Pages

Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Thursday, January 20, 2011

Astaro Announces ASG Full Guard Bundles


German UTM provider Astaro Corporation launched a festival offer “Invincible Security, Unbeatable Value” for the duration of October 1 to December 31 wherein customers will get its mailbox management and regulatory compliance service called Astaro Mail Archiving free on purchase of every Astaro Security Gateway appliance.

The ASG appliance is based in Intel-compatible servers and is a purpose-built, high performance network security device that integrates Astaro’s security applications with a hardened operating system. These appliances cater to every business size, from 10 users to 200 users, and the company has bundled its service with them to increase its reach.

Astaro is present in approximately 60 countries through 75 distributors, 2,500 certified partners and claims to have 100,000 clients.

“The ASG Full Guard bundles provide customers the all-in-one security including firewall, VPN, dual antivirus, anti-spam, Web blocking, in the box comprehensive reporting and Web application firewall and wireless security. For our customers, it comes as a respite to solve the ever mounting problem of e-mail volumes, causing mail servers to suffer from the heavy load and forcing end-users to struggle with mailbox full warnings. Astaro solves these problems by offering a cloud-based e-mail archiving service that is accessible from everywhere and scalable,” said Sunil Sapra, Country Manager, India/ SAARC.

With an ASG 220 FG, customers will receive 1-year free AMA for 10 users or they can opt for a 3-year ASG bundle wherein AMA is free 1-year AMA for 25 users, with the ASG 425, a free 1-year AMA service for 50 years is offered while the ASG 525 has two bundles: a 1-year AMA for 75 users and 3-year bundle for 100 users. Astaro also offers 2 bundles with its ASG 625 appliance – a 1-year free AMA for 150 users and for 200 users.

Astaro Security Gateway (ASG) Hardware Appliances are available with the authorized partners of Astaro at a starting MRP of `95,000.

McAfee Announces New Partner Program


Security software vendor McAfee announced McAfee Connected, a new technology partner program aimed at helping partners worldwide ensure product and service compatibility with McAfee-based solutions.

The program is designed to support partners with a set of clearly defined processes, tools, and co-branding opportunities. Through the program, McAfee will provide testing processes to ensure that the third-party hardware, software and services that the customers have chosen perform well, and are compatible with McAfee technology.

“Choosing hardware and software is a process fraught with difficult decisions that can have very expensive consequences,” said Gerhard Watzinger, Executive Vice President, Corporate Strategy, McAfee. “When customers and prospects see that solutions are part of McAfee Connected, they’re able to quickly and easily choose technology that is proven to enhance their McAfee-based deployments. Customers can enjoy reduced testing costs, simplified purchase cycles, and increased solution confidence as a result of this new test process and program.”

While the program has been rolled out globally, the initial focus of McAfee Connected is security management in virtual environments. In the coming months, the vendor will add other McAfee-based security solutions to the program.

McAfee is inviting independent software vendors, developer organizations, and professional and managed services organizations to apply for partnership in McAfee Connected.

WatchGuard Promotes Robertson As VP Channels And Alliances


WatchGuard is keen on enhancing its regional presence and building new sales pipeline, channel partnerships, and other marketing opportunities. To aid in this plan, the security vendor has promoted Scott Robertson as the Vice President, Channel and Alliance, Asia-Pacific.
Based in Sydney, Robertson will retain his role as ANZ Regional Director and will also be negotiating new channel and vendor alliances across the Asia-Pacific region.
“Scott has consistently displayed excellence in running ANZ and is a strategic member of the WatchGuard Asia-Pacific team,” says Terry Haas, Vice President International Sales, WatchGuard Technologies. “Having put together an exceptional and robust channel in ANZ that is focused on exceeding the market expectations around product innovation and customer satisfaction, we look forward to the positive impact that Scott will have in our overall Asia-Pacific business operations.”
Robertson originally joined WatchGuard Technologies in 2007 and has 16 years of experience in IT and business consulting. Over the past three-and-a-half years he has been responsible for ANZ business including customer acquisition, channels, marketing and pre-sales of WatchGuard’s range of network security appliances and management software.
Prior to joining WatchGuard Technologies Robertson was General Manager Asia-Pacific for CRYPTOCard, and has worked in various sales and marketing management capacities with leading vendors such as Red Hat Asia-Pacific, Microsoft and Visio.

