Companies of all sizes are demanding increased functionality from their network security and management solutions that won’t compromise performance. As the threat landscape shifts from known, signature-based threats to zero-day, advanced malware threats, detecting and eradicating them requires a multi-layered approach to security and real-time threat visibility. Delivering the industry’s best-of-breed security with industry-leading performance requires a commitment to product development and continual assessment of how to improve.
Today, WatchGuard was recognized for its commitment to product development and identified as a leader in three categories of Frost & Sullivan’s 2014 Global Analysis of UTM (Unified Threat Management) and NGFW (Next Generation Firewall) Market research study. In the report, WatchGuard outperformed other vendors in Management and Usability, Flexibility, and Value. WatchGuard was also noted in the areas of Performance and Scalability, and Roadmap.
Chris Rodriguez, senior industry analyst for network security at Frost & Sullivan and report author noted, “WatchGuard is an established competitor in the UTM and NGFW market. Their product strategy focuses on visibility, performance and integration of best-of-breed technologies that are simple to use and provide great value.”
Rodriguez highlights specific product and solution benefits that illustrate how WatchGuard achieved its leadership position. These include:
To learn more about how WatchGuard can help move you to the top of the network security food chain, click here.
Employees increasingly use personal devices, including, tablets, smartphones, and laptops, to accomplish their work faster, more flexibly, and from anywhere. Yet, while BYOD (Bring Your Own Device) offers more control and independence for workers, it can reduce the control organizations have over securing their networks.
Endpoint protection and robust encryption are generally mandated on company-owned devices, but personal devices often lack these safeguards. Moreover, devices used for personal computing and messaging, when off the company grid, lack the protections of the network firewall, leaving the entire organization exposed to hacker exploits, or malware infection, when the device re-connects to the network.
More than a quarter of companies reportedly lack security requirements for smartphones.1 However, companies that do implement security policies for mobile devices still face the threat of employees trying to bypass these requirements. A Ponemon and Websense joint survey highlighted just that—59% of respondents claimed that employees circumvent or disengage security features such as passwords and key locks.2
Lost Personal Devices: A Data Minefield
In the case of a lost or stolen personal device that stores company-owned data, an employee may be unwilling to have their device data wiped remotely. In fact, only 55% of mobile workers report having remote wipe enabled on their smartphones, and just 30% on their tablets.”2 The inability to rapidly dispose of sensitive data, particularly unencrypted data, exposes organizations to considerable risk.
What You Can’t See, Can Byte You!
A Mobilisafe study encompassing 130 million device connection events reported that over a third of the devices with network access and/or corporate data went inactive for more than a month.3 The presence of so many personal devices used for work that are unaccounted for, and that may retain sensitive data and user credentials, poses a latent threat to organizations.
Outdated Firmware and Version Control
The sheer number and variety of personal devices and operating systems that may be in use across an enterprise poses daunting challenges for IT. Mobilisafe found that 71% of mobile devices contained high severity operating system and application vulnerabilities. Mobilisafe theorizes that severe vulnerabilities could be reduced 4-fold simply by updating firmware.3
Malware Breeding Grounds
Smartphone users routinely download music and games, access applications, and execute files with minimal regard to file source or authenticity. Ponemon and Websense reported that, in a one year period, 51% of surveyed organizations experienced data loss resulting from employee use of insecure mobile devices.2
With all the potential pitfalls, it’s easy to understand why some people more cynically refer to BYOD as “Bring Your Own Danger/Disaster.”
Taking BYOD Head-On
Organizations that try to ban personal devices outright, may repel productive and creative workers, or induce employees to work outside the rules.
A successful BYOD security policy should strive to:
As a leader in network security, WatchGuard Technologies develops solutions to make your BYOD environment a safe and productive ecosystem. By enforcing a practical policy, we believe that organizations can enable workforce productivity, foster goodwill and trust across the organization, achieve compliance demands, and maintain strong security–without sacrificing flexibility.
With the recent catastrophe surrounding Sony’s security breach, large enterprises are reevaluating their network security systems. If it can happen to a company as highly regarded at Sony, can it happen to anyone? The answer depends on the strength of the network security system that is in place when a security breach is attempted. Unfortunately, viruses, hackers, and malicious software are part of the price a business pays for being globally connected to the World Wide Web. However grim that truth may be, there are new tools and effective solutions available to mitigate risks and data exposure. To address these concerns, WatchGuard now offers its latest next-generation firewall and flagship security appliance, the WatchGuard XTM 2050.
Today, WatchGuard unveiled the XTM 2050, part of a new line of next-generation firewalls geared towards large enterprises, university campuses, managed security service providers (MSSPs), data centers, manufacturing plants, and school districts. The XTM 2050 includes: advanced firewalling, Application Control, IPS, and LiveSecurity, all for a fraction of the price of comparable 20 Gbps next generation firewalls.
Using a “defense-in-depth” approach, WatchGuard next-generation firewalls utilize the latest in network security technologies. For example, the XTM 2050 is the only next generation firewall to include stateful packet inspection, deep packet inspection and proxy technologies as part of its comprehensive firewall protection. Application Control allows enterprises to control more than 1,800 applications, and regulate acceptable use policy with high granularity and user visibility. Using continually updated signatures, the Intrusion Prevention Service (IPS) scans network traffic to detect and block incoming threats.
As Sony has shown, the costs of having inadequate network security can be devastating to an enterprise. Now more than ever, businesses need to take a proactive stance in stopping hackers and malware. The WatchGuard XTM 2050 next generation firewall provides the high performance and high security features that enterprises expect and need for today’s Internet-driven economy. And, needless to say, we at WatchGuard are proud to be leading the pack in protecting enterprise networks, applications and data.