3/29/2004 - Senforce TechnologiesTM, Inc., the leader in location-aware endpoint security, announced the immediate availability of its Enterprise Mobile Security Manager 2.5 (EMSM 2.5) for corporate and government enterprises allowing corporations to extend policy-based security out to the mobile workforce.
EMSM 2.5 offers wireless Local Area Network (WLAN) connectivity control for notebook PCs with both embedded and after-market WLAN adapters, including Intel® CentrinoTM Mobile Technology based notebooks.
“Corporations and government agencies are expanding their mobile workforces at an ever increasing rate,” said Allan Thompson, president and chief executive officer of Senforce. “This growth is fueled by the increasing number of enterprise-class notebooks with built-in WLAN technology. This increased mobility and connectivity creates new security management challenges specifically addressed by EMSM. EMSM 2.5 gives public and private-sector IT professionals the ability to extend policy-based security to the enterprise edge, controlling wired and wireless connectivity and securing mobile data wherever it goes.”
Published reports from Gartner state that nearly two-thirds (2/3) of fresh and critical data is on employee laptops and desktops—not on servers. This underscores the importance of securing mobile data, while still giving professionals the benefits and flexibility of mobile computing.
EMSM 2.5’s new WLAN management enhancements and endpoint integrity features build upon Senforce’s patent-pending location-aware security technology to better enable enterprise IT and security managers to proceed with WLAN-enabled notebook procurement. EMSM 2.5 enables government agency and corporate security personnel to maintaining protected and secure mobile computing for their entire organizations.
EMSM 2.5 Features for Corporate and Government Security Needs
EMSM 2.5’s added features include a FIPS 140-2 certified (Certificate no. 343) cryptographic module to protect the integrity and confidentiality of security policies. This added compliance measure and capabilities reinforce Senforce’s commitment to provide mobile endpoint security to government and corporate enterprises. Several EMSM 2.5 features also support compliance with Department of Defense (DoD) Wireless Directive DoDD 8100.2 for mobile technology usage in government agencies and organizations.
Other major features included in this release of EMSM 2.5 include:
Senforce Wireless Connectivity ControlTM—Advanced security technology providing wireless connectivity control and management of both embedded WLAN NICs used in notebook PCs, including support for those using Intel Centrino Mobile Technology; and supporting aftermarket WLAN NICs from companies including 3Com Corporation, Cisco Systems, Inc., Linksys (a division of Cisco Systems, Inc.), and Proxim Corporation. Whenever a WLAN device is installed in the notebook, EMSM 2.5 determines if the WLAN use is authorized or unauthorized, giving IT and security managers control of WLAN adapter usage up to and including complete radio silence and activation. With one mouse-click from inside EMSM 2.5 Policy Manger, security managers can either activate or control WLAN adapters with necessary security policies in place.
Bridge Blocking—Virtual bridging, a feature supported in Windows XP, allows multiple network adapters in the same PC to pass network traffic between each other without ascending the protocol stack its attendant security checks and measures. When a WLAN adapter and a wired network adapter are present in the same computer, this Windows feature can crate security vulnerabilities many corporations are uncomfortable with. EMSM 2.5 technology prevents this from occurring by immediately disabling any adapters using the virtual bridge. EMSM 2.5 also can disable WLAN adapter connections whenever a wired LAN connection is established in both Windows 2000 and Windows XP.
Rogue Access Point Detection and Reporting—EMSM 2.5 identifies and reports on rogue, or unauthorized access points present in proximity to corporate users, helping IT administrators identify any unmanaged access points in various locations, and restricting user access to them to prevent security breaches.
Endpoint Integrity—Anti-virus integrity checking to verify that anti-virus software is running and current with the latest virus signatures and definitions. These tools establish integrity rules to automatically place policy violating mobile devices into a safe quarantine zone, preventing infection of other users on the network. EMSM 2.5 integrity rules can trigger other policy settings based on time, location, connection status, etc. and can mandate immediate remediation, restricting a user to specific updates until the mobile endpoint is in compliance with policy.
System Requirements, Price and Availability
Senforce Enterprise Mobile Security Manager 2.5 server-side hardware requirements include an 800 MHz Pentium III equivalent (or greater) server computer with at least 256MB of RAM, and 5MB of initial hard disk storage to install. Server-side software requirements include Microsoft Windows 2000 Server (with Service Pack 3 installed), Windows 2000 Advanced Server (with Service Pack 3 installed), or Windows 2003 Server; Microsoft SQL Server 2000 Standard or Enterprise Edition (with Service Pack 3 installed); and a certificate obtained from a publicly trusted certificate authority, such as VeriSign.
EMSM's Mobile Security Client and Policy Editor client-side hardware requirements include a 600 MHz Pentium III equivalent (or greater) with at least 128 MB minimum, and 30MB of initial hard disk storage to install. Client-side software requirements include Microsoft Windows 2000 (running Service Pack 2, 3 or 4), or Windows XP (with or without Service Pack 1); Internet Explorer 5.0 or greater on Windows 2000, or Internet Explorer 6.0.28.00 Service Pack 1 for Windows XP; and a certificate obtained from a publicly trusted certificate authority, such as VeriSign.
Pricing for Enterprise Mobile Security Manager 2.5 varies based on the scale of the deployment, with initial per-seat pricing at $89.95. A variety of scalable maintenance options are also offered.
EMSM 2.5 is available to all government agencies directly from GTSI.
About Senforce Technologies
Senforce Technologies is the leading developer of location-aware security software for enterprise mobile computing. Senforce’s flagship product, Enterprise Mobile Security ManagerTM, allows IT Managers to create, deploy, enforce and monitor computer security policies for mobile clients across the enterprise. The company is based in Orem, Utah, with offices in California and Virginia. Senforce products are distributed to the United States federal government by GTSI Corp., the leading government technology solutions provider. Senforce Technologies is privately held, and is funded by Rocket Ventures, EsNet Group Ltd., Ridgewood Capital and Panasonic/Matsushita. Information about Senforce Technologies is available on the Web at www.senforce.com.
Senforce, Securing Your Mobile Data, Enterprise Mobile Security Manager, WhereAware, AdapterAware, AccessAware, and Senforce WLAN Connectivity Control are trademarks of Senforce Technologies, Inc. Intel is a registered trademark of Intel Corporation. Centrino is a trademark of Intel Corporation. Windows and XP are registered trademarks of Microsoft Corporation. GTSI is a registered trademark of GTSI Corp. in the U.S. and other countries.
Previous Page | News by Category | News Search
If you found this page useful, bookmark and share it on: