You may have noticed earlier in the week, WatchGuard Dimension was recognized by the Network Computing Awards as the Best New Product of the Year, and was a runner up for Best Product of the Year. This award was voted on by the readers of Network Computing, and last year there was more than 17,000 votes cast.
Released in late 2013, the cloud-based, zero-install Dimension has take the network security market by storm. By helping customers around the world (including Synerzip, Kiosko, Carol Morgan and Oasis Technologies) turn oceans of network data into real-time security intelligence, WatchGuard is bringing big data visibility to network security, without the associated cost or complexity. (You can read the entire press release here.)
In addition to the Network Computing Awards, and on the heals of Alex Thurber, WatchGuard’s vice president of sales, recently being named one of CRN’s 50 Most Influential Channel Chiefs, WatchGuard was also awarded a 5-Star Rating in CRN‘s 2014 Partner Program Guide.
The rating recognizes an elite subset of companies that offer solution providers the best partner elements in the channel programs. To determine the 5-Star recipients, CRN’s research team assessed each vendor’s application based on investment in program offerings, partner profitability, partner training, education and support, marketing programs and resources, sales support and communication.
The guide will be featured on CRN.com and will be highlighted in the April issue of CRN. To read more, click here.
I got a call from a potential customer the other day while driving in the car with my family. After listening to the flood of TLAs (three letter acronyms) in the conversation, my daughter asked me what all that alphabet soup meant. Many customers wonder the same thing. What is DLP (data loss prevention) and why do you need it? Is IPS (intrusion prevention system) the same as APT (advanced persistent threat) and which one should you use? And so on. One of the biggest questions we hear is “what is NGFW (next generation firewall) and how is it different from UTM (unified threat management.) The real answer is that it isn’t as different as you might think. Let me explain.
UTM was born in SMB (small-to-midsized business.) It usually refers to a single box with multiple security technologies running on it (1). SMBs love it because it’s drop-dead simple to deploy and gives them every security feature they need in a single platform. NGFW is a subset of functionality, typically only 2 or 3 of the modules running on a single box. Yet, although it is less functional, many larger corporations tend to prefer to break up technology by location – they prefer to deliberately architect their security solutions to put the required security appliance close to the item it is protecting. E.g. the IPS belongs at the perimeter, but A/V and SPAM filtering belong next to the email server, etc.
Regardless of company size, and certainly regardless of which solution people choose, UTM or NGFW, WatchGuard is a very strong believer in unifying multiple scan engines onto a single box. It just makes sense. You needn’t pay for additional hardware, OS licenses, maintenance contracts, etc. In addition, it gives you the best chance of combatting today’s multi-vectored threats. Rather than keeping security tools in silos, with a different box / console / policy for each one, unify your security into the form factor that makes the most sense.
Perhaps the promise of lower operating costs combined with increased levels of security is what’s driving the growth in the integrated security market right now. Leading analyst firm IDC tracks the growth of the UTM market specifically at more than 13% this year. That’s the single highest growth rate in the network security market. When that many customers vote with their dollars, euros, pesos, and baht, WatchGuard notices and works even harder to give you the tools you need to succeed.
As goes the Internet, so goes security for the content it carries: throughput is king. As the volume of email and the amount of information it carries continues to increase exponentially, vendors like WatchGuard need to deliver more performance in our enterprise content security solutions.
Sure, we could add more cores and more hard disk space. But bigger isn’t always better; instead of building a fire-breathing monster, we opted for a different approach. Today we are announcing a leaner, meaner security solution for email (and web) content: the WatchGuard XCS 880. Delivering 20 percent more processing power, twice the email throughput per dollar, and all of the redundancy you need for non-stop security, while consuming less than half the energy of previous models – the WatchGuard XCS 880 combines power and efficiency in a slim 1U profile.
Smaller, lighter, less expensive to power and to cool – the XCS 880 is another proof point of our Best of Breed security appliance strategy. You can take advantage of the performance curve our processor partner, Intel, provides generation after generation – and instead of having to maintain your own operating system, install and configure lots of separate security products from different vendors and manage them from separate interfaces, you get one integrated solution managed from a single pane of glass.
To learn more about the XCS 880 and the full suite of XCS solutions, visit the WatchGuard XCS 880 page.
PCPro recently reviewed our XTM 330 Network Security Appliance and we’re pleased to say that they’ve put it on their “Recommended A-List.”
The XTM 330 network security appliance provides a suite of flexible, integrated management tools designed to help small and mid-sized businesses stay in control of their network. It includes the Pro version of Fireware XTM operating system, which includes VLAN support, multi-WAN load balancing, and dynamic routing. Add in real-time monitoring and deep reporting at no additional cost and the XTM 330 is terrific value!
In the words of PCPro…
WatchGuard already lays claim to a sizable chunk of the SMB network security market, but with its latest multifunction appliance it wants even more. In this exclusive review we look at the new XTM 330, which offers impressive performance and strong features for a surprisingly low price.
To see video testimonials and see how our XTM network security appliances stack up to the competition, check out our YouTube Channel.
You’re not the Pentagon. Or Microsoft. Or NASA, Wells Fargo, AOL Time Warner, or Daimler Chrysler. You’re not even headquarters for a burger franchise.
No, you’re just part of a small- or medium-sized enterprise (SME), perhaps even a home-based business with enough employees to count on one hand. You may not even be thinking about network security. After all, there are a gajillion companies in the world larger and more affluent than yours, so they’d be more logical targets for a hacker, right? After all, what does your network have that any e-punk would want? Well, here are five reasons hackers want into your network, besides data…
The first step in a hack attack is to test for vulnerability. This is usually done with a “scanner,” a commonly available application that queries thousands of arbitrary Internet addresses, hunting for any network with open ports through which a hacker can easily enter. Imagine a burglar sneaking down your street at 3:00 AM, trying every front door, looking for one that’s unlocked. If you get robbed, it’s not personal. You just made it easy — you didn’t lock your door.
First among these are your CPU cycles, the processing horsepower in each computer on your network. With 15 PCs and a high-speed Net connection, Corporate Health Systems came to WatchGuard Technologies for help after persistent hacks had enslaved the company’s network for one purpose: to help the hacker win an encryption-cracking contest.
A WatchGuard network security appliance instantly solved Corporate Health Systems’ hacking problem. Just the same, being roped unknowingly into such “distributed computing” applications poses a serious risk to any company, in part because most such attacks keep a low enough profile as to be unnoticeable.
If a hacker can learn your name and e-mail address — not a particularly hard feat — he’s at liberty to change his mail, news, and chat settings to impersonate you. He might send death threats to an ex-boss under your name. He might raid your contacts list and then pretend to be you while asking vendors for information about your order history, including the account numbers used to pay invoices. If the masked hacker slanders your competitors in a newsgroup, you could be faced with trying to clear yourself in court.
Be sure to take advantage of network security solutions and protect yourself and network. There’s too much at risk in today’s business environment to ignore hackers.