“I’m looking forward to working with channel and strategic alliance partners throughout the region to ensure that we give customers a new and better option to protect their networks and critical assets from the risks of cyber attacks,” added Robertson.

Trend Micro Appoints Neoteric As ND


Trend Micro has signed on Neoteric Infomatique to distribute its range of consumer products and solutions for small businesses. It is not an exclusive partnership as the security vendor already has partnerships with Ingram Micro and Select Technologies. With the addition of Neoteric, the company expands its reach further into the country.
“Expanding our channel partner base and strengthening the network is one of our key agendas this year and the pan-India footprint of Neoteric will further boost Trend Micro’s consumer and SB businesses here. With multi-city operations, Neoteric brings in value addition to our business in terms of logistic and commercial considerations and help us increase customer reach,” said Amit Nath, Country Manager, India and Saarc, Trend Micro.
“We will leverage our partner base across India and jointly develop a growth plan that will drive incremental revenue for our partners and provide them with Internet security products. This is a value add to our product portfolio in the security space,” said Paras Shah, CEO, Neoteric Infomatique. Neoteric has a network of 46 branch offices in 500 cities.

Netcom To Supply VMS for City Surveillance


A Smart Guard channel partner, Netcom Online Solutions India will supply 200 channel encoders and video management software (VMS) to the Coimbatore City Surveillance Project.
Smart Monitor Nova VMS is being installed at the control room to monitor live feed of cameras located across Coimbatore. It supports multiple codecs like MJPEG, MPEG4 and H.264, and it also accepts HD and megapixel video streams from network cameras and encoders. The encoder will be used to convert analog systems into the IP surveillance. 
Gurudas Parwani, CEO, Smart Guard Systems, said, “This contract will serve to further consolidate our positioning in the Indian and especially the South Indian market, enhancing our penetration into the markets easily with the help of our channel partners. We are witnessing heightened interest in the Indian cities going for the Smart City concept.”

Juniper Announced Mobile Security Suite


Juniper Networks has introduced the Junos Pulse Mobile Security Suite, comprehensive security software for mobile devices.

The software suite includes anti-virus, personal firewall, anti-spam, loss and theft prevention, and monitoring and control services.

The software provides additional opportunities to the IT channel to increase their product and service sales. The product, Juniper claims can drive the Greenfield SA Series SSL VPN sales, and also provide an add-on sale for existing SA Series SSL VPN customers (as well as UAC & WXC Series customers).

According to Ravi Chauhan, Managing Director, Juniper Networks India, the software creates an ongoing annuity stream—annualized subscriber-based pricing, additional billable services hours via console training and initial configuration, saves cost for partners. “Since this is a hosted deployment, there will be no truck rolls, and therefore, lesser time at customer premise, no wiring closets or hardware and no CLIs to know or configure,” he added.

The software is being used by global customers like IBM, AT&T, and BT. Junos Pulse Mobile Security Suite is available to enterprises and Juniper’s reseller partners immediately and will be available to consumers through service providers next year

Trend Micro Launches Office Scan 10.5


Trend Micro launched an endpoint security solution for medium businesses and enterprises called OfficeScan 10.5 which is optimized for Windows 7. OfficeScan 10.5 is virtualization-aware endpoint security offering with new features such as web reputation and file reputation, both components of the company’s Smart Protection Network.

The new OfficeScan 10.5 allows for over 20,000 endpoints to be managed from one single OfficeScan management server so users can manage both their physical and virtual desktops from a single management console. They can customize their security solution with plug-Ins for virtual patching, mobile device security, and protection for Macintosh computers.

OfficeScan 10.5 also preserves performance by serializing updates and automatically feed information on threats into the Smart Protection Network using file and web reputation technologies. It minimizes the impact on web performance by synchronizing with a local server.

“Combining anti-malware with innovative in-the-cloud protection from the Trend Micro Smart Protection Network, OfficeScan 10.5 is equipped to defend against high volumes of new threats. The File Reputation feature of our new offering further frees resources by moving the burden of pattern file management into the cloud. And the optional Intrusion Defense Firewall plug-in provides virtual patching to protect against zero-day threats before patching is possible,” informed Amit Nath, Country Manager, India & SAARC, Trend Micro.

With its intrusion defense firewall plug-in, Office Scan 10.5 offers virtual patching to protect endpoints against vulnerability exploits before patches are deployed and provides zero-day protection, especially for endpoints that cannot be patched easily.

Conventional endpoint security solutions cause significant performance overhead on shared VDI hardware resources, causing end-user frustration and even causing enterprises to lower their security standards. OfficeScan 10.5 prevents resource contention and optimizes scan operations on virtualized desktops to maximize the number of VMs per VDI host—whether the enterprise is using Citrix or VMware.

Panda Partners With CyberStar


Cyberstar will distribute Panda’s entire portfolio including Panda ActiveScan 2.0 range of end-point security, UTM appliances under the GateDefender brand and cloud security offerings in form of CloudOffice Protection and CloudEmail Protection.

“Though we have been in India for a few years now, we felt this is the right time to expand and partner with Cyberstar as a distributor to offer installation and customer support that will enhance and complement our business,” said Chin Yoke Mon, Marketing Director, Panda Security.

Cyberstar will appoint a set of authorized sub-distributors for market coverage and penetration for Panda products. “We will be appointing one sub-distributor in each of the leading 50 cities. We have established a call center in Chennai exclusively for Panda customers and will offer toll-free support. We have deployed 15 engineers for partner and customer support, and plan to double the team soon,” said Raj Rathi, Managing Director, Cyberstar Infocom.

Cyberstar plans to sell 50,000 boxes of Panda’s consumer antivirus per month. The consumer offerings consist of Panda Antivirus Pro 2011, Internet Security 2011 and Global Protection 2011.

Yoke Mon informed that Panda will launch its UTM appliances—GateDefender Performa for large enterprises and GateDefender Integra for small businesses, and its cloud offerings—six months later.

RSA Pushes Upselling This Diwali


The security division of EMC, RSA is launching a special scheme Diwali Dhamaka in the next couple of days specifically aimed at the sales executives of its channel partners.

Under the scheme, RSA is incentivizing sales executives of partners to educate customers on its Security Information and Event Management (SIEM) tools and authentication products.

According to Kartik Shahani, Country Manager, India and Saarc, RSA, the scheme is aimed toward creating awareness from a customer standpoint and building a pipeline from a partner standpoint. The vendor will also provide the sales executives with data of new customers and assist them in call-outs.

“We want partners to understand that RSA is just not a token company. We have multiple products that they can take to the market like GRC (governance, risk and compliance), SIEM and DLP,” he said. “We are creating an opportunity for them to go to the customers and upsell other RSA products.”

The idea of Diwali Dhamaka stemmed from a similar program the company had launched last quarter. RSA had launched a bundling promo where it encouraged partners to bundle its products. “The previous program helped us enroll many registered resellers as SecureWorld partner

EMC Refreshes Data Protection Advisor


EMC has announced the new release of its storage management software, Data Protection Advisor 5.7, which it claims automates and expands backup and replication monitoring, alerting and reporting in private clouds.

The new version also provides deeper visibility into EMC and third party deduplication software, backup applications, virtual tape libraries and applications, including Microsoft Exchange 2010.

New capabilities enable scanning and reporting without the need for agents to be installed on production hosts. A key feature of the software is automated replication monitoring, which can spot issues and trigger alerts. EMC has added monitoring, alerting and reporting for EMC RecoverPoint continuous data protection, continuous remote replication and concurrent local and remote replication on Symmetrix, and CLARiiON systems.

The new version of EMC Data Protection Advisor 5.7 will be available later this quarter from EMC and authorized partners it will be available as free upgrade to current customers under maintenance.

Sophos Announces Free Anti-Virus Home Edition For Mac


Sophos announced the availability of Anti-Virus Home Edition for Mac. Based on Sophos's flagship security software, the software is available for consumers to download at no charge.

The Mac anti-virus product provides automatic detection against existing and new threats for Mac OS X. It also incorporates strong disinfection capabilities, capable of removing malware infections that may already be present on the Mac computer. The free software provides automatic on-access detection.

Sophos has also launched a dedicated Mac support forum to allow users to interact with others in their community and get any questions answered about the product or Mac security.

"While most businesses recognize the importance of protecting their Mac computers from malware threats, most home users do not," said Chris Kraft, Vice President, Product Management, Sophos. "By offering free industrial-strength security to home users, we aim to protect Mac users against today's and tomorrow's Mac threats. Everyone knows that Macs are beautiful computers, Sophos wants to lend a hand to keep them that way."

Sophos Anti-Virus Home Edition for Mac detects both Mac and Windows malware, and is backed by SophosLabs, Sophos's global network of highly skilled researchers and analysts, protecting businesses from known and emerging malware - viruses, Trojans, spyware and rootkits. SophosLabs ensures that Sophos Anti-Virus Home Edition can even proactively stop brand new unseen threats before they can install on your Mac.

Symphony, Sybase To Develop Mobile Management And Security Solutions


Product engineering services provider Symphony Service announced an alliance with enterprise and mobile software provider Sybase. An SAP company, Sybase is contributing its Afaria mobile device management and security solution to enhance and complement Symphony Services' global smartphone and mobile device management services.
This alliance ensures that Symphony customers can more effectively and securely manage mobile device deployments, with remote security and on-boarding and off-boarding capabilities, says an official release.
Sybase's Afaria solution uses a centralized portal to empower IT administrators to proactively manage, deploy and secure mobile devices, applications and data. The multi-tenancy platform simplifies the process of keeping mobile data and devices secure and up-to-date, and limits disruption to global workforces. The solution offers the flexibility to work with a wide range of operating systems and hardware. 
"Our clients have realized significant cost savings through the utilization of Symphony's EMS suite and the Sybase Afaria offering is a natural fit to further enhance our mobile capabilities. Our clients were looking for greater security, scalability, flexibility to control apps remotely, and the ability to protect sensitive corporate data. The Sybase solution provides them with the information they are looking for and we are able to provide a total communications lifecycle management solution for smart phones and mobile devices," said Alan Harlan, President, Software Management Solutions.
"We are seeing a growing demand for hosted managed mobility solutions to minimize the pain points that accompany the development and deployment of mobile applications across the enterprise on a wide array of device types," said Terry Stepien, President, Sybase iAnywhere. "Our industry-leading mobile device management solution is designed for multi-tenancy, device-agnostic environments and when combined with Symphony's Expense Management System, we significantly enhance our customers' hosted, managed mobility service offerings."

Symantec Appoints Ajay Goel As New MD


In his new role, Goel will drive the company’s business strategy development and sales operations. “Enterprises are facing unprecedented information storage demands against the backdrop of an increasingly sophisticated threat landscape, which makes Symantec’s solutions and services extremely relevant to customers,” said Eric Hoh, Vice President, South Asia Region, Symantec.

“Ajay brings extensive enterprise experience across a wide range of industry sectors which will enable us to continue to build strong customer and partner relationships in the Indian market,” he added.

“Security, storage and systems management are growing sectors as customers continue to grapple with how to secure and manage their information environments,” said Goel. “I’m very much looking forward to actively engaging with customers and partners to help them address these challenges.”

Goel brings over 25 years of engineering and sales leadership experience with some of the world’s leading multinationals, including Cisco Systems, Sun Microsystems and Asea Brown Boveri. At Cisco Systems Goel was the Senior Vice President for the Industry Business, Strategy and Operations for India and Saarc, and also led Cisco’s Industry Business Council.

It may be recalled that former MD Vishal Dhupar quit Symantec last month to join nVidia.

Honeywell Introduces End-To-End IP Surveillance Solution


Honeywell showcased its latest innovations, including an end-to-end networked video surveillance solution for commercial and industrial applications, and integrated Smart Home technology at IFSEC India 2010.

Developed through rigorous testing and validation, the solution comprises a full line of front-end equipment including 3MP and 5MP cameras, 1080P and 720P HD series cameras, D1 SD series cameras, network speed dome and single, 4 and 16-channel encoder/decoder.

