Related Links


Tightening the security belt

Senforce officials have released Version 3.0 of the company's Endpoint Security suite. The technology covers the computers, handhelds, mobile phones and other devices that form the endpoints of networks.

The company will sell the suite as a package, but any of its four modules are available separately. One module provides a firewall, one guards machines against physical theft, one controls connectivity, and the fourth provides endpoint integrity, meaning it ensures that antivirus, anti-spyware and other security measures are running on each machine.

The Senforce suite allows network managers to consolidate functions. For example, they can set rules for when applications are not permitted to connect to the Web, taking that decision out of the hands of users. Managers can set rules about storage devices, including whether some types can be used on a given computer or perhaps used only in a read-only mode. That can prevent a data thief from moving sensitive information from a notebook to a USB memory stick.

"Managing endpoints is the scary part of the equation," said Kip Meacham, director of product management at Senforce. Most networks are difficult to manage because they have too many machines in the hands of users.

Meanwhile, Polycom officials are focusing their attention on securing video and voice traffic over the Internet.

The company's new Voice Video Interface Unit appliances make it possible to send secure video and voice communications when the user is outside the corporate firewall. The appliances are designed to work with existing network security, so they're compatible with network policies such as quality of service.

Among other features, the product prioritizes voice and video delivery. It also routes the information along the shortest path between two endpoints instead of through a centralized server.

Additionally, the appliances perform voice and video network address translation at the public/private IP address boundary. According to Polycom officials, this function eliminates the security risks of other methods that tunnel or hide video and voice traffic from existing security products that protect networks' perimeters.

Building a better notebook

You might think one notebook computer is as good as another, but Gateway officials would argue with you. They have released the M460, designed to deliver more than 10 hours of battery life and other high-

performance features.

The battery life is important, said Chad McDonald, senior product manager at Gateway, because of wireless networks. In the past, users had to connect a phone line to get online, so it was not difficult to plug in for power at the same time. Now that wireless networks are common and the phone — or Ethernet — connection is no longer needed, longer battery endurance makes a notebook computer more versatile.

However, users have to make some effort to achieve optimal battery life. The computer will run for up to seven hours on the installed battery. A hot-swap bay allows a second battery to augment the internal power when needed.

Gateway engineers loaded a thin profile with features, striving for an optimal balance with price, McDonald said. The machine starts at $899 retail.

"You're going to find products that are thinner, but they're going to cost $1,000 more," he said. "You'll find some with a few more features, but they'll be thicker."

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.


  • FCW @ 30 GPS

    FCW @ 30

    Since 1986, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

  • Shutterstock image.

    A 'minibus' appropriations package could be in the cards

    A short-term funding bill is expected by Sept. 30 to keep the federal government operating through early December, but after that the options get more complicated.

  • Defense Secretary Ash Carter speaks at the TechCrunch Disrupt conference in San Francisco

    DOD launches new tech hub in Austin

    The DOD is opening a new Defense Innovation Unit Experimental office in Austin, Texas, while Congress debates legislation that could defund DIUx.

  • Shutterstock image.

    Merged IT modernization bill punts on funding

    A House panel approved a new IT modernization bill that appears poised to pass, but key funding questions are left for appropriators.

  • General Frost

    Army wants cyber capability everywhere

    The Army's cyber director said cyber, electronic warfare and information operations must be integrated into warfighters' doctrine and training.

  • Rising Star 2013

    Meet the 2016 Rising Stars

    FCW honors 30 early-career leaders in federal IT.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group