此页面上的内容需要较新版本的 Adobe Flash Player。

获取 Adobe Flash Player

  PositionHome > Hotnews & Event
 

Year: 2010 2011  2012  2013

Date
Topic & Link

 2012/12/04

eiQ

eIQnetworks Named as Finalist in GSN’s 4th Annual Homeland Security Award

Government Security News has named the company a finalist in its 4th Annual Homeland Security Awards competition in the category Best Compliance/Vulnerability Assessment Solution.

GSN Homeland Security Awards celebrates the public-private collaboration that makes up the nation’s homeland security apparatus by presenting awards to leading vendors of IT and physical security products and solutions, and to federal, state, county and municipal agencies for notable achievements in government programs, projects, strategies and initiatives.

>more..

 2012/08/23

NI

IP Expert Network Instruments Announces Entry into Mobile Carrier Market with Observer LTE Support

Theaddition of comprehensive LTE support in the latest version of its Observer performance management platform. The platform provides end-to-end visibility for tracking the flow of control and data services across high-speed LTE networks. This gives mobile carriers shifting to IP-based networks complete visibility and dedicated metrics across all points of their LTE infrastructure – from the tower to the core to help ensure rapid resolution, capacity planning, and subscriber satisfaction.

>more..

 2012/7/26

eiQ

eIQnetworks’ SecureVue Earns Security Content Automation Protocol (SCAP) Certification from NIST

eIQ’s SecureVue® has received Security Content Automation Protocol (SCAP) certification from the National Institute of Standards & Technology (NIST). SecureVue customers can leverage the latest SCAP policies and content to streamline and automate DISA STIG compliance and meet continuous monitoring requirements mandated by NIST 800-53, FDCC, USGCB and DIACAP. Federal customers who have been using SecureVue for DISA STIG auditing automation are realizing up to 90% cost savings.

>more..

 2012/05/25

Certes Networks Named "Cool Vendor" by Leading Analyst Firm

Certes Networks, an innovative developer of scalable network and cloud encryption solutions, today announced its inclusion in the recent Gartner, Inc. report, "Cool Vendors in Cloud Security, 2012", highlighting companies that offer innovative cloud based approaches to security. Gartner focuses its "Cool Vendor" research on companies that offers technologies or solutions that are innovative and provide an impactful business tool. 

This announcement comes just 10 days after Certes Networks launched its Virtual Certes Enforcement Point (vCEP), a virtual appliance that allows organizations to protect sensitive network traffic among virtual servers and between clouds without using tunnels. The vCEP appliance encrypts network traffic from Infrastructure as a Service (IaaS) cloud infrastructures to data centers across the WAN, as well as from server to server within the cloud.

>more..

 2012/05/25

NI

Network Instruments® Unveils 40 Gb Data Center Monitoring Platform 

Network Instruments announced today the release of its new hardware and software interface for capturing and analyzing full-duplex 40 Gb data center performance.

The platform is the first full-duplex analysis interface for 40 Gb networks. Coupled with the GigaStor™ retrospective network analysis appliance, IT teams can store up to 5 PB of traffic to validate and manage network and application performance on critical 40 Gb links.

40 Gb Capture Technology
Network Instruments released the new Gen2™ capture card, designed and developed in house to handle the significant data acquisition and analysis demands of 40 Gb network environments. The new card operates on both single and multimode 40 Gb links. With onboard hardware acceleration, filtering, and de-duplication, the Gen2 product line features the fastest capture cards available with the capacity to support full-duplex gigabit, 10 Gb, and 40 Gb environments.

Secure 40 Gb Access
Another key component of the company’s 40 Gb offering is the new 40 Gb multimode optical nTAP™. The full-duplex, optical nTAP is the first in the industry to provide permanent, passive access to full-duplex 40 Gb traffic. It will not introduce points of failure on the network, or impact the performance of other devices. Because it does not have an IP address or require power to function, the device is secure from hack attacks.

>more..

2012/05/09

Certes Networks Releases Virtual Security Appliance - the Industry's First Scalable Network Encryption Solution for the Cloud

Certes takes a revolutionary approach to cloud security by protecting network traffic inside and between IaaS clouds. The vCEP solution focuses on four key areas: 

Scalable Group Encryption: With TrustNet group encryption, keys are centrally generated and securely distributed to all of the authorized group members (as defined in Certes TrustNet Manager). Each group member can communicate securely with the other members without the performance and maintenance overhead of tunnels. Unlike tunnel-based solutions, group encryption is designed to scale to protect thousands or even tens of thousands of servers. Scalability is an essential consideration when designing cloud security solutions today, as many analysts expect twenty to fifty percent annual growth in the number of servers deployed in IaaS clouds in the coming years. 

Encryption without Unprotected Gaps: As a virtual appliance that resides on the same server as the virtual servers that it protects, the vCEP protects sensitive network traffic inside the cloud provider's network without leaving gaps where the data is not protected. 

Secure Isolation from other Cloud Tenants: As part of the Certes TrustNet solution, the vCEP provides persistent authentication to ensure continuous data integrity. The combination of authentication and encryption provide cryptographic isolation among cloud tenants. Cloud providers today typically offer only logical separation that can break down and allow one tenant to attack another due to misconfiguration, unauthorized wiretaps or man-in-the-middle attacks. Data that is encrypted and authenticated using keys managed by the cloud customer is not susceptible to these types of attacks. 