Honeywell also introduced optimized network design and technical service, flexible storage options that support mainstream architecture, advanced intelligent video analysis, easy-to-use monitoring display solution, and unified and integrated security management platform including Pro-Watch, WIN-PAK access control system and VISTA alarm system.

The Honeywell Smart Home solution provides intelligent mobile control at home, in the office or on the go. With just a tap on any connected Wi-Fi device like Apple iPhone, iPod touch, iPad, or any smart phone, PC or netbook, homeowners can control home temperature, ventilation, lighting, curtains, elevator and other home appliances. Message or telephone alerts and real-time video provide up-to-date information about activity in and around the home, creating reassurance and peace of mind. Users can also set and activate with a single touch of button any common household scenario such as back home, away, sleep and movie. A selection of Graphical User Interface (GUI) are customizable to meet various application needs.

"The Indian security market is fast maturing with the world’s leading technologies coming into the country. Global exposure has raised the bar for providing features that bring a high-end lifestyle experience to commercial and residential buyers alike,” said Vikas Chadha, Director, Honeywell Security South Asia. “As a global leader in safety, security and automation, we see huge opportunities. With the new range of IP Surveillance solutions and the advanced smart home technology we see great potential for growth in the Indian market.”

Mobile Telecommunications Announces UGOCAM


Mobile Telecommunications has successfully made beta launch of an online video surveillance service UGOCAM. Touted as a cost-effective mass-market solution, UGOCAM is delivered as a service over Internet. Using only an IP camera, the customer can access the live and recorded video from anywhere and at anytime.

A carrier-grade, centrally hosted video cluster, UGOCAM supports innumerable concurrent users and its scalable architecture grows as the user base increases.

“The mass-market nature of the solution will enable it to provide a cost-effective alternative to customers, and allow Mobile Telecommunications to enter a new attractive market of video surveillance,” said Suhas Jadhav Director, Mobile Telecommunications. "We are in talks with several Telecom/ISP providers, monitoring companies, and large integrators, to provide UGOCAM as a value added service to its customers."

The UGOGAM platform intelligently stores and manages video content originating from IP and analog cameras, and efficiently delivers this content to multiple user devices, such as web browsers, mobile phones, and media sets, for mass market usage.

According to an official release, UGOCAM estimates around half million customers over next two years through dealer networks all across India.

New CA ARCserve For Physical And Virtual Server Environments


CA Technologies announced the new CA ARCserve Replication and CA ARCserve High Availability that will provide continuous data protection (CDP) and high availability for Microsoft Windows, Linux and UNIX systems, applications and data.
According to an official communiqué, they will also help maintain uptime for both physical and virtual server environments—including VMware vSphere, Microsoft Hyper-V and Citrix XenServer.
Managed through a unified web-based console, the new releases are designed to help customers more effectively protect business systems and data—while helping to improve IT staff productivity and data integrity. Their key features and enhancements include: multi-stream replication, custom application protection wizard, customer conduit and popular application support.
Both products help reduce data loss and downtime through continuous data protection that complements any periodic backup solution. They are also used to copy data offsite for disaster recovery purposes and speed migration from physical to virtual servers. 
“As customers implement new applications and virtualization platforms—and as they continue to experience relentless growth in critical data—CA Technologies is responding with the features, functionality and performance improvements they need,” said Vijayant Rai, Channel Sales Director, Recovery Management and Data Modeling, CA Technologies. “The latest versions of CA ARCserve High Availability and CA ARCserve Replication are specifically designed to help customers streamline their data protection operations so they can reduce costs and allocate their IT resources to more strategic tasks.”
Customers with active maintenance agreements may download the new releases at no additional cost.

Symantec: Virtualization, Cloud Creating Disaster Recovery Challenges


As companies rush to move more of their applications and data into virtualized and cloud computing environments, they're not always putting enough thought into backup and disaster recovery.

That's one of the central findings from Symantec's sixth annual Disaster Recovery Study, which includes data from a telephone survey of some 1,700 enterprises with 5,000 or more employees in 18 countries. The survey points to the added complexity that virtualization and cloud bring to IT environments, and how that creates vulnerabilities for data in worst-case scenarios.

