Fortinet introduces the world’s first hyperscale firewall

FortiGate 4400F is the only firewall capable of securing hyperscale data centres and 5G networks, delivering the industry’s highest performance with Security Compute Ratings of up to 13x 

John Maddison, EVP of products and CMO, Fortinet, said, “Fortinet continues to push the boundaries of hardware-accelerated performance to enable the convergence of security and networking – what we call Security-driven Networking. The FortiGate 4400F Network Firewall delivers unprecedented scale and performance that is up to 13 times better than comparable products. As the only network firewall capable of securing hyperscale data centres and 5G networks, FortiGate 4400F leads the industry in what is possible for data centre security.” 

News summary 

Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, has announced the world’s first hyperscale firewall, FortiGate 4400F, setting new milestones for Security Compute Ratings to deliver unparalleled performance, scalability and security in a single appliance to meet escalating business needs. FortiGate 4400F is powered by Fortinet’s latest seventh generation network processor (NP7) to offer hardware-acceleration, making it the only network firewall that is fast enough to secure hyperscale data centres and 5G networks. 

Hyperscale data centres require hyperscale security 

Today’s most digitally innovative organisations face escalating and often unpredictable capacity needs that are quickly outpacing their security solution’s performance capabilities. As a result, security has become the choke point for traffic entering and exiting most hyperscale data centres, adversely affecting user experience, and bringing productivity to a crawl, causing many network admins to feel pressured by business demands to forego security safeguards. Allowing all traffic to flow freely into and out of an organisation’s network without security opens organisations up to the risk of cyberattacks, which can severely damage their brand reputation and cause potential loss in revenue due to extended downtime. While many organisations have successfully deployed hyperscale network architectures, achieving hyperscale security has been a significant challenge. To-date, some vendors claim to implement hyperscale security through multiple firewalls orchestrated together to achieve a hyperscale architecture, which has proven to be cumbersome and expensive. The hardware acceleration via purpose-built NP7 network processors of FortiGate 4400F uniquely delivers the first single compact appliance with security performance and scale that keeps up with the growth of today’s hyperscale data centres and enables the following use cases: 

  • High velocity e-retail: Allows high-velocity e-retail businesses to deliver the best possible user experience for their customers by supporting tens of millions of connections per second, enabling essential layer 4 security, and delivering hardware-accelerated prevention of distributed denial of service (DDoS) attacks. 
  • Cutting-edge research: Enhances productivity for cutting-edge research facilities and other verticals like oil and gas by supporting the secure transfer of extremely large datasets – also known as elephant flows – of up to 100Gbps. For situations that require encrypting at high speeds, IPsec can be turned on non-intrusively to support high-bandwidth IPsec tunnel flows. 
  • Financial institutions, cloud providers and other large enterprises: Allows businesses to launch services in the most agile and secure fashion possible to increase productivity and revenue. By accelerating VXLAN-based segmentation, FortiGate 4400F enables super-fast communication between massively scaled services (such as compute, storage, or apps) that are co-hosted on physical and virtualised domains. These large scale segments can be protected with essential Layer 4 or advanced Layer 7 security. 

5G speeds need security at scale that can keep up 

Today’s hyperconnected world allows user-to-user, user-to-machine, and machine-to-machine communication, which in turn puts huge demands on security to be delivered at massive scale. As 4G transitions to 5G, these demands will be pushed to their limits as network operation teams must ensure both security and business continuity. Most solutions lack the required scale to overcome IPv4 address scarcity, growing mobile bandwidth demands, and increasing numbers of encrypted tunnels connecting infrastructure, which in turn holds carriers back from being able to support a large set of customers. FortiGate 4400F uniquely addresses these pain points, delivering: 

  • Carrier-grade network address translation (CGNAT) that enables hyperscale Packet Delivery Network (PDN) while preserving user experience with hardware-accelerated user session setup rates, low latency and hardware-assisted logging for audit and control. 
  • Critical scale for Security Gateway (SecGW) at 4G and 5G mobile for Radio Access Network (RAN) control to enable services providers to build high capacity networks that maximise return on investment. 
  • Allows service providers to differentiate their customer offerings by delivering additional value-added services such as parental control with technologies like URL filtering. 

FortiGate 4400F vs. competitors 

Below is a comparison of the top firewalls on the market against the FortiGate 4400F series. Security Compute Rating is a benchmark (performance multiplier) that compares FortiGate Network Firewall performance versus the industry average of competing products across various categories that fall within the same price band. 

