Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management
    • Mobile
    • PC Hardware

    Securify Updates Network Monitoring Appliance

    By
    Matt Hines
    -
    May 30, 2006
    Share
    Facebook
    Twitter
    Linkedin

      Risk detection specialist Securify unveiled the latest version of its network security appliance on May 30, promising more comprehensive behavior monitoring tools and new identity management features.

      Known simply as the Securify Monitor, the newest iteration of the security appliance represents a marked improvement over earlier models based on its ability to provide more detailed network analysis reports to system administrators, according to company officials. Along with bolstered capabilities for detecting rogue internal behavior and outside attacks, the device adds expanded functions for mapping any inappropriate computer activity back to specific end users.

      To that end, the company said the device utilizes deeper integration with Microsofts Active Directory to allow for more precise monitoring of individual behavior and gives companies the ability to detect potential security breaches before, or even as, they occur. The appliance includes a new set of preconfigured security parameters, or controls, that can be used to actively analyze end users network permissions and computing behavior, and alert IT administrators when any troubling situation appears.

      Giving customers the ability to abandon the process of studying network security logs and more rapidly identify truly dangerous behavior is just what companies are looking for today, specifically as their networks become more widely distributed among geographies and end-user communities, said Steve Woo, vice president of marketing for Securify.

      “Theres tremendous concern over the growing need to offer insider privileges to a broader audience, driven by outsourcing and close corporate partnering, and administrators are being asked to spend even more hours looking at server logs, which doesnt equate to great results,” said Woo. “The key is helping companies keep the closest eye on their most important business applications, not on desktop communications; its about seeing who is taking what data, and where the information is being accessed from.”

      /zimages/6/28571.gifMicrosoft is making it much more difficult to access data from a stolen computer. Click here to read more.

      The device, which comes in three models with 100MB, 400MB and 1GB link capacities, also boasts enhanced content filtering and behavior controls that add the ability to monitor end-user activity within Web-based applications, by both protocol command and by tracking URLs. The appliance offers to watch such applications for issues including frequency of transactions they are used to complete, or the volumes of data they are used to access, to help identify improper activity.

      Securifys appliances compete against similar hardware from Checkpoint Security and Mazu Networks.

      One company already using the updated version of the Securify Monitor is wireless software maker Openwave of Redwood City, Calif. Executives at the firm said that the devices ability to provide real-time information about network activity and scour large amounts of data, regardless off its physical location, has been the products strong suits.

      Steve Kirschbaum, senior manager of information security at Openwave, said that the companys place in the market for providing wireless Internet and applications access to enterprises demands that it remain tightly focused on security. The devices allow the company, which has been using Securify technologies for roughly one year, to provide carriers and other customers with detailed security reports that ultimately help it sell its own services, he said.

      “This is a technology that is actually helping us differentiate from our competitors because we can offer customers an additional level of granularity around network operations that other technologies do not,” said Kirschbaum. “We need to incorporate a number of different tools to provide people with all the reports they want, and this device is particularly useful in that regard because it can process a massive amount of data while allowing us to tweak the system to get at the data we really need to show off.”

      /zimages/6/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Matt Hines
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Careers

      SThree’s Sunny Ackerman on Tech Hiring Trends

      James Maguire - June 9, 2022 0
      I spoke with Sunny Ackerman, President/Americas for tech recruiter SThree, about the tight labor market in the tech sector, and much needed efforts to...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×