Wednesday, June 07, 2006 8:14:34 PM
Phoenix Technologies Ltd. Introduces Trusted Security(TM) Suite to Eliminate Dangerous Endpoint Security Leaks; Software Extends Security Policy Enforcement to All Ports
http://home.businesswire.com/portal/site/google/index.jsp?ndmViewId=news_view&newsId=20060607005...
MILPITAS, Calif.--(BUSINESS WIRE)--June 7, 2006--Phoenix Technologies Ltd. (Nasdaq:PTEC) today announced Trusted Security(TM) Suite, an innovative endpoint security solution that combines device identification, port monitoring and endpoint auditing software to prevent data leakage and protect an organization's information resources and intellectual property from unauthorized access. Trusted Security Suite is a seamless, tamper resistant solution that uniquely identifies network attached endpoints and shields against network infiltration and data leakage by preventing unauthorized connections through physical ports such as USB, Firewire and PCMCIA.
Enterprise endpoints -- desktops and laptops -- have been swamped by new connectivity methods: conventional storage options such as CDs and DVDs, new devices including flash drives and MP3 players and advanced devices based on WiFi or Bluetooth technologies. These new connectivity options, with their ability to connect seamlessly and instantaneously with enterprise endpoints, increase security dangers such as information leakage, data theft and malicious penetration.
"Today's connected organizations must proactively safeguard endpoints against an increasing number of security threats," said Kort van Bronkhorst, vice president, corporate marketing, Phoenix Technologies Ltd. "Trusted Security Suite provides the industry's first comprehensive endpoint security layer to address this dynamic computing environment. Locking security policy to the device, regardless of its proximity to the network, is an imperative for today's mobile workforce -- a notification of data leakage, after the fact, isn't going to help CIOs sleep at night."
Unlike current solutions which require purchase of nonintegrated products from different vendors at a significantly greater cost, the Phoenix Trusted Security Suite is an integrated solution based upon proven cost-effective technologies.
With Trusted Security Suite, Phoenix extends the trusted computing concept of 'a chain of trust' from the Windows operating system to the ports on the endpoint. The solution includes three key security products:
-- TrustConnector(TM) 2 creates a unique identity for each device that cannot be altered or stolen, preventing attackers from accessing protected systems even if they have valid IDs and passwords. The software further reduces the risk of data and intellectual property theft by protecting keys for certificate-based applications and binding them to device-specific profiles. Even in the unlikely event that the keys are stolen, they would not work on another device. TrustConnector also enables device access policy enforcement to reduce the risk of threats and vulnerabilities from unknown devices accessing enterprise networks and threatening to compromise data and interrupt business operations.
-- TrustTracker(TM) performs reliable, rapid scanning of all network endpoints and attached devices to provide complete visibility of all devices connected to network endpoints and to show vulnerability gaps in enterprise security practices. The integrated software queries all endpoints on the network to find every USB, PCMCIA and FireWire device that has been connected in the last six months and assess exact endpoint vulnerabilities including at-risk ports and TrustConnector usage.
-- TrustShield(TM) enforces administrator-defined port access policies in enterprise endpoints. The software offers granular policy enforcement and monitors and controls all endpoint ports and interfaces from a central location in real time. Policies can be assigned to any domain, group, computer or user in the organization. The TrustShield client agent protects endpoints, operates at the kernel level and is virtually impossible to circumvent.
TrustTracker and TrustShield are powered by Safend(TM).
Pricing and Availability
Trusted Security Suite is available immediately through resellers at a base price of $49.95 with volume discounts. For more information, visit www.phoenix.com.
About Phoenix Technologies Ltd.
Phoenix Technologies Ltd. (Nasdaq:PTEC) is a global market leader in device-defining software that assures endpoint confidence, from the start. The company first established dominant industry leadership 26 years ago with BIOS software, currently has over one billion products deployed and continues to ship in over 100 million new systems each year. From this unique foundation of core system level expertise and firmware offering the highest levels of reliability, Phoenix has created a portfolio of innovative software products that simply and easily identify and restore devices, thereby ensuring unparalleled endpoint security and availability.
With a focused commitment to the highest levels of customer confidence and satisfaction, Phoenix serves enterprise and government channel partners, ODMs, OEMs, system builders and ISVs by enabling them to decrease time to market, differentiate their products, create value, increase profits and lower cost of ownership. Phoenix is headquartered in Milpitas, California, with offices worldwide in global business and technology centers. For more information, visit www.phoenix.com.
Phoenix, Phoenix Technologies and the Phoenix Technologies logo, TrustShield, TrustTracker and TrustConnector, are trademarks and/or registered trademarks of Phoenix Technologies Ltd. All other trademarks are the property of their respective owners.
