SecurityWatch

Endpoint security

Government and private-sector officials are looking to enforce security on the endpoints of a network — the workstations and laptops — where data actually resides, especially as more employees work remotely.

To that end, Zone Labs Inc. last week moved to strengthen policy enforcement inside and outside corporate boundaries. The company rolled out a new version of its endpoint security product, Integrity 4.5. The software provides capabilities to enforce policies on all PCs accessing an organization's network. It also allows organizations to secure employees' use of public instant messaging services and prevent users from accessing the network with unauthorized wireless devices.

Support for the Extensible Authentication Protocol and 802.1x allows Integrity 4.5 to integrate with more than 200 network devices, such as switches and wireless access points from more than 22 vendors, including Microsoft Corp.'s Windows 2003 Remote Access Server and Cisco Systems Inc.'s Aironet wireless access points.

This allows network administrators to enforce the most comprehensive endpoint security policies on devices that access the network — whether inside or outside an organization's boundary, according to Fred Feldman, vice president of marketing at Zone Labs.

Integrity "allows [administrators] to deny access to systems if people do not meet [certain] criteria," Feldman said. With Integrity 4.5, administrators "can apply [firewall] rules to applications or one set of rules for all users."

Application firewall

Secure Computing Corp., known for its advanced firewall capability, last week rolled out a new version of its Sidewinder G2 Firewall, which has increased protection for application-level attacks.

Sidewinder G2 Firewall Version 6.1 provides added protection for Web services, e-mail, Oracle Corp. databases, and instant messaging and peer-to-peer communications that bypass corporate e-mail exchanges, according to company officials. n

Rising Stars

Meet 21 early-career leaders who are doing great things in federal IT.

Featured

  • SEC Chairman Jay Clayton

    SEC owns up to 2016 breach

    A key database of financial information was breached in 2016, possibly in support of insider trading, said the Securities and Exchange Commission.

  • Image from Shutterstock.com

    DOD looks to get aggressive about cloud adoption

    Defense leaders and Congress are looking to encourage more aggressive cloud policies and prod reluctant agencies to embrace experimentation and risk-taking.

  • Shutterstock / Pictofigo

    The next big thing in IT procurement

    Steve Kelman talks to the agencies that have embraced tech demos in their acquisition efforts -- and urges others in government to give it a try.

  • broken lock

    DHS bans Kaspersky from federal systems

    The Department of Homeland Security banned the Russian cybersecurity company Kaspersky Lab’s products from federal agencies in a new binding operational directive.

  • man planning layoffs

    USDA looks to cut CIOs as part of reorg

    The Department of Agriculture is looking to cut down on the number of agency CIOs in the name of efficiency and better communication across mission areas.

  • What's next for agency cyber efforts?

    Ninety days after the Trump administration's executive order, FCW sat down with agency cyber leaders to discuss what’s changing.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group