Info Security Products Guide Names Masergy’s Global DataGuard Winner of 2009 Tomorrow’s Technology Today Award for Network Behavior Analysis-Based Enterprise UTM++

Info Security Products Guide Names Masergy’s Global DataGuard Winner of 2009 Tomorrow’s Technology Today Award for Network Behavior Analysis-Based Enterprise UTM++

Architecture-Based Security Suite Recognized in Integrated Security Solution Category

Download Press Release

Dallas, Texas, May 18, 2009 – Global DataGuard®, the premier provider of network behavior analysis-based Enterprise Unified Threat Management for small and medium business to large enterprise environments today announced that Info Security Products Guide, the industry’s leading publication on security-related products and technologies, has named the Enterprise UTM++™ security suite a winner of the 2009 ‘Tomorrow’s Technology Today’ Award in the Integrated Security Solution category.

This prestigious award recognizes security vendors with advanced, ground-breaking technologies and solutions that are helping to set the bar higher for others in all areas of information security. The Enterprise UTM++ security suite was selected based on technologies that are making the most positive impact on security in today’s highly sophisticated and blended attacks environment, according to Info Security Products Guide.

The Enterprise UTM++ is an end-to-end security system that unifies network security from the ground up. At its foundation is a fully integrated architecture that utilizes patented network behavior analysis as the enabling technology – so security applications can work together, sharing and correlating information across all application subsystems to provide a deeper, historical context to threats and attack reconnaissance. This network behavior analysis-based approach enables the Enterprise UTM++ to:

  • Monitor and correlate/analyze large amounts of network packet data, IDS/IPS alerts, scans, logs, vendor threats and resources that can be tracked over long periods of time – rolling 14-30 days for raw packet data and up to two years for alerts and behavioral profiles.
  • Utilize alearned intelligence capability that can predict behaviors and track developing threats more quickly, before they compromise network resources.
  • Adapt and customize itself to the unique requirements of any network over time.
  • Fully integrate industrial-strength security applications that can be purchased as part of a complete security infrastructure or added incrementally, over time, as network requirements evolve.

TheEnterprise UTM++is also backed by 24/7 managed or co-managed services that can help any organization cost-effectively allocate internal resources and outsource network security requirements based on their peak management requirements.

“Info Security Products Guide’s recognition of our ground-breaking, architecture-based technology reflects a growing movement within the industry toward unification of security applications across a truly integrated platform,” stated Scott Paly, co-founder and chief executive officer for Global DataGuard. “Within this unified world, Network Behavior Analysis is the key to ensuring intelligent, adaptive and predictive network security that can identify developing threats before they compromise critical network resources. It’s how we provide our customers with unrivaled, actionable and scalable security products and services that can withstand the sophisticated assaults from today’s cybercriminals.”

About Info Security Products Guide
Info Security Products Guide is a media sponsor of RSA Conference 2009 and Technosium Executive Alliance Forums engaging Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs). As a technology research and advisory publication, it plays a vital role in keeping decision makers and end-users informed of the choices they can make when it comes to protecting their digital resources. The Info Security Products Guide awards recognize and honor excellence in all areas of information security. To learn more, visitwww.infosecurityproductsguide.comand stay secured.

We've updated our privacy policy. We use cookies to improve the experience of our users, better understand how our website is used, and personalize advertising. By continuing to use this site you are giving us your consent to do this. You can read more and make cookie choices by visiting our privacy policy.