![]() |
![]() |
Advertise Contact SecurityWatch |
Articles | Editorials | Reviews | News | InfoSec Directory | Releases | White Papers |
VoIP Articles - New to VoIP? VoIP Articles will help you understand what's important in VoIP. ![]() |
Market-Leading Solutions from CREDANT Technologies and Cranite Systems to Provide Comprehensive, Government-Certified Wireless Security Offering Publication date: Monday, 18 October 2004 Solution Seamlessly Integrates Wireless LAN and Device Security Software – Ensuring Maximum Data Protection Beyond the Network’s Edge Dallas, TX and San Jose, CA – October 18, 2004 – Organizations seeking to secure their wireless networks have a new comprehensive, government-certified wireless security solution available to them, thanks to an alliance announced today between CREDANT Technologies and Cranite Systems, Inc. CREDANT Technologies (www.credant.com) is the market leader in providing software that enables organizations to control security enterprise-wide for mobile workers and Cranite Systems, Inc. (www.cranite.com) is a leading provider of comprehensive security solutions for wireless local area networks (LANs). Well suited for government agencies, financial services and healthcare customers that need to meet demanding security and confidentiality compliance standards imposed by government regulations, the combined solution integrates market-leading technologies from both companies. CREDANT’s Mobile Guardian device security and management software, together with Cranite’s WirelessWall wireless LAN security software, provide end-to-end security that protects enterprise data accessed from the network, transmitted over wireless LANs and stored on mobile devices. The joint solution was selected by the U.S. Army Medical Command (MedCom). Wireless computing poses new security threats to the privacy of an organization’s information assets. Information that is accessed beyond the network’s edge is no longer protected by existing network infrastructures and is vulnerable to attack while being transmitted over wireless LANs and stored on mobile devices. Faced with internal compliance policies, as well as goverment regulations, such as Gramm-Leach Bliley, Sarbanes-Oxley, HIPAA, and the California SB1386, organizations no longer can ignore the security risks created by mobile computing. To gain the full benefits of mobility, without taking excessive risks, organizations need to take a holistic view of security by protecting access to networked data, as well as protecting data during wireless transmissions and when stored locally on mobile devices. The Cranite-CREDANT solution protects enterprise data in mobile environments. With strong security for the endpoint from CREDANT, applications and sensitive data are protected when devices are lost or stolen. Supporting a broad spectrum of mobile operating systems and device types, the CREDANT solution enforces on-device security policies that control user and device access (including self-service password reset); encryption of files, folders, disks and/or removable media; and authorization policies that control where devices can synchronize, what applications can run on the device, as well as use of communication ports, external media cards, cameras and microphones. Cranite’s WirelessWall software controls access to wireless networks – with rock-solid Layer 2 protection and the Advanced Encryption Standard, all network traffic, including network addresses, are protected – guarding against attacks like man-in-the-middle, identity theft, or denial of service. In addition, Cranite’s Layer 2 protection allows users to securely pass from one wireless sub-net to another, without experiencing interruptions or having to re-authenticate or reboot their devices. “When businesses consider what it takes to secure networks today, they have to take a broad perspective, to include data in transit as well as data at rest. IT managers are coming to realize that the Internet is now an extension of their enterprise network,” said John Vigouroux, CEO, Cranite Systems, Inc. “And potential attackers are always going to be probing for the weak link – that’s why a joint solution like CREDANT and Cranite’s offering is so effective. Together we provide one of the most comprehensive security solutions available, ensuring that all the ‘links’ are as secure as possible.” “The combined CREDANT and Cranite offerings provide a level of wireless security that many of our government customers cannot live without,” said Bob Heard, president and CEO, CREDANT Technologies. “Combining our core technologies allows us to offer our joint customers who have a need to meet demanding standards imposed by government regulation, an unmatched, government-certified end-to-end security solution for the mobile enterprise.” he joint solution from Cranite Systems and CREDANT Technologies is available by contacting Cranite at or , or CREDANT at , or . More information can also be found on the companies' Web sites, www.cranite.com and www.credant.com. About Cranite Systems, Inc. Cranite Systems, Inc. provides comprehensive security for wireless networks, enabling organizations to safely take advantage of their mobile computing resources. By encrypting all transmitted information–network addresses, applications and ports–as well as the data itself, Cranite's software provides better security, greater mobility and increased network visibility, while meeting the government's highest security standards. Headquartered in San Jose, California, Cranite was founded in 2000 and is privately held. For more information, e-mail , call , or visit www.cranite.com. About CREDANT Technologies CREDANT Technologies is the market leader in providing software that enables organizations to control security for the mobile enterprise. The award-winning Enterprise Edition of CREDANT Mobile Guardian protects corporate data with robust cross-platform security for smartphones, laptops, tablet PCs and PDAs, while uniquely integrating with enterprise directories for centralized security policy management. CREDANT Mobile Guardian Group and Personal Editions enable organizations to safely mobilize applications for groups of users and individuals. Customers are assured that the CREDANT solution they select today can be upgraded to support their future mobile security requirements. Strategic partners and customers include Global 2000 companies such as EDS, Extended Systems, Hewlett-Packard, IBM Global Services, Intel, Microsoft, PalmOne, PalmSource, Schindler Elevator, Symbol and U.S. Army Medical Command. CREDANT is recognized as the visionary leader in mobile data protection by Gartner and has been selected by Red Herring as one of the top 100 privately held companies for 2004. Austin Ventures, Intel Capital and Menlo Ventures are investors in CREDANT Technologies. For more information, visit www.credant.com. |
Tuesday, September 20, 2005 Network Security
GFI MailArchiver for Exchange - Easily archive Exchange Server mail & comply with Sarbanes Oxley - Free evaluation available. Network Security Software - Sponsored by GFI Network Security. Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial! Wireless Security
![]() Press Releases
|
Copyright © 2000 - 2005 eBCVG IT Security | Affiliates :: RSS feeds :: Privacy |