Currently, between one-quarter and one-third of survey respondents' applications are being virtualized. However, only 40 percent of virtual servers are accounted for in respondents' disaster recovery plans, and only 56 percent of the data running on these virtual machines is backed up on a regular basis. Of these backups, 82 percent are happening weekly or less often, according to the study.

The survey results are similarly eye-opening when it comes to crucial disaster recovery technologies like replication, high availability failover and global/wide area failover. Just 20 percent of respondents' virtualized applications and data are being protected with these technologies, and that suggests that companies are leaving gaps in their disaster recovery strategies, according to the study.

"Symantec believes that the growth of virtual servers, server sprawl and lack of tools may be responsible for these changes," the security vendor opines in the study.

Meanwhile, although companies are using the cloud for both mission critical and non-mission critical applications, they're grappling with control issues in the cloud storage environment. According to the study, 55 percent identified the inability to control failover and making resources available as the most significant challenge they face in building their disaster recovery plans with the cloud in mind.

Sixty-six percent of survey respondents said security is their biggest concern when it comes to moving mission critical applications to the cloud, followed by accessibility (14 percent), control (12 percent) and management (6 percent).

"Keeping up with the different tools that manage and protect these applications is a challenge for organizations, especially with the increase of applications and data that reside in virtual and cloud environments," Symantec says in the report.

Intel Says Businesses Must Do More To Protect Their Mobile PCs


Intel says most companies whose employees carry around laptops with significant amounts of confidential data have not put in place even the most basic security practices.
Intel brought together a panel of technology security experts to discuss the findings of a recent survey it sponsored, entitled, "The Billion Dollar Lost Laptop Problem." Conducted by Ponemon Institute, the survey gathered data from 329 organizations that have lost a total of more than 86,000 laptops worth a combined $2.1 billion in the past year. Forty-six percent of these systems contained confidential data, but 70 percent lacked basic precautions including encryption, back-up and anti-theft technology.
"For a relatively small sample of companies, that's a huge loss," Kevin Beaver, Information Security Consultant at Principle Logic, said during the panel. "But it doesn't surprise me. I see a lot of security issues that are managed very loosely."
The study found that data breach, lost intellectual property and reduced productivity were among the main consequences of lost laptops, and recommended broader application of security precautions, increased training and awareness programs for employees with company-issued laptops.
"Most of the cost is the data. When you add intellectual property and confidential information, the problem becomes the data breach rather than the device itself," Larry Ponemon, Chairman and Founder of Ponemon Institute, said at the event.
The scenarios in which laptops were either lost or stolen varied statistically, as did the riskiest locations. Even the workplace involves an unexpectedly high incidence of theft, according to Ponemon. However, Ponemon said lax management and lack of oversight accounted for up to 90 percent of the problem.
Beaver said management needs to take a more proactive role in addressing the issue. "Inaction is probably the biggest problem," Beaver said. "Management knows there's a problem, but they're not willing to take the initiative and put the resources into fixing the problem."
Midsize organizations, those with between 10,000 and 25,000 employees, incurred the most losses, between 7.5 and 8.25 percent, according to the study. "Midsize companies are stuck," Beaver said. "They're not established like larger companies, which have a better handle on security."
According to the study, 71 percent of laptops lost were not backed up, meaning that companies lost work in progress in addition to sensitive data.
Company executives are responsible for ensuring that the proper security measures are in place to protect data on employee laptops, but in some cases they don’t fulfill this obligation. "They don't want to know about the problem. It's the ostrich syndrome," Beaver said.
Beaver also said executives who are aware of these risks have a fiduciary duty to prevent the loss of sensitive data, which explains why they would rather not know about security issues that haven't been addressed. "They have an easy fix if they just use the proper controls on these laptops," he added.
Malcolm Harkins, CISO and general manager of enterprise capabilities, controls and compliance at Intel, said the biggest threat that companies face today is misperceiving risk. "Companies don't want to reveal their security issues, they don't want to reveal the findings of their investigations into how many laptops they lost," Harkins said. "A lot of security teams are not willing to free up the data and put it out there."
Ponemon said part of the problem was coming up with technology that doesn't require user interaction. "It's becoming more of a senior executive issue. But you also have to make it accessible to end-users, who aren't necessarily interested in security. You have to make it idiot-proof."
Anand Pashupathy, General Manager of Intel Anti-Theft Services said Intel is developing technology to help reduce the financial impact of missing laptops. "Intel is propagating the word about technology building out of a broader security ecosystem, so that it may become an industry standard over time," Pashupathy said.
After the panel, Pashupathy told CRN that Intel would soon offer processors with the built-in ability to kill a device once it's reported as stolen over a network such as 3G. In case the user has switched off the system's wireless capability, Pashupathy says Intel will make it possible to disable the device locally.
"We want the data protection and the asset protection to become a standard feature," he said.
Despite immediate plans to increase awareness and develop these capabilities, Beaver said data and device protection would require a long-term effort. "This is going to probably take decades until we get to the point of enforcing these policies," he said. "You've got to get the user on your side too."

