|
||
|
||
Tuesday March 25, 2008 |
||
|
Mi5 Networks Extends Web Perimeter Protection with Powerful Application Control Capabilities Version 4.0 Adds Control for More Than One Hundred Applications and Protocols; Botnet Geolocation; Centralized Management Appliances; and ICAP/UFP Support SUNNYVALE, Calif.--(BUSINESS WIRE)--Mi5 Networks, the web security gateway company, today announced a major software enhancement to its award-winning Webgate line of high-speed appliances which provide filtering of malicious URLs, spyware, viruses, and inbound/outbound botnet communications. Version 4.0 adds control for more than one hundred applications and protocols, including leading Instant Messaging (IM), Peer-to-Peer (P2P), Voice over IP (VoIP), streaming media, and other enterprise applications. In addition, 4.0 can trace the geographic location of Botnet traffic entering and leaving the network; provides centralized management, policy enforcement, and reporting across multiple devices; and enables new flexible deployment options through ICAP and UFP protocol support. According to Gartner, Inc., A Secure Web gateway (SWG) is a solution that filters unwanted software/malware from user-initiated Web/Internet traffic and enforces corporate and regulatory policy compliance. To achieve this goal, SWGs must, at a minimum, include URL filtering, malicious-code detection and filtering, and application controls for popular Web-based applications, such as instant messaging (IM) .1 The Web now represents the most targeted and exploitable attack surface in an organizations network, said Doug Camplejohn, founder and CEO of Mi5 Networks. From day one, our goal with Webgate was to build a modular, very high performance platform that could protect all Web avenues into an organization without impacting the browsing experience. With Version 4.0, we have taken the visibility, protection and enterprise integration capabilities of Webgate to a whole new level. Application Control Across Any Port or Protocol To control web use and provide 100 percent coverage against web threats, Webgate now monitors, controls, and blocks over hundred web applications and protocols including all leading IM, P2P, VoIP, remote access, streaming media, database, gaming, e-mail/groupware, and file transfer products and tools. Webgate provides granular access and usage management capabilities including the ability to:
Geolocation of Attacks and Botnet Communications To detect compromised end-points inside the organization, Webgate inspects all web streams entering, leaving and circulating inside the network. This 360 degree perspective enables Webgate to automatically identify and shut down Botnet-hijacked machines. Webgate 4.0 introduces new Geolocation capabilities that pinpoint the name and geographic origin of attacks for assessing their severity. Webgate Geolocation integrates with Google Maps and provides additional threat data to shed light on the source of botnet command and control infrastructures. This capability also assists organizations when reporting attacks to law enforcement agencies. Centralized Intelligence and Management For automated configuration, policy management, monitoring, and reporting across multiple Webgate appliances, Mi5 Networks is introducing two dedicated Central Intelligence (CI) units: the CI-10 and CI-100. From the CI user interface, administrators can centrally manage all the Webgate appliances in their organization with the click of a mouse. Users can create, change, and apply security policies; monitor global network activity and drill down into regions, locations, departments, users, etc.; and access the rich reporting database. CI-10 models can manage up to 10 devices in a 1U form factor. CI-100 units can manage up to 100 Webgate devices in a 2U form factor, and are equipped with redundant power supplies and disks. ICAP and UFP Support To easily adapt to existing network topologies and provide organizations with an even more flexible set of deployment options, Webgate now supports ICAP and UFP protocols, which are used by over 75 vendors. For example, this capability enables customers to backhaul traffic from Juniper, Check Point and other firewalls at remote sites such as retail stores, branch offices, etc., to Webgate appliances at corporate or regional headquarters. In addition, ICAP support provides seamless integration and a gradual migration path from existing proxy devices. Mi5 is a member of the ICAP organization and a member of the OPSEC Alliance. Pricing and Availability Version 4.0 and Central Intelligence appliances will be generally available in Q2 2008. Five different Webgate models are available to meet the needs of any size network starting at $3,495. Pricing for Central Intelligence units starts at $19,995. Pricing for the Application Control module starts at $995 for 100 users. About Mi5 Networks Mi5 Networks enables organizations to defend their web perimeter, and eliminate lost employee productivity, PC clean-up costs, and data theft associated with undetected malware. The companys Webgate security appliances protect organizations against web-based threats, including malicious URLs, spyware, crimeware, botnets and viruses, while providing control over web use. Mi5 Networks is privately held and based in Sunnyvale, California. For more information visit: www.mi5networks.com. |
|
|
||
Tous droits réservés - All rights
reserved. |