Secureol Unveils “security By Virtualization” Ve2 And Velite - A New Security Paradigm Now Available For Download
Wednesday, 10 August 2005 14:42 EST
Jerusalem, Israel, August10, 2005 – SecureOL, a pioneer in the field of “Security by Virtualization”, announced today the release of the VE2 and VELite desktop software security applications.
SecureOL believes that information security is one of most troublesome burdens for everyone; it changes working habits, impairs productivity, creates IT – employee conflicts, is expensive to establish and even more expensive to maintain and recover. In-fact what an organization needs is the ability to be safe, enable its employees the freedom to work without endangering the organization and minimize expenses on IT security related issues.
"Security by Virtualization" is patented ground-breaking technology which is not an anti-virus, not a firewall not a sand-box, not an anti-spyware and does not ask the user any security questions. “We wanted to create a real, out of the box solution, one that would allow users to be secured, be free and manage less. This is what Security by Virtualization is all about”, explained Zak Dechovich, CEO of SecureOL. ”It passively terminates commercial espionage, Trojan horses, spywares, viruses, etc. in fact it makes them all irrelevant, while the organization doesn’t lose its connectivity, productivity and reduces its TCO”
Corporations have been forced to make a choice sacrificing either security or productivity causing the IT managers a real problem. For example, allowing the usage of VoIP in a closed network is a complex and expensive task. VE2 is based on the philosophy that compromise is bad and expensive, as there are infinite shades of gray as opposed to black and white.
SecureOL’s VE2 is a desktop software application that creates two separate isolated working environments on a standard PC using existing network infrastructure. One hosts the organizations critical business process and information one cannot afford to lose such as mail, documents, ERP, CRM and alike, while the other is used for the non-critical business processes such as working with the Internet. The separation between the two environments ensures that the enterprise's security policies and safeguards remain intact.
Operating the VE2 is simple and effective, the technology is designed to support "configure-and-forget" working mode, hence after initial configuration, there is no need to manage the VE2. When the Internet environment is damaged, the non-critical internet Environment is reset and the computer is ready for use again. There is no need to backup the infected PC or send a technician.
SecureOL's VE2 reduces costs and increases business continuity, productivity and security, creating an attractive value proposition for enterprises, IT outsource companies and Internet Service Providers dealing with SMB.
SecureOL's VE2 installation takes about 3 minutes per PC. VE2 is not based on emulation or virtual machine technology, hence there is no need to purchase additional licenses as with Virtual Machines and there is no computer performance degradation.
A Trial version of SecureOL's VE2 is available for downloaded at: www.secureol.com/ve2.htm
SecureOL believes in giving millions of Internet home users around the world the ability to have a real Internet experience, without being damaged by spyware, viruses and vulnerabilities.
SecureOL's VELite Beta is a free downloadable light weight version of VE2 utilizing the "Security by Virtualization" concept for the home user to be able to use the computer without taking security issues into consideration at all.
The home user can use VELite’s Free Mode to feel free, to browse every Internet site he desires, install applications and do everything he needs without damaging his home computer even if his actions have destructive characteristics. Once the Internet Environment is corrupted, the user simply resets it.
The VELite Beta is available for download at: www.secureol.com/velite.htm
About SecureOL
SecureOL is an Israeli security software vendor that is offering a suite of products based on an innovative, patent-protected platform technology in order to introduce a new security paradigm to enterprise, government and consumer customers. Founded in 2002 and funded to date by the government and investors, SecureOL has spent two years developing its core engine.
For additional information visit: www.secureol.com
|
|
GFI LANguard Network Security Scanner - Is your network open to attack? Find out with the
#1 sold network security scanner: GFI LANguard Network Security Scanner! Download your FREE trial version today.
Visit GFI Security Software page for more information.
IT-Gear.com - Weblog dedicated to everything concerning IT tools and services.
Latest News
SECUDE appoints Open-Source specialist as Linux Expert 02.11.06 SECUDE IT Security GmbH has confirmed the appointment of Felipe Rodriguez, a Linux Kernel contributor and owner of the Open-Source project MGSTEP, as its Linux Expert.
Increased Spam Fuelled Through Botnet Activities 02.11.06 MessageLabs, a provider of integrated messaging and web security services to businesses worldwide, has announced the results of its Intelligence Report for October 2006.
How to keep your VoIP net safe 30.10.06 One of the major challenges in implementing a converged network is having a coherent security policy for the management and control of a system that is carrying voice, video and data.
User tricks, security treats 30.10.06 Thirteen malevolent spirits may haunt the halls and cubicles of your company, and if you're going to scare them into security compliance you may need to get a little bit spooky yourself.
10 Steps to More Secure Wireless 27.10.06 We have all heard about the stories of spammers using open home wireless networks to fill the net with junk mail.
BT acquires Counterpane Internet Security 25.10.06 BT has announced that it has acquired Counterpane Internet Security, a provider of managed networked security services, as part of its strategy to expand and develop its global professional services capabilities.
Perdemia updates Permission Analyzer 25.10.06 Perdemia has upgraded Permission Analyzer, a powerful Windows administration tool that quickly determines whether the system access permissions are properly set, need to be changed, or have been altered by people who are not authorized to make changes.
Mac OS Bluetooth exploit - Inqtana.d 25.10.06 Inqtanad is a proof-of-concept exploit, which has not yet been seen in the wild, that is installed on a Mac OS X computer via Bluetooth from a computer or PDA running a Linux system.
|
|