Client Control of Encryption Keys: An important benefit of the vCEP is its ability to allow the client to maintain control of their own policies and encryption keys. This is essential for regulatory compliance, and it protects both the data owner and the infrastructure provider. The vCEP provides a safe harbor for most data privacy regulations by leveraging Certes TrustNet standards-based encryption that has been deployed and proven across a broad range of industries to achieve compliance for data privacy including finance, healthcare, government, retail and utilities. Client control of policies and keys also benefits the cloud provider by removing the potential legal burden associated with being in possession of the encryption keys. 

The vCEP is interoperable with existing Certes Networks Variable Speed Encryptors (VSEs), which gives customers the choice of using a physical or virtual appliance. New and existing Certes customers can securely adopt or migrate to cloud infrastructures and expand or contract virtual resources seamlessly, without creating security gaps in existing data center and enterprise networks. Using Certes TrustNet Manager security for all networks can be managed from a central web-based management console. 

>more..

2012/02/20

NI

Network Instruments® Delivers In-Depth IPTV Performance Monitoring

IPTV
The Observer platform now fully supports the monitoring of multicast and unicast IPTV video streams in the context of overall network traffic. Teams can track critical performance metrics including Media Delivery Index (MDI), jitter, latency, and packet loss; alarm on specific IPTV errors, and they can also reconstruct and replay IPTV video transmissions.

“As enterprise organizations continually expand the ways they interact with customers, partners, and employees, they rely on our solutions to validate and optimize their large communication application investments,” said Brad Reinboldt, senior product manager of Network Instruments. “As companies deploy IPTV, Observer will enable them to monitor IPTV streaming video, verify acceptable user experience, and confirm SLAs have been met.”

Observer Reporting Server (ORS) Open Access
To streamline the process of sharing critical data and analysis between IT teams, the new ORS Open Access feature allows graphs, reports, and metrics from ORS to be embedded into third-party monitoring platforms, such as a Manager of Managers (MOM) or Security Information and Event Manager (SIEM) solutions. In addition, external platforms can obtain raw data from ORS and apply new analytics.

“The multitude of tools that IT teams use act as a barrier to coordinating performance management efforts,” said Charles Thompson, director of product strategy for Network Instruments. “Utilizing ORS Open Access, teams are able to easily integrate in-depth application and infrastructure reports and metrics within their existing management solutions. With this complete picture of performance, security or operations teams can now track and accurately resolve issues.”

Tracking NFS Traffic
The new version of the Observer platform now provides transaction-level analytics for Network File System (NFS) applications. This allows engineers to obtain response times, real-time and historical NFS errors, and transaction types within a single view. If an issue is discovered, the engineer can navigate directly to the problematic transactions and packets.

Identifying IP Location
The new GeoIP Capture feature enhances GigaStor’s ability to assist in identifying the source of anomalous activities. In using GigaStor’s historical analysis capabilities, managers can now identify the IP address, service provider, and potential location of unknown hosts or sources of malicious activity.

>more..

2012/02/20

SafeNet

Gartner's 2012 Magic Quadrant recognizes SafeNet's leadership position in Authentication.

According to the Gartner Magic Quadrant report, "a provider in the user authentication market delivers on-premises software/hardware or a cloud based service that makes real-time authentication decisions and can be integrated with one or more enterprise systems to support one or more use cases. Where appropriate to the authentication methods supported, a provider in the user authentication market also delivers client-side software or hardware used by end users in those real-time authentication decisions". Gartner estimates "the overall growth in the market by customers to be approximately 30 percent year over year". Enterprise interest in OTP methods, "remains high; however, as has already been noted, Gartner has seen a significant shift in preference from traditional hardware tokens to phone-based authentication methods".

>more..

2012/02/20

eiQ

eIQnetworks Outlines How Federal Agencies Can Rapidly Attain Consistent, Continuous Compliance with DISA STIGs

SecureVue provides a complete, integrated solution for DISA STIG compliance across devices, hosts and applications. Delivering true situational awareness, SecureVue is optimally designed for STIG audits by providing:

  • Agentless Technology — SecureVue can effectively monitor the full range of IT assets
  • Single STIG Audit Platform for Hosts and Devices — SecureVue provides a complete library for STIG auditing of both hosts and devices as well as common applications and database platforms
  • Secure, Comprehensive STIG Auditing — SecureVue provides secure, end-to-end and complete STIG auditing with direct one-to-one correlation against each control in each supported STIG, including non-technical controls
  • Common Operating Picture (COP) — SecureVue ensures all appropriate personnel have comprehensive visibility of compliance and asset readiness
  •  Certification and Accreditation Standards — SecureVue has been validated by NIST FIPS 140-2, Level 2; NIAP Common Criteria; DISA Unified Capability (UC) Approved Product List (APL); SCAP support and US Army Certificate of Networthiness (CON).

 

>more..

 

 


Copyright © 2010-2013RichSmart Technology Co., Ltd. All rights reserved. Homeabout RichSmartProducts SolutionsCustomersContact us