Share

Related Links

  • Commtouch
  • Reed Exhibitions Ltd is not responsible for the content of external websites.

Top 5 Stories

News

RSA Security: Commtouch intros unified security engine

15 February 2011

It's day two of the RSA Conference in San Francisco and Commtouch has taken the wraps off what it claims is the industry's first unified engine that combines three internet security technologies.

The technologies – messaging security, web security and anti-virus – have been brought together into a single engine. This means, says the company, that it can be easily integrated into the products of third-party security and networking vendors, as well as service providers' infrastructures.

Commtouch's cloud security technology is perhaps best known for its Recurrent Pattern Detection (RPD), a type of checksum-based filtering, that is used to detect spam and malware code.

Typical solutions that would benefit from the unified engine, adds the company, are software or hardware platforms or services that combine multiple security technologies, such as unified threat management (UTM), secure content filtering gateways and SaaS (software-as-a-service) security solutions.

Announcing the new engine, Amir Lev, Commtouch's CTO, said that, with a combined 'triple-play' solution, each technology leverages the other to create an even stronger barrier against ever-increasing blended threats.

"From a business perspective, the single interface also reduces short and long-term integration and operational costs", he said.

According to Lev, the three security technologies cross-enhance each other by sharing intelligence about internet threats and thereby providing better protection overall.

This data-sharing, says Commtouch, is enabled by the firm's cloud-based GlobalView network, which collects and analyses millions of internet transactions in real time.

Lev noted that the new engine presents a unified interface across Commtouch's range, providing a thoroughly integrated, simplified, and cost-effective combination of technologies for the firm's partners.

This article is featured in:
Malware and Hardware Security

 

Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×