This tag is associated with 3 posts

WatchGuard Technologies a Leader in Three Key Unified Threat Management and Next-Generation Firewall Categories in Frost and Sullivan Report

Companies of all sizes are demanding increased functionality from their network security and management solutions that won’t compromise performance. As the threat landscape shifts from known, signature-based threats to zero-day, advanced malware threats, detecting and eradicating them requires a multi-layered approach to security and real-time threat visibility. Delivering the industry’s best-of-breed security with industry-leading performance requires a commitment to product development and continual assessment of how to improve.

Today, WatchGuard was recognized for its commitment to product development and identified as a leader in three categories of Frost & Sullivan’s 2014 Global Analysis of UTM (Unified Threat Management) and NGFW (Next Generation Firewall) Market research study. In the report, WatchGuard outperformed other vendors in Management and Usability, Flexibility, and Value. WatchGuard was also noted in the areas of Performance and Scalability, and Roadmap.

Chris Rodriguez, senior industry analyst for network security at Frost & Sullivan and report author noted, “WatchGuard is an established competitor in the UTM and NGFW market. Their product strategy focuses on visibility, performance and integration of best-of-breed technologies that are simple to use and provide great value.”

Rodriguez highlights specific product and solution benefits that illustrate how WatchGuard achieved its leadership position. These include:

  • WatchGuard Dimension’s ability to pinpoint security and performance issues streamlines management and usability.
  • The flexibility of WatchGuard’s platform allows integration of only the desired security functionality for increased efficiency and ease of use.
  • The consolidation of leading security technologies from best-of-breed providers onto the Fireware®platform delivers exceptional value to users.
  • Tuning the platform for optimal use of commercial hardware, such as Intel processors, improves packet processing and enables increased performance and scalability of the platform.
  • A roadmap with significant future improvements around Fireware® and other security technologies shows WatchGuard’s continued commitment to product development.

To learn more about how WatchGuard can help move you to the top of the network security food chain, click here.


Walking the Tightrope: Embracing BYOD and Protecting Your Network

Employees increasingly use personal devices, including, tablets, smartphones, and laptops, to accomplish their work faster, more flexibly, and from anywhere.  Yet, while BYOD (Bring Your Own Device) offers more control and independence for workers, it can reduce the control organizations have over securing their networks.

Endpoint Security

Endpoint protection and robust encryption are generally mandated on company-owned devices, but personal devices often lack these safeguards.  Moreover, devices used for personal computing and messaging, when off the company grid, lack the protections of the network firewall, leaving the entire organization exposed to hacker exploits, or malware infection, when the device re-connects to the network.

More than a quarter of companies reportedly lack security requirements for smartphones.1 However, companies that do implement security policies for mobile devices still face the threat of employees trying to bypass these requirements. A Ponemon and Websense joint survey highlighted just that—59% of respondents claimed that employees circumvent or disengage security features such as passwords and key locks.2

Lost Personal Devices: A Data Minefield

In the case of a lost or stolen personal device that stores company-owned data, an employee may be unwilling to have their device data wiped remotely.  In fact, only 55% of mobile workers report having remote wipe enabled on their smartphones, and just 30% on their tablets.”2 The inability to rapidly dispose of sensitive data, particularly unencrypted data, exposes organizations to considerable risk.

What You Can’t See, Can Byte You!

A Mobilisafe study encompassing 130 million device connection events reported that over a third of the devices with network access and/or corporate data went inactive for more than a month.3   The presence of so many personal devices used for work that are unaccounted for, and that may retain sensitive data and user credentials, poses a latent threat to organizations.

Outdated Firmware and Version Control

The sheer number and variety of personal devices and operating systems that may be in use across an enterprise poses daunting challenges for IT.  Mobilisafe found that 71% of mobile devices contained high severity operating system and application vulnerabilities. Mobilisafe theorizes that severe vulnerabilities could be reduced 4-fold simply by updating firmware.3

Malware Breeding Grounds

Smartphone users routinely download music and games, access applications, and execute files with minimal regard to file source or authenticity.  Ponemon and Websense reported that, in a one year period, 51% of surveyed organizations experienced data loss resulting from employee use of insecure mobile devices.2

With all the potential pitfalls, it’s easy to understand why some people more cynically refer to BYOD as “Bring Your Own Danger/Disaster.”

Taking BYOD Head-On

Organizations that try to ban personal devices outright, may repel productive and creative workers, or induce employees to work outside the rules.

A successful BYOD security policy should strive to:

  • Establish full visibility of all devices connected to the network
  • Enforce strong access control passcodes on all devices
  • Mandate minimum system and device requirements
  • Continuously monitor for vulnerabilities, exploit attempts, misuse, and devices that have gone off-line
  • Encrypt all company data on personal devices
  • Enforce use of antivirus, data loss prevention, and application control
  • Allow company access to the device for forensics, or to wipe company data
  • Measure compliance

As a leader in network security, WatchGuard Technologies develops solutions to make your BYOD environment a safe and productive ecosystem.  By enforcing a practical policy, we believe that organizations can enable workforce productivity, foster goodwill and trust across the organization, achieve compliance demands, and maintain strong security–without sacrificing flexibility.

Check out WatchGuard’s white paper on how to create a secure BYOD policy for your network.


  1. iPass. “The iPass Global Mobile Workforce Report: Q3 2012: Understanding Global Mobility Trends and Mobile Device Usage Among Business Users”.  August 2012.
  2. Ponemon Research Institute (sponsored by Websense). “Global Study on Mobility Risks: Survey of IT & IT Security Practitioners”. February, 2012.
  3. Mobilisafe. “Four Steps To Mitigate Mobile Security Risks”. White Paper.

Introducing the XTM 2050 Next-Generation Firewall from WatchGuard

XTM 2050

With the recent catastrophe surrounding Sony’s security breach, large enterprises are reevaluating their network security systems. If it can happen to a company as highly regarded at Sony, can it happen to anyone? The answer depends on the strength of the network security system that is in place when a security breach is attempted. Unfortunately, viruses, hackers, and malicious software are part of the price a business pays for being globally connected to the World Wide Web.  However grim that truth may be, there are new tools and effective solutions available to mitigate risks and data exposure. To address these concerns, WatchGuard now offers its latest next-generation firewall and flagship security appliance, the WatchGuard XTM 2050.

Today, WatchGuard unveiled the XTM 2050, part of a new line of next-generation firewalls geared towards large enterprises, university campuses, managed security service providers (MSSPs), data centers, manufacturing plants, and school districts. The XTM 2050 includes: advanced firewalling, Application Control, IPS, and LiveSecurity, all for a fraction of the price of comparable 20 Gbps next generation firewalls.

Using a “defense-in-depth” approach, WatchGuard next-generation firewalls utilize the latest in network security technologies.  For example, the XTM 2050 is the only next generation firewall to include stateful packet inspection, deep packet inspection and proxy technologies as part of its comprehensive firewall protection.  Application Control allows enterprises to control more than 1,800 applications, and regulate acceptable use policy with high granularity and user visibility.  Using continually updated signatures, the Intrusion Prevention Service (IPS) scans network traffic to detect and block incoming threats.

As Sony has shown, the costs of having inadequate network security can be devastating to an enterprise.  Now more than ever, businesses need to take a proactive stance in stopping hackers and malware.  The WatchGuard XTM 2050 next generation firewall provides the high performance and high security features that enterprises expect and need for today’s Internet-driven economy.  And, needless to say, we at WatchGuard are proud to be leading the pack in protecting enterprise networks, applications and data.