The book is complimentary and can be downloaded at http://www.netswitch.net/ebook-breach-by-steve-king/.

Background on Steve King, Chief Operating Officer, COO and Chief Security Officer and eBook Author

After college, Steve turned down an offer to be a copy-writer on the Hoover Vacuum account for Hoefer-Dieterich and Brown to pursue a career in IT, but never lost sight of the future impact of consumerization on Information Technology. Steve subsequently logged over 30 years of computer industry experience in sales and marketing, software engineering, product development and professional services. Steve also has extensive market experience in Information Security Management Internet, Digital Media, Business Intelligence, Document Management, eCommerce, and Business Process Reengineering.

Steve has managed product development with UNIX, Windows and Java platforms, founded three software and services startups and raised $32m in venture capital. Steve has held a variety of executive management positions in development, sales, and marketing  for ConnectandSell, Whittman-Hart, marchFIRST, the Cambridge Systems Group, Memorex, Health Application Systems, Endymion Systems, Blackhawk Systems Group and IBM.

He has also led digital marketing engagements for Abercrombie & Fitch, Tommy Bahama, REI, Harley Davidson and wrote a best-selling business book on Retail Web Marketing.

As a co-founder of the Cambridge Systems Group, Steve led the marketing effort for ACF2, which would become the leading Enterprise Data Security product for IBM mainframe computers. As a direct result, Steve is now known as the God-father of Information Security. Over the years, Steve has been issued multiple engineering patents encompassing contextual semantic search technologies, web-enabled multimedia audio transfers, imaging capture and database smart query processing.

Steve studied toward a B. S. in Mathematical Probability and Statistics from the University of California at Berkeley with a Minor in Journalism and studied Social Justice Law at the Santa Clara University School of Law.

Contact:
Marci Bracco Cain
Chatterbox
Carmel, CA 93923
831-747-7455

Where We’re Going

Corero Network Security to Present on DDoS Attacks and Mitigation Techniquesat Interop Las Vegas

Corero Network Security (CNS: LN), today announced that they are presenting on the evolving DDoS threat landscape at Interop, being held May 6-10 in Las Vegas, Nevada.

Hudson, MA (USA), Tuesday – April 17th, 2012 — Corero Network Security (CNS: LN), the leading provider of Distributed Denial of Service (DDoS) Defense Solutions, today announced that they are presenting on the evolving DDoS threat landscape at Interop, being held May 6-10 in Las Vegas, Nevada.

Ashley Stephenson, executive vice president, will be a featured presenter at Interop. The event will take place at the Mandalay Bay Convention Center in Las Vegas from May 6-10, 2012.

WHO: Ashley Stephenson, Corero Network Security Executive Vice President
WHAT: “Application Layer DDoS Attacks: Motives, Mechanisms, and Mitigation”
WHERE: The Mandalay Bay ConventionCenter, Las Vegas
WHEN: Thursday, May 10, 2012, 9:00 am PDT

During the session Stephenson will examine the motivations behind today’s DDoS attacks, highlighting how hackers increasingly are using them as smokescreens to divert attention from surreptitious attacks aimed at stealing data. He also will take an in-depth look at the evolving mechanisms used to launch attacks, both newlow and slow application-layer DDoS attacks and traditional bandwidth consuming network-layer DDoS attacks. In addition, hewill share real-world attack scenarios and discuss ways to stop DDoS attacks.

About Corero Network Security:
Corero Network Security (CNS:LN) ( http://www.corero.com/en/products_and_services/ps_services/securewatch_plus ) is an international network security company and the leading provider of Distributed Denial of Service (DDoS) defense and Next Generation Intrusion Prevention System (IPS) solutions ( http://www.corero.com/en/products_and_services/ips/products_and_services_ips_overview ). Corero’s products and services ( http://www.corero.com/en/products_and_services/ps_services/securewatch_plus ) provide comprehensive, integrated, high-performance protection against constantly evolving network-borne cyber threats. Customers include enterprises, service providers and government organizations worldwide. Corero’s appliance-based solutions are highly adaptive and preemptively respond to modern cyber attacks, known and unknown, protecting critical information and online assets. Corero’s products are transparent on the network, highly scalable, and feature the lowest latency and highest reliability in the industry. Corero is headquartered in Hudson, Mass., with offices around the world.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
1 Cabot Road
Hudson, MA 01749 – USA
(978) 594-4134
vcruz@mediapr.net

Home

Corero Network Security Appoints Ashley Stephenson as Executive Vice President

Veteran Technology Entrepreneur will lead Corero’s Global Expansion Strategy.

Hudson, MA (USA), Tuesday – April 17th, 2012 — Corero Network Security (CNS: LN), the leading provider of DDoS Defense and Next Generation IPS (NGIPS) solutions, today named veteran IT industry expert Ashley Stephenson as executive vice president. An Internet technology entrepreneur, Stephenson, who has operating experience in the United States, Europe and Asia, will lead Corero’s global expansion strategy.

“We are delighted to have someone of Ashley’s caliber join Corero. His proven executive leadership experience, international expertise and channel know-how will help us take the company’s solutions to the next level in the escalating battle against cyber attacks,” said Marty Meyer, CEO of Corero.

Stephenson co-founded or led several IT companies as chairman or CEO including Reva Systems, acquired by ODIN, and Xedia Corporation, acquired by Lucent. Most recently, he has provided strategic advisory services to leading companies on the evolution of the global IT market. Stephenson has served on the board of directors of several startups and industry consortia. He also was awarded “CEO of the Year” by the Massachusetts Telecommunications Council.

“I’m very excited to join Corero. The company’s game-changing DDoS Defense and Next Generation IPS technology make this a unique opportunity to expand the business as the network security market continues to experience explosive growth,” Stephenson said.

“We will continue to build on our strategy to work with key partners around the globe to build out an intelligent next generation defense infrastructure against cyber attacks. The more enterprises and institutions we protect, the more we learn about the evolving nature of the threats. It is a win-win-win for our partners, our customers and Corero,” Stephenson added.

Corero’s products and services provide its customers with a robust, high-performance defense against the constantly evolving and increasingly sophisticated realm of cyber attacks. Its DDoS Defense System (DDS), which stops DDoS attacks, and NGIPS solutions are pro-actively protecting the networks and IT resources of enterprises, service providers and government organizations worldwide.

About Corero Network Security:
Corero Network Security (CNS: LN) is an international network security company and the leading provider of Distributed Denial of Service (DDoS) defense and Next Generation Intrusion Prevention System (IPS) solutions. Corero’s products and services provide comprehensive, integrated, high-performance protection against constantly evolving network-borne cyber threats. Customers include enterprises, service providers and government organizations worldwide. Corero’s appliance-based solutions are highly adaptive and preemptively respond to modern cyber attacks, known and unknown, protecting critical information and online assets. Corero’s products are transparent on the network, highly scalable, and feature the lowest latency and highest reliability in the industry. Corero is headquartered in Hudson, Mass., with offices around the world.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
1 Cabot Road
Hudson, MA 01749 – USA
(978) 594-4134
vcruz@mediapr.net

Home

USB Lock RP – software security solution to block / allow specific portable media devices

US Diversified Tech, LLC together with Advanced Systems International, SAC announce the release of USB Lock RP v5.29. A software security solution designed strictly to provide the ability to block or allow specific portable media devices. USB Lock RP’s scope of protection now includes: eSata, Firewire, USB 3.0 super speed technology, MTP, USB 2 sticks, as well as cell phones, Tablets, iPod’s, mp3, SD Cards and all other interfaces that can be used to extract data. The newest and biggest addition is the eSata protection which has been, and remains industry wide, a difficult opening in data security to address. With the inclusion of eSata, USB-3.0 and Firewire super speed transfer interfaces, Advanced Systems International, SAC has addressed every opening presented where a media storage device can be misused. It is important to not just lock out these devices but to have the option to allow their use, when necessary, in a managed and protected manner.

Javier Arrospide, Advanced Systems International, SAC founder and lead software developer states that, “USB Lock RP (Remote Protect) is straightforward effective endpoint security software. Allowing organizations to authorize, from a central location, specific devices with ease and automatically block all other removable storage external hardware that could be used to extract data assets or to enter malware in your networked environment.” USB Lock RP’s operation is automatic, alerting, logging, authorizing or blocking device connections in real-time. Installation is simple and, for large networks, the client side setup is provided in MSI format so initial remote deployment can be done silently and with ease.

US Diversified Tech, LLC focuses on addressing government and corporate computer security issues and is well respected for working closely with IT and management in finding security solutions that best meets the individual situation. For further information and a 15 Day Free Trial of USB Lock RP or to view our other security solutions, visit the US Diversified Tech websites at www.AdvanSysUSA.com orwww.LaptopSecuritySolutions.com. We can be contacted at (888)-361-8718 to address any technical, sales or dealer inquires.

Contact Details: US Diversified Tech, LLC, PO Box 599, 141 Canal St., Nashua,
NH 03064
888-361-8718 Phone 603-484-2698 Fax
sales@AdvanSysUSA.com

Your choice of browser can ruin your Internet browsing experience

Bellevue, Washington –  The internet is evolving fast, you need to pick a browser that can keep up with the growing needs of the latest and greatest websites.  At the same time, online threats such as attack sites, identity theft, viruses, malware, and spyware are also evolving at a rapid rate.  IxDownload, a leading authority website on Internet software and security issues, has compiled a resource page located at http://www.ixdownload.com/forums/browsers/882-ixdownload-com-web-browser-resource-essential-information.html that reviews the four core needs of today’s Internet user and the challenges posed by the Internet’s evolution.

“As the sad experience of Internet Explorer 6 has shown us—evolution is key!”, says Oliver Thompson, IxDownload’s Communications Consultant. “IE6 was rendering pages wrong when design standards have moved on. This experience is the most dramatic example of how a user’s choice of browser can ruin their browsing experience.”  Not just ruin it but, given the explosive growth rate of virus, spyware, malware, and phishing attacks on the Internet, also cause serious financial damage or lost productivity.  Internet Explorer, after its stunning defeat of Netscape OWNED the browser space for many years but due IE’s ease of infection and bad page rendering, Firefox grew in market share.  In essence, IE’s success made it complacent and it lose marketshare to competitors who eagerly listened to their customers.  Firefox, open source and stocked with a huge array of safe browsing and extended functionalities helped IE’s marketshare shrink to close to 60%.  “Sadly, as our report indicates,” says Thompson, “Firefox has its own shortcomings as well.”

“The biggest trend right now is social media, social collaboration”, says Thompson.  This trend has given rise to Flock and related browsers.  “We see niche browsing as one of the biggest trends in the future.”  Regardless, online browsing really boils down to four issues:  security, speed, adaptability to current and future web design trends/standards, and add-on support.  “These four core concerns should drive every Internet user’s choice in browsers—they really make the difference between an enjoyable experience and a costly one.” IxDownload’s resource critiques the major browser brands using these criteria to help users quickly and efficiently identify their own needs and find the solution that best meets those needs.

About ixDownload

ixDownload.Com is the Internet’s leading software information and resource site focusing on a wide range of security, productivity, and multimedia applications.

Contact name:  Oliver Thompson

Location:  Bellevue Washington