RSA: M86 introduces one-stop appliance technology and launches into cloud

The Security Reporter, as the appliance system is known, integrates the company's real-time dashboard reporting capabilities with the forensic reporting environment, creating a single cost-effective appliance that generates a variety of security reports.

The reports, says M86, cover a variety of IP security issues, including the web traffic and usage trends on a company's URL, as well as real-time threat monitoring and policy management.

Announcing the Security Reporter at RSA Conference 2010 in San Francisco, Werner Thalmeier,M86's vice president, said that, as businesses continue to seek ways to operate more cost-effectively, the ability to run real-time and historic reporting on the same appliance lowers the total cost of ownership.

This is achieved, he explained, through reduced maintenance and electricity costs, as well as other cost efficiencies.

On the cloud computing front, meanwhile, M86 has extended its SWG appliance technology onto the internet, creating a web-based hybrid service that supports real-time code analysis for companies looking for cloud-based security.

The most interesting aspect of this cloud extension, Infosecurity notes, is that it becomes possible for a company with multiple offices to extend the security enveloped from a head office appliance to other branches - worldwide if need be - using Amazon's EC2 service.

M86 claims this unique product/service offering allows companies to block zero-day threats that are not captured by traditional anti-virus signature technology.

Thalmeier says that by extended its scanning facilities into the cloud, companies can centrally manage their security policies, logging and reporting efforts from a head office whilst assuring sensitive information remains guarded on the firm's internet-connected network.

"We saw the need from our own customers to protect their off-premises employees and are proud to be the first web security provider to ship a hybrid on-premises appliance combined with cloud security", he said.

This creates, he added, a system which supports the corporate network as well as mobile and remote office users.

 

What’s hot on Infosecurity Magazine?