Safend is a registered trademark and is a trademark of Safend. All other trademarks are the property of their respective owners
http://home.businesswire.com/portal/site/google/index.jsp?ndmViewId=news_view&newsId=20060607005...
MILPITAS, Calif.--(BUSINESS WIRE)--June 7, 2006--Phoenix Technologies Ltd. (Nasdaq:PTEC) today announced Trusted Security(TM) Suite, an innovative endpoint security solution that combines device identification, port monitoring and endpoint auditing software to prevent data leakage and protect an organization's information resources and intellectual property from unauthorized access. Trusted Security Suite is a seamless, tamper resistant solution that uniquely identifies network attached endpoints and shields against network infiltration and data leakage by preventing unauthorized connections through physical ports such as USB, Firewire and PCMCIA.
Enterprise endpoints -- desktops and laptops -- have been swamped by new connectivity methods: conventional storage options such as CDs and DVDs, new devices including flash drives and MP3 players and advanced devices based on WiFi or Bluetooth technologies. These new connectivity options, with their ability to connect seamlessly and instantaneously with enterprise endpoints, increase security dangers such as information leakage, data theft and malicious penetration.
"Today's connected organizations must proactively safeguard endpoints against an increasing number of security threats," said Kort van Bronkhorst, vice president, corporate marketing, Phoenix Technologies Ltd. "Trusted Security Suite provides the industry's first comprehensive endpoint security layer to address this dynamic computing environment. Locking security policy to the device, regardless of its proximity to the network, is an imperative for today's mobile workforce -- a notification of data leakage, after the fact, isn't going to help CIOs sleep at night."
Unlike current solutions which require purchase of nonintegrated products from different vendors at a significantly greater cost, the Phoenix Trusted Security Suite is an integrated solution based upon proven cost-effective technologies.
With Trusted Security Suite, Phoenix extends the trusted computing concept of 'a chain of trust' from the Windows operating system to the ports on the endpoint. The solution includes three key security products:
-- TrustConnector(TM) 2 creates a unique identity for each device that cannot be altered or stolen, preventing attackers from accessing protected systems even if they have valid IDs and passwords. The software further reduces the risk of data and intellectual property theft by protecting keys for certificate-based applications and binding them to device-specific profiles. Even in the unlikely event that the keys are stolen, they would not work on another device. TrustConnector also enables device access policy enforcement to reduce the risk of threats and vulnerabilities from unknown devices accessing enterprise networks and threatening to compromise data and interrupt business operations.
-- TrustTracker(TM) performs reliable, rapid scanning of all network endpoints and attached devices to provide complete visibility of all devices connected to network endpoints and to show vulnerability gaps in enterprise security practices. The integrated software queries all endpoints on the network to find every USB, PCMCIA and FireWire device that has been connected in the last six months and assess exact endpoint vulnerabilities including at-risk ports and TrustConnector usage.
-- TrustShield(TM) enforces administrator-defined port access policies in enterprise endpoints. The software offers granular policy enforcement and monitors and controls all endpoint ports and interfaces from a central location in real time. Policies can be assigned to any domain, group, computer or user in the organization. The TrustShield client agent protects endpoints, operates at the kernel level and is virtually impossible to circumvent.
TrustTracker and TrustShield are powered by Safend(TM).
Pricing and Availability
Trusted Security Suite is available immediately through resellers at a base price of $49.95 with volume discounts. For more information, visit www.phoenix.com.
About Phoenix Technologies Ltd.
Phoenix Technologies Ltd. (Nasdaq:PTEC) is a global market leader in device-defining software that assures endpoint confidence, from the start. The company first established dominant industry leadership 26 years ago with BIOS software, currently has over one billion products deployed and continues to ship in over 100 million new systems each year. From this unique foundation of core system level expertise and firmware offering the highest levels of reliability, Phoenix has created a portfolio of innovative software products that simply and easily identify and restore devices, thereby ensuring unparalleled endpoint security and availability.
With a focused commitment to the highest levels of customer confidence and satisfaction, Phoenix serves enterprise and government channel partners, ODMs, OEMs, system builders and ISVs by enabling them to decrease time to market, differentiate their products, create value, increase profits and lower cost of ownership. Phoenix is headquartered in Milpitas, California, with offices worldwide in global business and technology centers. For more information, visit www.phoenix.com.
Phoenix, Phoenix Technologies and the Phoenix Technologies logo, TrustShield, TrustTracker and TrustConnector, are trademarks and/or registered trademarks of Phoenix Technologies Ltd. All other trademarks are the property of their respective owners.
Safend is a registered trademark and is a trademark of Safend. All other trademarks are the property of their respective owners
Join the InvestorsHub Community
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.