Mi5 Networks Extends Web Perimeter Protection with Powerful Application Control Capabilities

LADYDRAGON.COM

 

 
 

 
     
 

Tuesday March 25, 2008

 
   

Mi5 Networks Extends Web Perimeter Protection with Powerful Application Control Capabilities

Version 4.0 Adds Control for More Than One Hundred Applications and Protocols; Botnet Geolocation; Centralized Management Appliances; and ICAP/UFP Support

SUNNYVALE, Calif.--(BUSINESS WIRE)--Mi5 Networks, the web security gateway company, today announced a major software enhancement to its award-winning Webgate line of high-speed appliances which provide filtering of malicious URLs, spyware, viruses, and inbound/outbound botnet communications. Version 4.0 adds control for more than one hundred applications and protocols, including leading Instant Messaging (IM), Peer-to-Peer (P2P), Voice over IP (VoIP), streaming media, and other enterprise applications. In addition, 4.0 can trace the geographic location of Botnet traffic entering and leaving the network; provides centralized management, policy enforcement, and reporting across multiple devices; and enables new flexible deployment options through ICAP and UFP protocol support.

According to Gartner, Inc., A Secure Web gateway (SWG) is a solution that filters unwanted software/malware from user-initiated Web/Internet traffic and enforces corporate and regulatory policy compliance. To achieve this goal, SWGs must, at a minimum, include URL filtering, malicious-code detection and filtering, and application controls for popular Web-based applications, such as instant messaging (IM).1

The Web now represents the most targeted and exploitable attack surface in an organizations network, said Doug Camplejohn, founder and CEO of Mi5 Networks. From day one, our goal with Webgate was to build a modular, very high performance platform that could protect all Web avenues into an organization without impacting the browsing experience. With Version 4.0, we have taken the visibility, protection and enterprise integration capabilities of Webgate to a whole new level.

Application Control Across Any Port or Protocol

To control web use and provide 100 percent coverage against web threats, Webgate now monitors, controls, and blocks over hundred web applications and protocols including all leading IM, P2P, VoIP, remote access, streaming media, database, gaming, e-mail/groupware, and file transfer products and tools. Webgate provides granular access and usage management capabilities including the ability to:

  • Control activity by specific application and application category

  • Monitor, allow, and block applications and downloads using application fingerprints

  • Scan IM file downloads for malware or block all IM downloads

  • Set and enforce identity-based policies organization-wide, at the departmental level, or by user, IP address, and Subnet

Geolocation of Attacks and Botnet Communications

To detect compromised end-points inside the organization, Webgate inspects all web streams entering, leaving and circulating inside the network. This 360 degree perspective enables Webgate to automatically identify and shut down Botnet-hijacked machines. Webgate 4.0 introduces new Geolocation capabilities that pinpoint the name and geographic origin of attacks for assessing their severity. Webgate Geolocation integrates with Google Maps and provides additional threat data to shed light on the source of botnet command and control infrastructures. This capability also assists organizations when reporting attacks to law enforcement agencies.

Centralized Intelligence and Management

For automated configuration, policy management, monitoring, and reporting across multiple Webgate appliances, Mi5 Networks is introducing two dedicated Central Intelligence (CI) units: the CI-10 and CI-100. From the CI user interface, administrators can centrally manage all the Webgate appliances in their organization with the click of a mouse. Users can create, change, and apply security policies; monitor global network activity and drill down into regions, locations, departments, users, etc.; and access the rich reporting database. CI-10 models can manage up to 10 devices in a 1U form factor. CI-100 units can manage up to 100 Webgate devices in a 2U form factor, and are equipped with redundant power supplies and disks.

ICAP and UFP Support

To easily adapt to existing network topologies and provide organizations with an even more flexible set of deployment options, Webgate now supports ICAP and UFP protocols, which are used by over 75 vendors. For example, this capability enables customers to backhaul traffic from Juniper, Check Point and other firewalls at remote sites such as retail stores, branch offices, etc., to Webgate appliances at corporate or regional headquarters. In addition, ICAP support provides seamless integration and a gradual migration path from existing proxy devices. Mi5 is a member of the ICAP organization and a member of the OPSEC Alliance.

Pricing and Availability

Version 4.0 and Central Intelligence appliances will be generally available in Q2 2008. Five different Webgate models are available to meet the needs of any size network starting at $3,495. Pricing for Central Intelligence units starts at $19,995. Pricing for the Application Control module starts at $995 for 100 users.

About Mi5 Networks

Mi5 Networks enables organizations to defend their web perimeter, and eliminate lost employee productivity, PC clean-up costs, and data theft associated with undetected malware. The companys Webgate security appliances protect organizations against web-based threats, including malicious URLs, spyware, crimeware, botnets and viruses, while providing control over web use. Mi5 Networks is privately held and based in Sunnyvale, California. For more information visit: www.mi5networks.com.

     
 

 
     
 

Back

 
     
 

Tous droits réservés - All rights reserved.
Copyright ©1998 - 2008 - LadyDragon.com
dragon@ladydragon.com