DALLAS – August 20th, 2007 – (BUSINESS WIRE) – The premier provider of Security Risk Management (SRM) solutions for midsize-to-enterprise organizations, today announced it is offering businesses a new way to achieve Payment Card Industry (PCI) compliance while protecting their networks from external and internal attacks.
“In essence, the challenge is this: How does a company harden its network defenses and protect crucial information while still making sure the people who should get in don.t have trouble?” said Dean Trumbull, COO of Global DataGuard. “The answer we have developed is Network Security Zones, NSZ”.
Global DataGuard’s Network Security Zones solution is part of its fully integrated, world-class SRM architecture. This holistic, integrated approach to security sets Global DataGuard apart from vendors who offer only point products and services that are overly complex and expensive to purchase and administer.
While the concept of Network Security Zones is not new, Global DataGuard has turned concept into reality. GDG.s Network Security Zones enables organizations to define secure boundaries to manage and monitor access to information and applications across multiple systems and disciplines – while delivering unimpeded online services to employees, customers and suppliers. The intelligent, behaviorally-based NSZ system does what no other network security product can do, without network rearchitecture: It helps companies easily and intelligently define and enforce who can go where, when they can do it and where they can do it from.
How Network Security Zones work
The integrated Global DataGuard system is the first network access management solution based solely on behavioral network analysis and correlation. Each Network Security Zone is a user-defined container comprised of specific network resource objects: users, systems, applications, date/time, etc. with secure boundaries for specific systems, applications and users. To secure the perimeter, for example, foreign IP addresses are limited to communicating with specific servers, applications, protocols and resources. Internally, the system easily manages access of all specified users to databases and servers, however, attempts by those users to access anything beyond these specified resources financial and customer record servers, for example will result in alerts.