secure computing's secure mail achieves internationally recognized common criteria certification company furthers commitment to global government st.
the u.s. national information assurance acquisition policy (nstissp no. 11) mandates that u.s. government agencies purchase information security products that have been certified to the standards of the international common criteria for information technology security. "this is more evidence validating that secure computing's solutions continue to meet and exceed the stringent requirements established by internationally recognized standards, approval processes and security industry tests to protect networks at all levels," said mike gallagher, senior vice president of product development and support for secure computing. "the common criteria certification proves further that our email security solutions are appropriate and effective for guarding sensitive communications within government entities."
secure mail is used to provide a secure email connection between an enterprise network and a public network such as the internet. secure mail allows an organization to define a complex mail policy to protect itself against a wide variety of known and emerging threats. secure mail resides in an all-inclusive device positioned at the network gateway in front of the customer's existing email server and is used to: * protect against spam, phishing, directory harvest (dha), denial of service (dos) and bounce back attacks. * enforce data leakage prevention of customer and corporate assets like credit card numbers, intellectual property, source code, patents, financial information, patient information, customer lists, and more. * encrypt communication to all email servers and end users without requiring any client software, and determine what to encrypt based on policies that can be set by the email administrator in the organization.
secure mail processes incoming messages through a number of filtering queues, which examine the content, encryption status, and attachments for compliance against relevant organizational policies. depending upon the policy, secure mail will deliver, drop, reroute, modify or quarantine the filtered messages. secure mail software is available for delivery on a complete line of gateway appliance models which are sized to meet the needs of all organizations from small businesses to large enterprises. these appliances include a hardened operating system and are conveniently managed using a secure https connection from a web browser. the common criteria for information technology security evaluation (ccitse) is a set of evaluative criteria agreed to by the national security agency/national institute of standards and technologies and equivalent bodies worldwide. it was designed to resolve technical and conceptual differences among existing standards for evaluating network security systems and products. an international standard, the common criteria represents the outcome of efforts to develop criteria for evaluating it security that are widely accepted within the international community and mutually recognized by 25 countries.
[c] 2008 Al Bawaba (www.albawaba.com)
|Printer friendly Cite/link Email Feedback|
|Title Annotation:||Secure Computing Corp. has introduced secure mail version 6.7|
|Date:||Jul 13, 2008|
|Previous Article:||kodak enhances its digital picture frames range launches new generation touch technology frames.|
|Next Article:||LG shares its regional success story with the world.|