1 Target values – Enabled by a hyperscale license 

2 PAN: Calculated with 1-NPC (100G-NPC) cards, no services and support 

3 ​​Juniper: SRX5400E-B2-AC 

FortiGate 4400F showcases the industry’s highest performance with Security Compute Ratings up to 13x better than the competition. As a result, organisations can enjoy far greater headroom for digital innovation with Fortinet TCO savings and have the resources to respond to unexpected events.  

Powered by security-driven networking 

FortiGate 4400F leverages security-driven networking principals to enable ultra-scalable, secure distributed networks and hyperscale data centres. Security-driven Networking solutions are not only faster and scale further than the competition, they are also much more cost-effective, delivering the industry’s best price/performance in a compact form factor for additional lower costs associated with lower rack space, power and cooling requirements. Fortinet also offers industry leading automation and orchestration capabilities as part of Fabric Management Center and FortiOS. Additionally, Fortinet continues to be a proponent of Open APIs and is committed to support industry initiatives like OpenConfig with the goal of delivering automation to streamline operations. 

The FortiGate 4400F, as a part of an integrated security platform via the Fortinet Security Fabric, also provides security for hybrid data centres as follows: 

  • Protection from known attacks with AI-powered FortiGuard services including web filtering and intrusion prevention system services. 
  • Proactive threat detection for any segmentation that a customer plans to adopt with a Security Compute Rating of 2x. 
  • Full visibility into threats and removes blind spots with SSL inspection including TLS 1.3 that is 6.5x better than competing products. 
  • Protection of business critical applications and servers by offering virtual patching using high performance consolidated IPS. 

Supporting quotes 

“Fortinet’s highly differentiated high-end firewalls enable us to deliver security-driven networking for our customers to protect IT systems, platforms, and applications. FortiGate is a long-term advanced security solution that consolidates point-products and reduces cost and complexity. FortiGate 4400F will uniquely allow us to provide hyperscale security solutions that preserve user experience and business growth for our largest customers.”
 Michael J. McGlynn, Vice President, Global Security at WWT 

“Security has long been an issue for organisations with the largest capacity needs  it simply hasn’t been able to keep up, causing many network admins to make the tradeoff between meeting business demands and maintaining a strong security posture. Hyperscale data centres and 5G networks have the biggest need for security that can keep pace with unprecedented user and enterprise demands. Fortinet is delivering security performance figures that far exceed those of competitor solutions to finally give hyperscale organisations the ability to efficiently and effectively secure their business.”
– Zeus Kerravala, Founder and Principal Analyst at ZK Research 

Additional resources 

  • Read more about the announcement and how the FortiGate 4400F delivers security for hyperscale data centres and 5G in the blog. 
  • Learn more about the FortiGate 4400F and our FortiGate family of next-generation firewalls. 

About Fortinet
Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organisations around the world. Fortinet empowers our customers with complete visibility and control across the expanding attack surface and the power to take on ever-increasing performance requirements today and into the future. Only the Fortinet Security Fabric platform can address the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Fortinet ranks #1 in the most security appliances shipped worldwide and more than 455,000 customers trust Fortinet to protect their businesses. Both a technology company and a learning company, the Fortinet Network Security Institute has one of the largest and broadest cybersecurity training programs in the industry. Learn more at https://www.fortinet.com, the Fortinet Blog, or FortiGuard Labs. 

Copyright © 2020 Fortinet, Inc. All rights reserved. The symbols ® and  denote respectively federally registered trademarks and common law trademarks of Fortinet, Inc., its subsidiaries and affiliates. Fortinet’s trademarks include, but are not limited to, the following: Fortinet, FortiGate, FortiGuard, FortiCareFortiManagerFortiAnalyzerFortiOSFortiADCFortiAPFortiAppMonitorFortiASICFortiAuthenticatorFortiBridgeFortiCacheFortiCameraFortiCASB, FortiClient, FortiCloudFortiConnectFortiControllerFortiConverterFortiDBFortiDDoSFortiExplorerFortiExtenderFortiFoneFortiCarrierFortiHypervisorFortiIsolatorFortiMailFortiMonitorFortiNACFortiPlannerFortiPortalFortiPresence , FortiProxyFortiRecorderFortiSandboxFortiSIEMFortiSwitchFortiTesterFortiTokenFortiVoiceFortiWANFortiWebFortiWiFiFortiWLCFortiWLCOS and FortiWLM. 

Other trademarks belong to their respective owners. Fortinet has not independently verified statements or certifications herein attributed to third parties and Fortinet does not independently endorse such statements. Notwithstanding anything to the contrary herein, nothing herein constitutes a warranty, guarantee, contract, binding specification or other binding commitment by Fortinet or any indication of intent related to a binding commitment, and performance and other specification information herein may be unique to certain environments. This news release may contain forward-looking statements that involve uncertainties and assumptions, such as statements regarding technology releases among others. Changes of circumstances, product release delays, or other risks as stated in our filings with the Securities and Exchange Commission, located at www.sec.gov, may cause results to differ materially from those expressed or implied in this press release. If the uncertainties materialise or the assumptions prove incorrect, results may differ materially from those expressed or implied by such forward-looking statements and assumptions. All statements other than statements of historical fact are statements that could be deemed forward-looking statements. Fortinet assumes no obligation to update any forward-looking statements, and expressly disclaims any obligation to update these forward-looking statements. 

Fortinet unveils cloud-to-cloud SD-WAN solution to simplify and enhance multi-cloud applications

Fortinet Secure SD-WAN for Multi-Cloud showcases Fortinet’s ability to deliver scalable, cost effective SD-WAN anywhere

John Maddison, EVP of products and CMO, Fortinet, said, “For enterprises deploying applications and workloads across multiple clouds, the need to seamlessly manage connectivity and maintain security across the diverse infrastructure is higher than ever. Fortinet Secure SD-WAN solutions provide connectivity and security across diverse cloud infrastructures while optimising application user experience. Fortinet enables enterprises to realise the true potential of SD-WAN by enabling it to be implemented anywhere. From home, campus to cloud, data center to cloud, and now cloud to cloud, Fortinet delivers the industry’s most scalable, cost effective and secure SD-WAN solution on the market.”

News summary

Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, has announced Fortinet Secure SD-WAN for Multi-Cloud, a networking and security solution that solves common application performance, visibility, cost, and control challenges associated with multi-cloud deployments by enabling SD-WAN across multiple clouds and regions.

Most enterprises today – 93 per cent by recent estimates – have a multi-cloud strategy in place and work with multiple cloud providers to meet a number of business needs, including disaster recovery, data backup, application resiliency, and global coverage. However, managing and securing an assortment of different private and public cloud workloads and environments remains a challenge, with many organisations choosing to connect their clouds via their on-premises data centre WAN edge. The use of this type of traditional WAN infrastructure approach, though secure, inhibits multi-cloud capabilities and results in deployment complexity, inconsistent network performance, and expensive connectivity.

Fortinet Secure SD-WAN for Multi-Cloud is a new approach to establishing secure and high-performance connectivity between public cloud workloads running on multiple clouds without increasing cost and complexity. Available in all major cloud providers, Fortinet Secure SD-WAN for Multi-Cloud enables a consistent network architecture leveraging SD-WAN capabilities between clouds and empowers application developers and enterprise IT to build a high speed and seamless cloud-to-cloud network and security architecture. Fortinet Secure SD-WAN for Multi-Cloud uniquely offers a secure and effective infrastructure for maximising the benefits of enterprise multi-cloud deployments by:

  • Automating the deployment of a consistent overlay network across different cloud networks, reducing complexity and increasing agility to save teams time and resources.
  • Offers end-to-end visibility, control, and centralised management that unifies functionality across multiple cloud environments through cloud native integrations.
  • Securely transports application traffic between clouds without needing to backhaul through the data centre, enabling better scaling of deployments and reducing latency.
  • Intelligently selects connections based on application characteristics employing dynamic path selection, improving performance and optimising cost by selecting the best internet or leased line link.
  • Provides an application developer-friendly API to enable programmers the ability to consistently represent their network and security requirements.

Fortinet performance advantage on-premises and in the cloud

Fortinet delivers Secure SD-WAN as an integrated feature of its industry-leading FortiGate Next-Generation Firewall, powered by the industry’s first SD-WAN ASIC to enable better application experience, higher performance, and better cost efficiency – with Security Compute Ratings up to 17 times better than competitor solutions. Fortinet Secure SD-WAN for Multi-Cloud, delivered via FortiGate-VM, a virtual appliance, is powered by Fortinet’s patented vSPU technology and maintains a performance advantage in the cloud, including over 20Gbps of IPsec performance – 10 times the industry average – for fast encrypted connections over internet and leased line links to reduce operational costs. By leveraging the broad FortiGate-VM footprint across all major cloud platforms, as well as market leading FortiGate appliances on-premises, enterprise organisations can benefit from cloud-agnostic consistent multi-cloud networks without compromising on security and performance.

Fortinet Secure SD-WAN for Multi-Cloud, which securely connects applications and workloads across multiple clouds, complements Fortinet’s existing Secure SD-WAN Cloud On-Ramp capabilities to securely connect users and offices to applications and cloud workloads.

SD-WAN for the entire end-to-end enterprise

Fortinet delivers a Secure SD-WAN product portfolio designed for the entire end-to-end enterprise with physical appliances for large data centres, branch offices, remote sites, and home offices, as well as virtual appliances for multi-cloud deployments. Fortinet Secure SD-WAN’s ability to scale from home office to branch to cloud all tied to a single operating system via the Fortinet Security Fabric ensures networking and security policies seamlessly work across multiple environments and cloud platforms, enabled by the latest threat intelligence from FortiGuard Labs.

Supporting quotes

“Node4 uses Fortinet technology to solve our customers’ biggest challenges and requirements, and also in our own network to improve performance for our cloud and SaaS services. Fortinet’s dynamic approach to cloud security and connectivity ensures our data is protected no matter where it goes. Fortinet Secure SD-WAN for Multi-Cloud will allow us to maximise the full potential of our multi-cloud strategy.”
– Paul Bryce, CCO at Node4

“Our customers are rapidly embracing multi-cloud and need solutions that can secure and connect their complex ecosystems. We always lead with Fortinet Secure SD-WAN solutions as Fortinet provides a consistent feature-rich platform that is both stable and secure. Fortinet has done an excellent job combining the needs of security and the needs of real-time performance into one multi-cloud platform. “
– E. Burke Anderson, President, CEO at North Atlantic Networks

Additional resources

About Fortinet
Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organisations around the world. Fortinet empowers our customers with complete visibility and control across the expanding attack surface and the power to take on ever-increasing performance requirements today and into the future. Only the Fortinet Security Fabric platform can address the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Fortinet ranks #1 in the most security appliances shipped worldwide and more than 455,000 customers trust Fortinet to protect their businesses. Both a technology company and a learning company, the Fortinet Network Security Institute has one of the largest and broadest cybersecurity training programs in the industry. Learn more at https://www.fortinet.com, the Fortinet Blog, or FortiGuard Labs.

Copyright © 2020 Fortinet, Inc. All rights reserved. The symbols ® and denote respectively federally registered trademarks and common law trademarks of Fortinet, Inc., its subsidiaries and affiliates. Fortinet’s trademarks include, but are not limited to, the following: Fortinet, FortiGate, FortiGuard, FortiCare, FortiManager, FortiAnalyzer, FortiOS, FortiADC, FortiAP, FortiAppMonitor, FortiASIC, FortiAuthenticator, FortiBridge, FortiCache, FortiCamera, FortiCASB, FortiClient, FortiCloud, FortiConnect, FortiController, FortiConverter, FortiDB, FortiDDoS, FortiExplorer, FortiExtender, FortiFone, FortiCarrier, FortiHypervisor, FortiIsolator, FortiMail, FortiMonitor, FortiNAC, FortiPlanner, FortiPortal, FortiPresence , FortiProxy, FortiRecorder, FortiSandbox, FortiSIEM, FortiSwitch, FortiTester, FortiToken, FortiVoice, FortiWAN, FortiWeb, FortiWiFi, FortiWLC, FortiWLCOS and FortiWLM.

Other trademarks belong to their respective owners. Fortinet has not independently verified statements or certifications herein attributed to third parties and Fortinet does not independently endorse such statements. Notwithstanding anything to the contrary herein, nothing herein constitutes a warranty, guarantee, contract, binding specification or other binding commitment by Fortinet or any indication of intent related to a binding commitment, and performance and other specification information herein may be unique to certain environments. This news release may contain forward-looking statements that involve uncertainties and assumptions, such as statements regarding technology releases among others. Changes of circumstances, product release delays, or other risks as stated in our filings with the Securities and Exchange Commission, located at www.sec.gov, may cause results to differ materially from those expressed or implied in this press release. If the uncertainties materialise or the assumptions prove incorrect, results may differ materially from those expressed or implied by such forward-looking statements and assumptions. All statements other than statements of historical fact are statements that could be deemed forward-looking statements. Fortinet assumes no obligation to update any forward-looking statements, and expressly disclaims any obligation to update these forward-looking statements.

Security experts and CompTIA produce Security Tech Tools video series

CompTIA Logo Educational videos on critical cybersecurity topics relevant to any organisation have been produced by a group of security experts and leading members of CompTIA, the nonprofit association for the technology industry announced today.

The Security Tech Tools Videos were developed by the CompTIA IT Security Community, a group of experts and leaders in the IT security field collectively committed to developing security-specific best practices, education programs and industry standards.

“So many resources are devoted to security by technology solution providers and so much money is spent on security readiness by organisations, yet there is a gap in understanding what it all means,” said Chris Johnson, co-founder and CEO, Untangled Solutions, and chairman of the CompTIA IT Security Community. “These candid conversations with experts in the field will help anyone getting into security, or anyone struggling to understand these security concepts.”

Tutorials are available on eight security tools: password and identity management, backup data and recovery, encryption, advanced firewall and unified threat management, intrusion prevention systems and intrusion detection systems, Internet content filtering, policies and compliance and anti-malware, anti-virus and anti-spyware solutions.

“There is a real need to help break down the mystery around these critical security areas so customers can understand their importance and security solution providers can engage their clients in a conversation about how to best protect their business,” said Ron Culler, chief technology officer, Secure Designs, and vice chair of the IT Security Community.

“Business goes better, and security definitely works better, when all parties to a transaction share a common understanding of the functions and capabilities of the products and services being pitched and purchased,” said Stephen Cobb, senior security researcher, ESET, who is featured in the video on anti-malware.

Lawrence Schweitzer, president of CMIT Solutions of East and West Nassau, said technology professionals will find the educational series just as valuable as the customers they’re serving.

“These videos are a way to connect with other security experts in the trenches, proposing and providing solutions for customers,” said Schweitzer, who speaks on backup data and recovery and business continuity in the series. “We don’t know everything, and if get even one nugget of useful information to help us, it’s worth watching the videos.”

“Both solution providers and customers need to understand what is involved in securing their businesses, what tools are out there and how they can help with security,” concluded Andrew Bagrin, CEO and founder, My Digital Shield. “Security is a continued learning state of mind. If we stopped learning at firewalls, we would be far behind right now. These videos will put our industry as a whole, a giant step in the right direction.”
The videos build on work done previously by the CompTIA IT Security Community to create an IT Security Assessment Wizard. It’s a web-based tool that security solution providers can use to document existing hardware, policies and security tools used by current and potential customers; and to identify the risks and benefits of other security tools they might use.

CompTIA is at the forefront of cybersecurity protections, with best practices for organisations; research and educational materials on the latest security trends and topics; skills certifications for technology workers; and CompTIA CyberSecure™, an innovative training course for employees on the cybersecurity best practices that are vital to protecting a business.

About CompTIA
The Computing Technology Industry Association (CompTIA) is a non-profit trade association serving as the voice of the information technology industry. With approximately 2,000 member companies, 3,000 academic and training partners, 75,000 registered users and more than two million IT certifications issued, CompTIA is dedicated to advancing industry growth through educational programs, market research, networking events, professional certifications and public policy advocacy. To learn more, visit CompTIA online, Facebook, LinkedIn and Twitter.

Ixia launches ThreatARMOR to strengthen enterprise defences against cyber-attacks

IXIA LogoSydney, AustraliaIxia (Nasdaq: XXIA), a leading provider of application performance and security resilience solutions, launched a new front line of defence for enterprise networks. Ixia’s ThreatARMOR represents another innovation for the company’s Visibility Architecture, enabling enterprises to reduce the ever-increasing size of their global network attack surface. ThreatARMOR is a natural complement to an existing security infrastructure, decreasing the volume of security alerts generated and freeing resources to focus on critical issues.

ThreatARMOR shrinks the network attack surface
A network attack surface is the sum of every access avenue an individual can use to gain access to an enterprise network. Enterprise security tools inspect all traffic, including that which should not be on the network in the first place, such as traffic from known malicious IPs, hijacked IPs, and unassigned or unused IP space/addresses. ThreatARMOR blocks this known bad traffic, reducing the burden on the existing security infrastructure. Ixia’s ThreatARMOR is an easy and fast way to reduce a network attack surface.

ThreatARMOR enables enterprise customers to:
• Block traffic from known bad IP addresses at line-rate speeds onsite without sending traffic outside the private network for inspection
• Add malicious IP addresses for blocking, either manually or automatically from SIEM tools
• Identify and stop infected internal devices from communicating to known botnet C&C servers
• Block traffic by geography from entire countries that likely have no valid reason to access the network
• Block unused IP space / unassigned IP addresses and hijacked domains from the network

Jon Oltsik, senior principal analyst, ESG, said, “What’s killing security is not technology, it is operations. Companies are looking for ways to reduce their overall operations requirements and need easy to use, high performance solutions, like ThreatARMOR, to help them do that.”

ThreatARMOR reduces security alert fatigue
The enterprise security perimeter has expanded to address new classes of attack, advancing breeds of hackers, and an evolving regulatory landscape. As attacks increase in complexity and sophistication, security vendors respond with powerful inspection and prevention security products.

Enterprises spend approximately 21,000 hours per year on average dealing with false positive cyber security alerts per a Ponemon Institute report published January 2015. ThreatARMOR eliminates unwanted traffic before it can impact an existing enterprise security infrastructure. This saves customers time and the cost of reviewing the flood of unnecessary notifications generated by powerful security systems, which can create alert fatigue for enterprise security teams. ThreatARMOR enables IT security personnel and resources to focus on key business issues and reduces the risk of critical alerts being missed.

Dennis Cox, Chief Product Officer, Ixia, said, “As many recent breaches demonstrate, indications of intrusions and data exfiltration attempts are usually flagged through internal security alerts long before the intrusion is actually discovered. But determining the critical alerts is like trying to find a needle in a haystack, given the sheer number of security alerts that must be analysed daily. ThreatARMOR delivers a new level of visibility and security by blocking unwanted traffic before many of these unnecessary security events are ever generated. And its protection is always up to date thanks to our Application and Threat Intelligence program.”

ThreatARMOR is backed by Ixia’s application and threat intelligence research centre
In 2014, more than 317 million new pieces of malware – computer viruses or other malicious software – were created. That means an average of nearly one million new threats were released each day.

Ixia’s professional-grade Application and Threat Intelligence (ATI) program has over a decade of experience providing threat intelligence to the world’s largest service providers and security equipment manufacturers for testing the efficacy of their cyber security products and systems.

The ATI program develops the threat intelligence for ThreatARMOR and a detailed “Rap Sheet” that documents the malicious activity of each included IP address. Rap Sheets provide proof of malicious activity for all blocked sites, supported with on-screen evidence of the activity such as malware distribution or phishing, including date of the most recent confirmation and screen shots.

With this clear reporting on blocking actions, customers can easily support IT compliance audits. Threat intelligence and Rap Sheet updates are pushed continuously to all ThreatARMOR devices for ongoing and consistent threat protection.

Competitive advantage for channel partners, business advantage for customers
ThreatARMOR gives Ixia channel partners a compelling new tool to add to their end-to-end security offerings. Preventing unwanted traffic from accessing the network represents a powerful competitive advantage by reducing the burden on customers’ security teams and optimising their use of other resources. ThreatARMOR’s plug and play operation allows for rapid time to value for customers with minimal upfront effort required to sell and deploy the solution.

Christian Pfalz, Sales Manager, Dimension Data, said, “ThreatARMOR allows organisations of all sizes to elegantly deflect potential threats on a global scale and basis. By using ongoing threat intelligence to deflect unwanted traffic before it accesses the network, this new element stands to reduce the strain and improve ROI on businesses’ existing security resources quite dramatically.”

 

-ENDS-

 

About Ixia

Ixia (Nasdaq: XXIA) provides application performance and security resilience solutions to validate, secure and optimise businesses’ physical and virtual networks. Enterprises, service providers, network equipment manufacturers and governments worldwide rely on Ixia’s solutions to deploy new technologies and achieve efficient, secure, ongoing operation of their networks. Ixia’s powerful and versatile solutions, expert global support and professional services equip organisations to exceed customer expectations and achieve better business outcomes. Learn more at www.ixiacom.com.

Ixia, ThreatARMOR and the Ixia logo are trademarks or registered trademarks of Ixia in the United States and other jurisdictions. All other trademarks used herein are the property of their respective owners.

UXC signs Senetas partner agreement to deliver Australian data security solutions

UXC LogoApril 22, 2014UXC Limited today announced its partnership with Senetas as part of a strategic initiative to provide Australian government agencies, defence and large corporations with tailored data security solutions and services.