Stellar Launches File Wipe v4.0


Data recovery software and services provider, Stellar Information Systems recently introduced File Wipe v4.0 an upgraded version of Wipe 3.0. The software application can wipe unwanted data of varying nature from the Windows systems, leaving it unrecoverable by any means. Stellar File Wipe application employs overwriting techniques to make the data unrecoverable.

The new application offers its user easy to use graphical user interface with various options and categories for wiping. The other prominent features are a personalized list to wipe in a single step, and a scheduler to run wipe on pre-specified list of items at a preset day and time.

It has the ability to remove any data from the unused space of the hard drive with the help of 12 efficient wiping algorithms. To cancel out any chances of data recovery of deleted files, this file eraser software wipes the slack space and enhances security by removing any traces of leftover confidential data in the hard drive.

The application supports e-mail and news applications, peer to peer applications, Microsoft applications and chat messengers and software applications

Available with authorized distributors, Stellar Wipe v4.0 is available at a starting price of `2,250.

“This is a fantastic product from our stable. Stellar File Wipe 4.0 is a wipe product that provides user to wipe the redundant data and increase security, using different options of varying wiping degrees,” said Manoj Dhingra, Director, Stellar Information Systems.

Juniper Acquires Virtualization Security Ace Altor


Juniper confirmed it has acquired Altor Networks, a virtualization security specialist. It's an all-cash deal for approximately $95 million, net of Altor shares already owned by Juniper, which closed as of December 6.

The Altor deal marks the third acquisition in as many weeks by Juniper—not known for frequent M&A activity—following its pickup of WLAN vendor Trapeze Networks and its purchase of intellectual property assets from Blackwave, an Internet video storage and delivery vendor.

Juniper and Altor were already partners, and bringing Altor into the Juniper family allows Juniper to bolster its security architecture for protecting physical and virtual systems. With virtualization continuing to grow as a must-have technology for enterprises, securing it with purpose-built products is also a growing need.

Altor, founded in 2007 and based in US was featured in CRN's ongoing Emerging Vendor series earlier this year. The company specializes in enterprise customers seeking stronger security for virtualized environments, especially those where compliance regulations like PCI, Sarbanes-Oxley and HIPAA are an issue.

Its products include traditional security offerings like intrusion detection and firewall geared for virtualized infrastructure. Juniper made a venture investment in Altor early in 2010.

"Juniper is excited to acquire one of the industry's leading virtualization security vendors and the extremely talented team that built it," said Mark Bauhaus, Executive Vice President and General Manager, Service Layer Technologies, Juniper, in a statement. "This acquisition will extend our leadership in data center and cloud security and will enable customers to deploy a consistent set of security services across their physical and virtual infrastructure, while delivering total cost of ownership."

Altor's employees and products will become part of the Service Layer Technologies group at Juniper.

"Altor has led the virtualization security market in innovation, defense-in-depth and performance," added Amir Ben-Efraim, CEO and Co-Founder, Altor, in a statement. "Today, we join forces with Juniper, which shares a common vision for securing data centers and the cloud, and together we look forward to extending our leadership in the VM security market."