Printer Friendly

Blue Ridge Networks: Remote Endpoints Endanger UTM Deployments; Perfect Perimeter Defenses are Useless without Strong Authentication.

CHANTILLY, Va. -- "All of the state-of-the-art endpoint security applications that comprise a Unified Threat Management (UTM) strategy aren't worth a dime if a hacker can launch a dictionary attack on a remote PC, exposing the organization to all of the risks that these applications are supposed to mitigate," advised Tony Russo, President and CEO of Blue Ridge Networks, Inc(TM).

"The majority of remote access systems are password based. Experts have long-acknowledged the ease by which any middle school aged hacker can crack password-only systems. Organizations that pay security more than just lip-service demand mandatory, mutual public key authentication for their remote and mobile personnel," Russo added. "These organizations are the ones that will have properly implemented, strong UTM systems."

While Blue Ridge Networks leaders advocate the deployment of UTM solutions, they stress the critical importance of strong authentication mechanisms as the basis to secure today's widespread commercial and government enterprises.

The company applauds the Federal Government's strong security position citing initiatives such as HSPD-12 and the Department of Defense's accelerated PKI mandates. Banking and health care industries have recognized the importance of mandatory, mutual public key authentication as a way to not only be secure and responsive to their customers, but to reap technical competitive advantages.

The Blue Ridge Networks product development strategy revolves around three key percepts: security, simplicity, and interoperability. Where security is concerned, mutual public key authentication has been mandatory in BorderGuard(R) products for 11 years. Not coincidentally, BorderGuard products have never seen a report of vulnerability (source: National Vulnerability Database and Secunia). This impenetrable foundation provides the environment for personal firewalls, host intrusion prevention systems, anti-malware, patch/vulnerability management systems, and disk encryption systems to work unabated.

About Blue Ridge Networks

Blue Ridge Networks develops impenetrable remote access solutions for wireless and wired environments. The company was responsible for the industry's first commercial VPN (virtual private network) and has completed widespread deployments across commercial and government sectors. The company's BorderGuard product suite has been deployed for over 11 years without a reported vulnerability. Information about the company's products and managed services can be found at

Blue Ridge Networks and BorderGuard are trademarks of Blue Ridge Networks, Inc. Other names used herein may be trademarks of their respective owners.
COPYRIGHT 2006 Business Wire
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2006, Gale Group. All rights reserved. Gale Group is a Thomson Corporation Company.

 Reader Opinion




Article Details
Printer friendly Cite/link Email Feedback
Publication:Business Wire
Date:Jun 26, 2006
Previous Article:JCPenney Gives Top Logistics Award to Pacer International; Reliable Logistics is Strategic Asset, Retailer Says.
Next Article:New Data Published in an American Heart Association Journal Shows That Lipoprotein-Associated Phospholipase A2 Independently Adds to the Diagnostic...

Related Articles
Blue Ridge Networks Introduces Wireless Security Product; BorderGuard Platform Optimized for Wireless Networks, and Easy Deployment.
Blue Ridge's secure platform assures compliance with HSPD-12 data access mandates.
The evolving network demands improved security.
Blue Ridge Networks: As Security Industry Moves Toward Unified Threat Management, Highly Secure VPNs Represent Critical Core.
Blue Ridge Networks: Today's Integrated Security Appliances Put Remote Government, Enterprise Users at Risk.
Check Point VPN-1 UTM Edge All-in-One Appliance Simplifies Security Deployment With Integrated ADSL Modem and Network Access Control.
Check Point Selected as UTM Vendor of Choice by Hosting Provider, The Planet; Comprehensive Integrated Security Along with Unified Management...
Check Point Software to Announce Second Quarter Financial Results on July 18, 2006.
Check Point Software Shareholders Approve All Proposals at 2006 Annual General Meeting.
Check Point Introduces New Adaptive Security Solution for Converged Carrier Communications.

Terms of use | Copyright © 2016 Farlex, Inc. | Feedback | For webmasters