The partnership brings together the certified high-speed, defence-grade encryptors of Senetas with UXC’s end-to-end ICT offering of advisory, consulting, and network infrastructure services and makes this solution available to UXC’s Australian government and commercial customer base.

Senetas, an Australian public listed company (ASX: SEN), specialises in protecting data as it is transmitted across networks whilst retaining maximum network performance. Senetas products are the world’s only triple-certified encryptors of (Common Criteria (Australia and international), FIPS (US) and CAPS (UK) certification – for government and defence use) and protect much of the world’s most sensitive data.

Cris Nicolli, managing director, UXC, said, “It is often assumed that data networks are inherently safe, but as the list of organisations affected by cyber-attacks continues to grow, it is clear that no company is immune. Data networks are vulnerable to security breaches. To be protected from a data network breach, cyber-attack or innocent routing error, organisations need strong encryption products.

“We expect that our ability to offer an Australian developed and manufactured security solution will be a strong selling point for government and defence agencies as well as corporates across Australia. Our partnership with Senetas will complement and extend UXC’s position as a leader in network integration and as a trusted services provider to our customers that will further add to our reputation as innovating in collaboration with key partners.”

Senetas CEO, Andrew Wilson, said, “With the number of data network breaches on the rise, we’re encouraging both the business and government sectors to understand that the true cost of data breaches extends beyond regulatory penalties, and often includes financial losses, the damage to reputation and trust, and loss of intellectual property. Businesses must be proactive in protecting their customers’ data and aware that they will be held accountable when that data is compromised.”

“Maximising our local R&D is helping us meet the rapidly growing needs of new customers around the world and making encryption more cost effective and easier to implement than ever before. Our partnership with UXC will help provide businesses with a data security solution that will drive results in a secure, sophisticated environment,” said Andrew Wilson.

“This is another exciting opportunity for UXC and one that will provide increased prospects for both UXC and Senetas in the market. We look forward to building a more secure and protected environment for our customers.” said Cris Nicolli.

END

ABOUT UXC LIMITED
UXC Limited is an S&P/ASX 300 listed Australian business solutions company, and the largest Australian owned ICT consultancy firm.  UXC services medium to large entities in the private and public sectors across Australia and New Zealand.

UXC provides a range of unique, unmatched and formidable ICT Solutions in Consulting, Business Applications and Infrastructure that support our customers to plan & design, implement & enhance, and operate & manage their ICT requirements.

UXC strives to create simplicity and meaning in a complex world through the power of people and technology, by being the leading Tier 1 Australian IT Services and Solutions Company, delivering value, innovation and responsive business outcomes with excellent people.

ABOUT SENETAS CORPORATION LIMITED
Senetas is an Australian public listed company (ASX: SEN), specialising in high-speed data encryption – protecting network transmitted data whilst retaining maximum network performance.

Senetas encryptors are the world’s only triple-certified products of their type (Common Criteria (Australia and international), FIPS (US) and CAPS (UK) certification – for government and defence use) and protect much of the world’s most sensitive data.

Senetas secures: government information and secrets; defence and military information; commercially sensitive intellectual property, business and financial data; banking transactions; data centre traffic; high volume CCTV networks; and critical industrial and infrastructure control systems.

Senetas uniquely designs, develops and manufactures in Australia. Senetas encryptors have market-leading performance characteristics and are trusted to protect data in motion in more than 20 countries.

These customers include highly sensitive organisations such as the US defence forces and Swiss banks.

www.senetas.com

Meru expands security capabilities with acquisition of Identity Networks

September 9, 2011 – Meru Networks, Inc., a pioneer in 802.11n wireless LAN, has announced that it has acquired Identity Networks, provider of the industry’s most complete secure guest and device access management solution. Through the acquisition, Meru customers can easily provide secure, policy based, wired and wireless network access  for guests and employees that bring their own devices (BYOD) into the enterprise.

The Identity Networks product has been used across the Meru installed base as an integrated, third-party security solution, and is proven to work in a variety of environments.  It provides simple provisioning capabilities and automatic notification services that give guests their access credentials by email or SMS. It also includes powerful reporting, auditing and customisation capabilities. The Identity Networks system is highly scalable, flexible and decreases the IT burden of guest provisioning and management as guests can be given access by non-IT personnel such as reception and administrative staff members.

“Enterprises must provide secure, auditable access to hundreds, or even thousands of devices that enter the enterprise daily,” said Kamal Anand, senior vice president of Product Management. “Provisioning, managing and securing network access for guest and employee owned Wi-Fi devices can be a tedious and inefficient process—especially as the number and variety of devices multiplies within the environment.  The addition of Identity Networks to the Meru family of security products builds upon our already strong security offerings, and provides another important component of overall network security.  These advancements are critical as we look forward to the all wireless enterprise of the future.”

