Printer Friendly

8e6 Technologies to Focus on Managing Threats from Within; Evolutionary Vision Addresses Latest Frontier in Internet Security Management.

ORANGE, Calif. -- 8e6 Technologies, a leading provider of Internet security appliances for threat monitoring, reporting and remediation, has announced an important shift in its perspective on market needs in alignment with the changing dynamics of the issues faced by its customers. This perspective will drive the company's activities from product vision and corporate communications through value-added customer services as a proactive leader in Internet security solutions.

To support this repositioning strategy, the company has implemented a new messaging emphasis encapsulated in the line, "Managing the Threat from Within." This theme will be the focus of ongoing communications in all phases. As part of this effort, the company has also unveiled a new Web site, www.8e6.com, highlighting this theme and featuring an Internet security Resource Center with an overview of the latest emerging Internet security threats, white papers on topics such as "Use or Abuse: Why Your Company Needs a Web Policy," information on Acceptable Use Policy as well as state and federal Internet security compliance laws, and user success stories.

"Perimeter" security systems such as firewalls, secure enterprise email systems, ID/access management, and VPNs are now widely in use to guard against hazards, including hackers and other unauthorized access to systems and data. As these issues have been resolved, challenges of internal user management bring a new set of problems and solutions to the fore. The ever evolving technology environment has now enabled a wide range of Internet security breaches for users, whether inadvertently or through malfeasance, to permit programs and data into enterprise systems and to allow the dissemination of sensitive information to the outside world.

A recent IDC study on Secure Content Management stated: "An emerging threat to corporate security comes from inside the organization. The `insider threat' of trusted employees deliberately or inadvertently distributing sensitive information is quickly becoming a major concern in many organizations.... Web filtering has evolved from addressing a single class of employee distractions -- access to inappropriate URLs -- to more comprehensive Web security solutions that address a wide array of Web-based threats."

Yankee Group surveyed 600 North American and Western European companies and found that, in 2004, 50% of security problems originated from internal sources, up from 30% in 2003. And in a recent study by the Ponemon Institute, 69% of companies reported their data security breaches were the result of either malicious employee activities or non-malicious employee error.

Therefore, 8e6 Technologies sees the battle moving to these rapidly evolving Internet security threats generated by users internally through web email, web surfing, instant messaging and P2P file sharing -- threats that open the corporate network environment to spyware, worms, unauthorized transfer of corporate documents, and viruses, as well as resulting in time-consuming and unproductive employee activities. These threats from within are the new frontier for ensuring both security and productivity by developing and implementing robust user management systems.

"Effectively combating these internal Internet security threats encompasses a threefold approach involving enterprise user policies, user training, and dynamic network management systems," noted Paul Myer, president and COO of 8e6 Technologies. "Our mission is to support our customers in creating a seamless flow in all three areas."

8e6 Technologies is focused on helping business, government and education clients gain the upper hand in this ongoing struggle by providing comprehensive Internet filtering solutions for managing the threat from within. The company's dynamic monitoring, reporting and remediation products are crucial resources for thwarting these threats, identifying problem personnel, and educating users on the potential hazards to their networks so they can be proactive in protecting the systems they depend on every day.

Additional related information:

Emerging Business Internet Security Threats www.8e6.com/internet-filtering/business/save-business-bandwidth.htm

Business Internet Filtering Saves Bandwidth Usage www.8e6.com/internet-filtering/business/save-business-bandwidth.htm

Business Internet Filtering Optimizes U-Haul's Communications www.8e6.com/internet-filtering/business/u-haul-business-solution.htm

Internet Security Compliance Laws www.8e6.com/internet-resources/security-compliance-laws.htm

Internet security Resource Center http://www.8e6.com/internet-resources/index.htm

About 8e6 Technologies

8e6 Technologies provides high-value security appliances to manage Internet-related threats through filtering reporting and remediation. 8e6 solutions guard against threats from undesirable Web sites, Instant Messaging, peer-to-peer file sharing, viruses and spyware. A Web-filtering pioneer since 1995, the company maintains headquarters in Orange, with offices in Taipei, Taiwan, and Beijing, as well as a network of channel partners worldwide. For more information, please call 888-786-7999 or visit www.8e6.com.
COPYRIGHT 2005 Business Wire
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2005, Gale Group. All rights reserved. Gale Group is a Thomson Corporation Company.

Article Details
Printer friendly Cite/link Email Feedback
Publication:Business Wire
Date:Oct 25, 2005
Words:731
Previous Article:SunGard Acquires The GETPAID Corporation; GETPAID to Expand Working Capital Management Capabilities of SunGard's AvantGard Suite of Enterprise...
Next Article:Blackbaud, Inc. to Present at the JP Morgan Small Cap Conference.
Topics:


Related Articles
Storage Management--The Grand Vision Unfolds.
Rosabeth Moss Kanter: pioneer of empowerment and change management.
Storage security: issues and answers.
Extending IT capabilities with automation.
Two approaches to managing information risks: when managing information risks, is it better to use an event-based or a records and information...
A ten-year review of the vision for transforming the defense acquisition system.
Reluctant Pioneers: China's Expansion Northward, 1644-1937.
Survey: internet ills fester.
Total web threat protection.
You can't manage what you can't see!

Terms of use | Privacy policy | Copyright © 2019 Farlex, Inc. | Feedback | For webmasters