Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cloud
    • Cybersecurity
    • Mobile

    F5 Networks: Access Policy Manager

    By
    Fahmida Y. Rashid
    -
    February 27, 2012
    Share
    Facebook
    Twitter
    Linkedin

      PrevNext

      1F5 Networks: Access Policy Manager

      1

      F5 Networks combined mobile device management products from AirWatch, MobileIron, SilverbackMDM and Zenprise into F5’s mobile access platform. Enterprises can reduce the costs associated with mobility deployment and management while gaining control. Full VPN and route control capabilities are also extended to users trying to access applications behind the corporate firewall.

      2Sophos: SafeGuard 6

      2

      Sophos will be showing off the latest version of SafeGuard Enterprise, its encryption product for public, private and hybrid cloud environments. SafeGuard Enterprise 6 features the ability to define encryption of any data and control the keys as it travels from the back end, through anyone’s cloud and to any endpoint.

      3x.o.ware: ExoNetwork

      3

      ExoNetwork allows users to securely access the Internet even when on an insecure wireless network by using a private server that implements two-factor authentication with a unique 256-bit key for each user. ExoKey is a USB appliance that provides encrypted remote access to everything connected to the ExoNetwork.

      4Trustwave: Managed Web Application Firewall

      4

      Trustwave Managed Web Application Firewall provides Web applications with real-time, continuous security and protection from vulnerabilities and data loss without impacting performance. The managed security service offering sends events from a Trustwave Web application firewall appliance to Trustwave Security Operations Centers, where security experts use Trustwave SIEM technology to correlate and analyze application-specific events to generate alerts.

      5IronKey: Trusted Access Enterprise Service

      5

      IronKey’s Trusted Access Enterprise Service is a virtualized workspace for cloud applications and includes a Cisco VPN client and Citrix Receiver for behind the firewall access. The integrated cloud-based network security and data loss prevention services help administrators manage the extended enterprise. Pricing starts at $10 per month per user and is expected to be available in the second quarter.

      6GlobalScape: Secure Mobile Access

      6

      The Secure Mobile Access adds the secure file access technology from TappIn to GlobalScape’s Enhanced File Transfer Server. The Secure Mobile Access module helps businesses streamline the transition to multi-mobile platform environments-enabling users to conveniently access, edit and share business files from most smartphones, tablets and other mobile devices at any time, and without compromising corporate security policies.

      7Cyber-Ark Software: Privileged Session Management Suite v7

      7

      The latest version of the Privileged Session Management Suite offers real-time monitoring capabilities to allow administrators to detect and terminate suspicious activity immediately. Cyber-Ark lets administrators isolate, control and monitor activity to protect databases, virtual environments, network devices and servers from insider and external threats.

      8Qualys: QualysGuard WAF

      8

      QualysGuard WAF is a cloud service that protects Websites from unwanted requests and a range of online threats from spammers to SQL injection to DDoS. The Web application firewall provides increased Website performance through caching, compression and content optimization. Qualys is making the service available only as a beta.

      9CA Technologies: SiteMinder, DataMinder

      9

      CA Technologies added content-aware identity and access management capabilities to its CA SiteMinder and CA DataMinder products to help organizations protect data stored, accessed and used within Microsoft SharePoint. Users will have access to single sign-on, automatic data discovery, data classification and content-aware access control as part of the SharePoint Security product.

      10Kobil Systems: mIDentity App Security Toolkit

      10

      Kobil’s mIDentity Trusted Web View is an application for secure authenticated mobile Web browsing. The mIDentity Trusted Messages Sign is an application designed to replace weak and costly one-time password services that use text messages or phone callbacks with authenticated transaction messages that cost less.

      PrevNext
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×