SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : NENG: Network Engines, Inc.

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
From: JakeStraw2/15/2005 12:02:06 PM
   of 186
 
Network Engines Announces Two New Security Appliances at RSA
biz.yahoo.com

Tuesday February 15, 11:37 am ET

Organizations of Any Size Can Now Implement Defense in Depth Strategies

SAN FRANCISCO--(BUSINESS WIRE)--Feb. 15, 2005--Network Engines, Inc., a leading provider of best practice security appliances, today announced the introduction of two new members of its in the NS Series Security Appliances--the NS6200 and NS6400. The entire family of NS Series Security Appliances is powered by Microsoft® Internet Security and Acceleration Server 2004 (ISA 2004).

The NS6200 is a multi-function security platform designed for small businesses and branch offices and supports up to 100 users. Small and remote offices often rely on network-layer firewalls and desktop anti-virus software to secure the enterprise. These environments are increasingly the source of security problems because most network firewalls lack the application inspection and content filtering functionality that is vital to securing business infrastructure applications. The NS6200 addresses this issue. Application layer protection, advanced VPN and Web caching functionality make the NS6200 an effective security platform for protecting the small business from sophisticated, blended threats.

The second of the new product releases, the NS6400, is intended for enterprises with higher performance requirements and supports up to 1000 users. It is configured with four 10/100/1000 ports and two 10/100 copper Ethernet ports. As with other members of the NS Series family, the NS6400 is designed to enable defense-in-depth and provides unparalleled application-layer filtering for Microsoft applications.

Like their predecessor the NS6300, both the NS6200 and NS6400 Security Appliances provide identical application-layer security for Microsoft infrastructure applications and deliver the same ease-of-use features for set up, deployment, software updates and maintenance. The Network Engines Web Services (NEWS(TM)) interface is an integral part of all members of the NS Series family, providing a centralized configuration and management interface for both the appliance and its ISA engine. Security administrators with an ISA background will find that the NEWS interface easy is to use while enabling consistent management and delivery of service throughout the network.

"The NS6200 Security Appliance is an easy to own solution that delivers multiple levels of application layer defense in an affordable, highly reliable appliance format," said Lee Benjamin, an advisor with ExchangeGuy Consulting Services based in Boston. "It does a great job of extending Exchange Server safely to the Internet. What could be more perfect for the small-to-midsize business network?"

"The self-spreading nature of application-layer attacks mandates that all organizations implement safeguards to protect applications infrastructure," said Bryan Bain, senior director of security marketing for Network Engines. "With the introduction of the NS6200 and NS6400, defense-in-depth is now a viable option for organizations of any size."

"With these additions, the NS Series meets the application security needs of organization of all sizes," said Jon Oltsik, senior analyst at the Enterprise Strategy Group. "The NS Series is particularly well suited for companies with significant investment in Microsoft applications as it offers application-layer security that enhances the protection of a Windows-based environment."
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext