About us | Advertising | SecurityWatch
Home   Articles   Blog   Reviews   Press Releases   Security Tools   Sponsored Solutions
Press Releases
Booz Allen Hamilton Assured of Secure Wireless Networking with Cranite
Monday, 8 November 2004 17:24 EST

WirelessWall(R) Software Provides Professional Services Leader with Comprehensive Wireless Security and Mobility

SAN JOSE, CA, November 8, 2004 – Professionals at Booz Allen Hamilton, a global leader in management and technology consulting, now can enjoy the flexibility of untethered wireless network access without worrying about information security, thanks to a secure wireless networking solution from Cranite Systems, Inc.

Security is critical for Booz Allen, as the company’s thousands of consulting professionals handle sensitive data for clients in a wide range of corporations and government institutions. The WirelessWall software from Cranite, a leading provider of comprehensive security for wireless local area networks (WLANs), provides Booz Allen professionals with secure WLAN access. Booz Allen selected the Cranite solution because it met the consultancy’s highest security requirements. The software is compatible with Booz Allen’s existing networking and management infrastructure, while able to scale up to meet future needs.

WirelessWall enables enterprises to secure their wireless networks quickly and easily, giving employees secure access to critical data and network resources. In addition, Cranite software meets one of the government’s most rigorous security certification standards, known as FIPS 140-2. Unlike virtual private network (VPN)-based systems, which encrypt data at Layer 3, WirelessWall encrypts all transmitted information — network addresses, applications, protocols and ports — as well as the data itself, at Layer 2. This approach protects both the user’s data and the organization’s network. The software also enables users to securely roam across network sub-nets without needing to re-authenticate themselves or reboot their computers, saving time and minimizing frustration.

“For an enterprise like Booz Allen, which has a large number of mobile professionals working via wireless networks at any given time, a bullet-proof wireless LAN security solution is an absolute requirement,” said John Vigouroux, chairman and CEO, Cranite Systems, Inc. “WirelessWall enables Booz Allen consultants to benefit from the cost-effectiveness and flexibility of wireless computing, while resting assured that their information—and their network—is secure.”

WirelessWall is based on an open, non-proprietary architecture that supports any mix of 802.11a, b, or g access points from any vendor. This hardware- and protocol-independent approach protects customers’ existing and future infrastructure investments, helping reduce overall total cost of ownership.

WirelessWall is available by calling Cranite at , sending an e-mail to , or via the Cranite Web site at www.cranite.com.

About Cranite Systems, Inc.
Cranite Systems, Inc., provides comprehensive security for wireless networks, enabling organizations to safely take advantage of their mobile computing resources. By encrypting all transmitted information—network addresses, applications and ports—as well as the data itself, Cranite’s software provides unmatched wireless security, with greater mobility, while meeting the government’s highest security standards. Headquartered in San Jose, California, Cranite was founded in 2000 and is privately held. For more information, e-mail , call , or visit www.cranite.com.



Featured Articles

Tribal thinking in today’s IT
George Santayana once famously observed; “Those who cannot remember the past are condemned to repeat it.”. But when it comes to IT security, a better way of thinking might be; “those who fail to understand the impact of the past on their thinking may find themselves somewhat exposed”…

You can’t manage what you can’t see!
Security threats have grown more menacing with the appearance of the likes of Sober, Mytob, and Bagle. Along with the newer trends of spyware, phishing and key logging the implications of ineffective information security have become potentially debilitating to business operations and indeed strategy.

The development and execution of an endpoint security strategy is an increasingly important and urgent issue for businesses of all sizes. Many are executing – or wanting to execute - flexible working practices and organisation models that leverage contemporary technology.

Scan all company email for viruses, Trojans and worms with 4 virus engines, all in one package - GFI MailSecurity for Exchange/SMTP! Download your free 60-day trial today!

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!

Network Security Tools

SpyDefense
SpyDefense protects your computer against annoying, and harmful software such as Spyware, Adware, Trojan horses, etc. SpyDefense is anti-spyware software that prides itself on a very user friendly environment.


Proactive Security Auditor
Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks.


File Securer
File Securer is a powerful tool designed to protect your sensitive folder and personal file. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally.




What's up, IT? Blog

Phishing By The Numbers: 41,000 Blocked Sites in 2005
Top 7 PHP Security Blunders
The human factor and information security
Why I Love Vulnerability Analysis In 2005
IT security fear factor: Tape backups
Uncovering Cyber Flaws
State of the security mart
When the hardware gets smart
Security for SMBs
Four Security Resolutions For The New Year

Copyright © IT-Observer.com 2000 - 2006    Privacy Policy | RSS Feeds
Site Meter