Security

Gartner recognizes Secure Computing

Secure Computing Corporation, an enterprise gateway security company, is been positioned by Gartner, in the Leaders Quadrant of the “Magic Quadrant for Secure Web Gateway” report published in September 2008. Written by Peter Firstbrook and Lawrence Orans the report also evaluates 21 vendors.

However, Secure Computing also announced that it has been positioned in the Leaders Quadrant of the “Magic Quadrant for E-mail Security Boundaries” report published in September 2008. This report was written by Peter Firstbrook and Arabella Hallawell and it had evaluated 20 vendors.

According to Gartner, “Leaders are high-momentum vendors (based on sales and ‘mind share’ growth) with emerging track records in Web gateway security, as well as vision and business investments that indicate they are well-positioned for the future. Leaders do not necessarily offer the best products for every customer project; however, they provide solutions that offer relatively lower risk.”

Nimer Ghazal, Regional Sales Manager – Middle East, Secure Computing said, “Our track record of leadership in Web gateway security is due to our ability to deliver comprehensive and integrated, best-of-breed security and compliance in our appliances. This is key to a successful overall solution that includes malware detection, Web filtering, and application control, while concurrently being able to meet the scalability, reliability and reporting demands of the largest enterprise customers.”

“We consider our positioning in the leaders quadrant by Gartner confirmation of Secure Computing’s continued focus on developing innovative technologies to meet customer demand, as evidenced by the more than 2000 enterprises using our messaging security offerings today. As we look back on last year we can say with confidence that we have successfully integrated TrustedSource and other CipherTrust technologies into the Secure Computing portfolio and have delivered a best-of-breed offering that has supported our leadership position in this market. Clearly, Secure Computing continues to innovate and execute on our long-term vision of providing industry-leading security on flexible and leading delivery platforms,” he added.

According to the report, “a Secure Web Gateway (SWG) is a solution that filters unwanted software/malware from user-initiated Web/Internet traffic and enforces corporate and regulatory policy compliance. To achieve this goal, SWGs must, at a minimum, include Web filtering, malicious-code detection and filtering, and application controls for popular Web-based applications. Native or integrated Data Leak Prevention is also increasingly included.”

Secure Computing offers a complete portfolio of Web gateway security appliances that address these issues and more. Secure Computing’s Secure Web (formerly known as Webwasher®) is the industry's first and only reputation-based solution that protects enterprises against malware and spyware, phishing fraud and identity theft, data leakage, and Internet misuse. Simultaneously, it helps to ensure policy enforcement, regulatory compliance, and a productive application environment.

Secure Computing has set a standard for preemptive detection through the company's industry-leading reputation system, TrustedSource™. Integrating this reputation scoring information with behavioral analysis and the millions of URLs in its award-winning database, Secure Computing gives organizations the most effective protection on the enterprise gateway against security threats.

On the other hand, Secure Computing's Secure Mail (formerly known as IronMail®) is one of the most full-featured appliance solutions on the market, providing organizations with total email protection, eliminating over 99 percent of spam while protecting against zero-hour blended threats, and providing robust spam surge and Denial-of-Service (DOS) protection.

Secure Mail protects outbound email from data leaks with robust policy and compliance enforcement including flexible encryption options. Secure Mail empowers administrators with easy-to-use, yet highly configurable policy creation, management and reporting so administrators can cost effectively deliver email protection to meet business and compliance needs.

Previous ArticleNext Article

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines