Blue Ridge Networks: Remote Endpoints Endanger UTM Deployments; Perfect Perimeter Defenses are Useless without Strong Authentication.CHANTILLY, Va. -- "All of the state-of-the-art endpoint security applications that comprise a Unified Threat Management See UTM. (UTM (Unified Threat Management) Refers to a stand-alone appliance or a software package that combines a firewall, antivirus, spam and content filtering as well as intrusion detection. See firewall, antivirus, antispam and IDS. ) strategy aren't worth a dime if a hacker can launch a dictionary attack A brute force attack that uses common words as possible passwords or decryption keys and may provide a more efficient way of discovering the user's code. Sophisticated dictionary attacks sort words by frequency of use and start with the most likely possibilities; for example, names of on a remote PC, exposing the organization to all of the risks that these applications are supposed to mitigate," advised Tony Russo, President and CEO (1) (Chief Executive Officer) The highest individual in command of an organization. Typically the president of the company, the CEO reports to the Chairman of the Board. of Blue Ridge Blue Ridge, eastern range of the Appalachian Mts., extending south from S Pa. to N Ga.; highest mountains in the E United States. Mt. Mitchell, 6,684 ft (2,037 m) high, is the tallest peak. Beginning with a narrow ridge in the north, c. Networks, Inc(TM).
"The majority of remote access systems are password based. Experts have long-acknowledged the ease by which any middle school aged hacker can crack password-only systems. Organizations that pay security more than just lip-service demand mandatory, mutual public key authentication for their remote and mobile personnel," Russo added. "These organizations are the ones that will have properly implemented, strong UTM systems."
While Blue Ridge Networks leaders advocate the deployment of UTM solutions, they stress the critical importance of strong authentication mechanisms as the basis to secure today's widespread commercial and government enterprises.
The company applauds the Federal Government's strong security position citing initiatives such as HSPD-12 and the Department of Defense's accelerated PKI (Public Key Infrastructure) A framework for creating a secure method for exchanging information based on public key cryptography. The foundation of a PKI is the certificate authority (CA), which issues digital certificates that authenticate the identity of mandates. Banking and health care industries have recognized the importance of mandatory, mutual public key authentication as a way to not only be secure and responsive to their customers, but to reap technical competitive advantages.
The Blue Ridge Networks product development strategy revolves around three key percepts: security, simplicity, and interoperability. Where security is concerned, mutual public key authentication has been mandatory in BorderGuard(R) products for 11 years. Not coincidentally, BorderGuard products have never seen a report of vulnerability (source: National Vulnerability Database An online search engine for the CVE vulnerabilities database. Users may select from any combination of vendor, product, vulnerability source, type or consequence to generate a list of documented vulnerabilities. and Secunia). This impenetrable foundation provides the environment for personal firewalls, host intrusion prevention systems, anti-malware, patch/vulnerability management systems, and disk encryption systems to work unabated.
About Blue Ridge Networks
Blue Ridge Networks develops impenetrable remote access solutions for wireless and wired environments. The company was responsible for the industry's first commercial VPN (Virtual Private Network) A private network that is configured within a public network (a carrier's network or the Internet) in order to take advantage of the economies of scale and management facilities of large networks. (virtual private network) and has completed widespread deployments across commercial and government sectors. The company's BorderGuard product suite has been deployed for over 11 years without a reported vulnerability. Information about the company's products and managed services can be found at www.blueridgenetworks.com.
Blue Ridge Networks and BorderGuard are trademarks of Blue Ridge Networks, Inc. Other names used herein may be trademarks of their respective owners.