Sydney - February 26 2012 – WatchGuard® Technologies, a global leader in manageable business security solutions, today announced the availability of two new Wireless Access Point products, providing customers with the same level of security for their wireless local access network (WLAN) traffic that they rely on for their traditional wired traffic. More and more companies are incorporating bring-your-own-device (BYOD) policies in order to enable a mobile workforce and enhance productivity. Companies usually adopt complicated procedures to manage this growing trend, but these limited security measures are only effective within a virtual private network (VPN) or hard-wire connection. This approach leaves mobile devices vulnerable to intrusion, viruses, and malware when connected to a wireless network. With threats on the rise and growing amounts of corporate data stored on workers’ personal devices, it is more critical than ever that steps be taken to secure wireless infrastructure.
The new Wireless Access Points AP100 and AP200, extend the high-performing best-in-class and policy-based management features, familiar to WatchGuard’s smart firewall customers, to the wireless environment. This step offers customers the ability to accurately and easily apply security policies and changes to both wired and WLAN resources simultaneously, which is critical to enforcing security standards across the entire network infrastructure.
“Smartphones and tablets now account for about 25 percent of devices used for work, and companies need to protect these devices from threats as securely as they do wired devices,” said Roger Klorese, director of product management at WatchGuard Technologies. “Our new Wireless Access Point products provide customers with our leading unified threat management features and enable them to apply security settings to their WLAN traffic easily and affordably.”
With unified management tools, WatchGuard XTM customers can configure and manage their Wireless Access Points and XTM device from a single console, reducing setup time and maintenance costs. WatchGuard’s familiar XTM security features, such as IPS, application control, WebBlocker and spamBlocker, can be applied to WLAN traffic to help customers achieve complete, scalable network security.
To learn more about WatchGuard Wireless Access Point solutions, visit: www.watchguard.com/products/access-point/overview.asp
About WatchGuard Technologies, Inc.
Since 1996, WatchGuard® Technologies, Inc. has been a global leader of business security solutions that intelligently combine industry standard hardware, Best-in-Class security features, and policy-based management tools. WatchGuard provides easy-to-use but enterprise-powerful protection to hundreds of thousands of businesses worldwide. The WatchGuard family of Smart Firewalls provides; smart security through seamless integration of multiple security services; smart management by providing a single console for deploying and maintaining services; and smart performance to ensure that customers of all sizes can securely operate at the pace of business. WatchGuard products are backed by WatchGuard LiveSecurity® Service, an innovative support program. WatchGuard is headquartered in Seattle, Wash. with offices throughout North America, Europe, Asia Pacific, and Latin America. To learn more, visit www.watchguard.com
WatchGuard is a registered trademark of WatchGuard Technologies, Inc. All other marks are property of their respective owners.
Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint
Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.
Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation
CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)
Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana