Microservices Expo Authors: Liz McMillan, Mehdi Daoudi, Pat Romanski, Andy Thurai, Elizabeth White

News Feed Item

M86 Extends Leading Secure Web Gateway Solution Into the Cloud

SWG Appliance and Web Hybrid Service Utilizes Real-Time Code Analysis to Provide Powerful Defense for Protecting Data and Users in the Remote Corporate Environment

SAN FRANCISCO, CA -- (Marketwire) -- 03/01/10 -- RSA Conference® 2010 - Moscone Center - Booth #1151 -- While conventional gateway security products focus on protecting traditional bordered networks, mobile and remote users are often at risk by such an approach and jeopardize introducing an entire organization to a host of potential issues. M86 Security, the global expert in real-time Web and email threat protection, today announced the general availability of the M86 Secure Web Service Hybrid, which builds on the industry-leading capabilities of its M86 Secure Web Gateway to cost-effectively deliver the same real-time malware protection to mobile workers and branch offices.

With the M86 Secure Web Service Hybrid solution of the M86 Secure Web Gateway, the company becomes the first Web security vendor to release a hybrid solution of an on-premises appliance coupled with a scalable, cost-effective cloud-based security tool enabling unified policy management, reporting, and logging for all users from the central headquarters regardless of their location. It is also the only vendor to offer real-time malware protection in the cloud through M86's unique real-time code analysis technology which blocks zero-day threats which are not caught by traditional AV signatures.

"The ability to utilize a single Web security solution to manage and protect our mobile users from the potential dangers of the Internet is extremely powerful and practical," said Erik Wouterson, senior systems engineer, HMSHost. "The combination of the M86 Secure Web Gateway appliance and M86 Secure Web Service Hybrid solution will allow us to address the security concerns of our remote workers who utilize laptops outside the office as well as computers that are used for our critical business operations at airports. It also helps us address PCI compliance through logging and reports from a single source. The fact that we can manage both the on-site appliance and the cloud service from one central point is great and helps us with providing consistent information to all key stakeholders, including our senior management."

Using its Vital Web Security Suite™, which includes the industry-leading real-time code analysis technology powered by Finjan, the M86 Secure Web Service Hybrid provides enterprises with a cloud-based scanning tool to deliver a consistent security policy and protection regardless of the location of its employees. This unique platform blocks the widest variety of Web-born malware as well as unifies on-premise reporting and log storage for both on-premises and cloud-based usage to meet country-specific regulatory requirements.

With scanning capabilities handled in the cloud, an organization is able to centrally manage security policies, logging and reporting efforts from its corporate office while assuring sensitive information remains guarded. Cloud-based scanners connect to an on-premises policy server for updates and send back logging information so all reporting and administration is handled central from a single interface.

"M86 continues to develop solutions that focus on tackling the significant security challenges businesses face not only today but in the future," said Werner Thalmeier, vice president, product management, M86 Security. "We saw the need from our own customers to protect their off-premises employees and are proud to be the first Web security provider to ship a hybrid on-premises appliance combined with cloud security that benefits a system which supports the corporate network as well as mobile and remote office users."

The M86 Secure Web Service Hybrid allows for the adjustment of policies to provide tighter security while browsing outside the organization as well as the creation of specialized configurations to automatically select the best-suited cloud scanner based on location. Based on Amazon Elastic Compute Cloud (Amazon EC2), administrators can easily scale the number of deployed scanners as required. A complete pricing structure is available from M86 Security. The M86 Secure Web Service Hybrid will be available at the end of March.

About M86 Security
M86 Security is the global expert in real-time threat protection and the industry's leading Secure Web Gateway provider. The company's appliance, software, and Software as a Service (SaaS) solutions for Web and email security protect more than 24,000 customers and over 17 million users worldwide. M86 products use patented real-time code analysis and behavior-based malware detection technologies as well as threat intelligence from M86 Security Labs to protect networks against new and advanced threats, secure confidential information, and ensure regulatory compliance. The company is based in Orange, California with international headquarters in London and development centers in California, Israel, and New Zealand. For more information about M86 Security, please visit: www.m86security.com.

Follow M86 Security on Twitter at: http://twitter.com/M86Security
Facebook at: http://www.facebook.com/M86Sec
M86 Security Labs Blog at: http://www.m86security.com/trace/traceblog.asp

Add to Digg Bookmark with del.icio.us Add to Newsvine

PR Contacts:
Marina Greenwood
Activa PR
Email Contact

Jan Wiedrick-Kozlowski
Activa PR
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Microservices Articles
"NetApp's vision is how we help organizations manage data - delivering the right data in the right place, in the right time, to the people who need it, and doing it agnostic to what the platform is," explained Josh Atwell, Developer Advocate for NetApp, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
TCP (Transmission Control Protocol) is a common and reliable transmission protocol on the Internet. TCP was introduced in the 70s by Stanford University for US Defense to establish connectivity between distributed systems to maintain a backup of defense information. At the time, TCP was introduced to communicate amongst a selected set of devices for a smaller dataset over shorter distances. As the Internet evolved, however, the number of applications and users, and the types of data accessed and...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm. In their Day 3 Keynote at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, and Mark Lav...
Kin Lane recently wrote a couple of blogs about why copyrighting an API is not common. I couldn’t agree more that copyrighting APIs is uncommon. First of all, the API definition is just an interface (It is the implementation detail … Continue reading →
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin, ...
Many organizations are now looking to DevOps maturity models to gauge their DevOps adoption and compare their maturity to their peers. However, as enterprise organizations rush to adopt DevOps, moving past experimentation to embrace it at scale, they are in danger of falling into the trap that they have fallen into time and time again. Unfortunately, we've seen this movie before, and we know how it ends: badly.
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MyS...
Your homes and cars can be automated and self-serviced. Why can't your storage? From simply asking questions to analyze and troubleshoot your infrastructure, to provisioning storage with snapshots, recovery and replication, your wildest sci-fi dream has come true. In his session at @DevOpsSummit at 20th Cloud Expo, Dan Florea, Director of Product Management at Tintri, provided a ChatOps demo where you can talk to your storage and manage it from anywhere, through Slack and similar services with...
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, Sandy Ca...