Modernizing Authentication — What It Takes to Transform Secure Access
Research firm IDC, in its security trends forecast for 2006, said chief security officers, as well as other executives whose job it is to evaluate risk, must account for the broadening scope of emerging threats. At the same time, it warned that many organizations are simply unprepared to handle such multi-layered threats, even if they are aware that the sophistication of attacks is increasing.
IDC's numbers show that some of the major security challenges to manage are: wireless devices used in enterprise network configuration management; senior executives that don't make security policy a priority; a patchwork approach to security policy; an always-on environment with an increasing volume and complexity of network traffic, followed by the one nobody wants to talk about: budgets too small to meet enterprise security needs.
Small wonder that companies are looking for the equivalent of a Moss-Covered Three-Handled Family Credenza to help fix the mess.
iPolicy Network's products may help explain why UTMs are hitting a sweet spot with customers. They combine firewall, intrusion prevention and URL filtering functionality all within a single appliance.
This helps system administrators enforce security policies for over 500 intrusion prevention firewall appliances across an enterprise network. For multi-national customers, this is a huge challenge.
iPolicy's differentiator - or secret sauce you might say, is a technique it calls Single Pass Architecture, which examines packets up and down the stack -- from layer one through layer seven (define), but only once. In this way, it's not slowing down the network while in search of dodgy packets.
When an organization needs to enforce a crazy-quilt of real-time security processes and keep the apps performing with blazing speed, speed matters.
How fast a sniff? iPolicy claims that network security managers can maintain the performance of their high speed networks from 100 megabits to 4 gigabits per second, while mitigating DoS/DDoS (define) attacks, blocking worms and Trojans, stopping blended threats and preventing undesirable content from entering the network, attacks that readily penetrate conventional firewalls.
The product lines are geared for all sizes too: carriers, network wholesalers, enterprises as well as small to medium-sized businesses.
Arun Chandra, president and CEO of iPolicy, said the scalability of the offering is what many customers find critical.