About Meru Networks
Founded in 2002, Meru Networks develops and markets a virtualised wireless LAN solution that cost-effectively optimises the enterprise network to deliver the performance, reliability, predictability and operational simplicity of a wired network, with the advantages of mobility.  Meru’s solution represents an innovative approach to wireless networking that utilises virtualisation technology to create an intelligent and self-monitoring wireless network, and enables enterprises to migrate their business-critical applications from wired networks to wireless networks, and become all-wireless enterprises.  Meru’s solutions have been adopted in major industry vertical markets, including education, healthcare, hospitality, manufacturing and retail. Meru is headquartered in Sunnyvale, Calif., and has operations in the Americas, Europe, the Middle East and Asia Pacific. For more information, visit www.merunetworks.com.

Wavelink Chosen as Distributor for AirTight Networks Wireless Intrusion Prevention Solutions

Global leader in wireless security solutions further complements Wavelink’s wireless portfolio

Melbourne, August 25, 2010 – Wavelink Communications, a value-added distributor of business IP, wireless and communication solutions has been chosen as the Australian distributor for AirTight® Networks’ SpectraGuard® family of wireless intrusion prevention (WIPS) products and services. AirTight is recognised as a global leader in supplying wireless network security solutions, which ensure that both wired networks and wireless LAN (WLAN) security and performance are not compromised by wireless threats or interference such as denial-of-service (DoS) attacks, WLAN traffic is kept private and secure, users are prevented from installing unauthorized WLANs, and unsupported/ unauthorised WLAN technologies are barred from operation.

Ilan Rubin, Wavelink managing director said, “It is now standard industry practice that any enterprise wireless network must provide secure wireless connectivity. While the built-in security capabilities of enterprise-class WLAN vendors are acceptable for many applications, a number of factors drive the need for wireless-specific security monitoring capabilities. These include mis-configuration and administration of WLAN security settings, the proliferation of unmanaged wireless devices in the workplace, such as iPhones and smartphones, and increased security demands from government and defence users as well as from the retail industry for the security of wireless payment processing systems and to meet the PCI DSS (Payment Card Industry Data Security Standard) Wireless Guideline.”

“Although some wireless security capabilities can be implemented using the integrated monitoring functions provided by the WLAN infrastructure vendor, AirTight operates as a separate overlay WIPS to any WLAN, which delivers stronger security capabilities through full-time monitoring. We expect that as wireless technology becomes more pervasive, the overlay approach will provide the most flexible approach for rapidly incorporating monitoring and intrusion prevention. The addition of AirTight further complements our growing portfolio of enterprise wireless solutions,” continued Rubin.

AirTight has focused solely building products for wireless intrusion prevention from the ground up,” said Steve Choi, AirTight’s managing director for Asia Pacific Sales. “SpectraGuard is easy to set up and operate, and AirTight’s methodology for classifying events avoids false alarms when identifying rogues. We recognise the value that Wavelink provides via their market knowledge, established channels and technical expertise and are delighted to welcome them as our distributor.”

 

About Wavelink

Wavelink Communications (www.wavelink.com.au) specialises in the supply, marketing and support of a range of leading edge IP, wireless and communication solutions. Wavelink distributes a range of products from AirTight, Meru Networks, Polycom, Cisco, Digium and amigopod.

About AirTight

AirTight Networks is the global leader in wireless security and compliance solutions providing customers best-of-breed technology to automatically detect, classify, locate and block all current and emerging wireless threats. AirTight offers both the industry’s leading wireless intrusion prevention system (WIPS) and the world’s first wireless vulnerability management (WVM) security-as-a-service (SaaS). AirTight’s award-winning solutions are used by customers globally in the financial, government, retail, manufacturing, transportation, education, health care, telecom, and technology industries. AirTight owns the seminal patents for wireless intrusion prevention technology with 18 U.S. patents granted or allowed, two international patents granted (UK and Australia), and more than 20 additional patents pending. AirTight Networks is a privately held company based in Mountain View, CA. For more information please visit www.airtightnetworks.com

AirTight Networks and the AirTight Networks logo are trademarks; AirTight and SpectraGuard are registered trademarks of AirTight Networks, Inc. All other trademarks are the property of their respective owners.