Reconnex Announces Five-Phase Product Strategy for Complete, Enterprise-Wide Risk Management Solution


MOUNTAIN VIEW, Calif., Nov. 14 -- Reconnex, the expert in enterprise risk discovery and management systems, today announced a five-phase strategy that provides a product roadmap for the evolution of its content monitoring and discovery appliances. The Reconnex inSight Platform, which consists of the iGuard content monitoring appliance, the iController content registration appliance, and the iManager centralized management console, currently monitors network traffic across all protocols and content types. The platform captures the traffic, performs real-time content analysis at wire speed to accurately identify security violations, and is unique in performing event correlation. Over the next two years, the company will introduce products that can decrypt and encrypt traffic on the fly, detect and block content from leaving the network, and bring security to network endpoints. A new management capability will enable the inSight Platform to manage the entire ecosystem of security devices in a network. To ensure that its offering is the most complete security system available, Reconnex is partnering with applicable security vendors that offer best-of-class point solutions.

"Because Reconnex's architecture platform is easily extensible, we are developing it into the central nervous system of enterprise risk management," said Kevin Cheek, vice president of marketing at Reconnex. "We've laid down a roadmap for our customers because we recognize that issues of security and risk management affect the entire organization. Providing complete security to mitigate electronic risks across all applications requires an integrated approach encompassing all the functions Reconnex provides as well as point solutions from third-party vendors to handle very specific issues. Only Reconnex has the expertise to bring enterprise security to this new level."

Understanding Network Traffic and Security Risks

The first three phases of Reconnex's security roadmap provide increasingly sophisticated ways to monitor all traffic leaving and entering the worldwide corporate network and to determine if it violates policies regarding the transmission of sensitive and proprietary data.

o Phase I. The existing iGuard content monitoring appliances, the first security devices that allow organizations to monitor, detect, analyze, and remediate all content entering and leaving their networks, represents Phase 1 of Reconnex's product roadmap. The company will continue to evolve these appliances to keep pace with market needs for new security uses in areas such as the branch office. Reconnex will also offer more functions in the iGuard appliances, such as the ability to find trends in network traffic by analyzing longer-term network behavior and content over time.

o Phase II. The iController content registration appliance, which today monitors valuable electronic assets, will perform content discovery in Phase II of Reconnex's strategy. The iController will leverage its crawlers to find and register sensitive data in corporate servers and databases that the enterprise wants to protect, and the iGuard will be able to recognize this data if it leaves the network. This capability will improve the iGuard's ability to quickly profile security breaches involving specific data without having to analyze all network traffic.

Enterprises can thus protect not only the data they know to be sensitive but also protect against threats that are not apparent on the surface. Content discovery will even allow users to find out if their servers contain confidential information that either does not belong there or should be encrypted. For example, an administrator might find that someone has put confidential information on his or her share folder for everyone to see.

o Phase III. In Phase III, Reconnex's technology will be able to detect the application used to encrypt content -- SSH, for example -- and decrypt and re-encrypt the content on the fly, at network speed, transparently to the end user. For the first time, enterprises will be able to monitor and analyze all content crossing their networks. Users will be able to differentiate legitimate encrypted traffic, such as logging into bank accounts, from malicious traffic that uses encryption to circumvent security policies. As more companies move toward encrypting all traffic, the ability to apply security policies to encrypted traffic will ensure the longevity and security of Reconnex's solution.

Keeping Sensitive Data In the Enterprise

Phases I to III of the Reconnex roadmap are intended to more fully secure enterprise data. Phases IV and V will allow the enterprise to make pro-active decisions about what it will allow to leave or enter the network, down to a granular level.

o Phase IV. Today enterprises have only a limited ability to block traffic that does not meet their policies from leaving the network. Most solutions work by brute force, blocking anything that appears to violate policies, and thus generate a large number of false-positives. In addition, these solutions can only block traffic from a single corporate email application. Yet email accounts for just a small minority of the total data that crosses the network. Reconnex's Phase IV blocking solution recognizes that the need for security extends far beyond email. Reconnex will enable enterprises to block any kind of application that traverses the network, whether it be email, Webmail, Instant Messaging chat, or anything else -- including latency-sensitive applications and encrypted data.

Because iGuard lets enterprises monitor their networks, they can determine if a blocking policy works as intended. If a policy results in too many false positives or false negatives, the enterprise will be able to adjust it until it blocks only what should be blocked. iGuard users will have full flexibility in managing the policy set to ensure business workflow is not impeded. In addition, the iController's registration technology will provide an added layer of accuracy.

o Phase V. While the first four phases deal with the most important aspects of the insider threat to security, Phase V will add greater granularity, enabling enterprises to provide security at network endpoints such as desktops, servers, and databases. Doing content monitoring at the endpoint, rather than at ingress and egress, will enable enterprises to prevent employees from doing things such as downloading confidential information to a memory stick or burning it onto a CD. In contrast, today's solutions give enterprises an all-or-nothing choice -- lock down all ports so no one can download data from individual devices or have no end-device security at all. In this phase, Reconnex moves risk management beyond corporate borders to track content even in Cyberspace. This capability will provide a uniform security policy that extends throughout the organization and protect sensitive information even when laptop users are traveling. Today, laptops that are not connected to the corporate network increase the risk of sensitive information leaving the network without monitoring.

Reconnex to Provide Risk Management "Glue"

To complement its five-phase product strategy, Reconnex will also soon introduce its iManager policy and management console, which will act as the controlling intelligence-the glue-that holds together the entire risk management infrastructure. The iManager console enables enterprises to centrally manage not only multiple Reconnex products but also third-party security point solutions such as intrusion detection devices from Reconnex partners that are integrated into the overall Reconnex solution.

About Reconnex

Reconnex is the leading provider of enterprise risk management (ERM) systems that reveal and address the insider threat to compliance risks, competitive risks, corporate governance risks and critical infrastructure risks. Reconnex enables Fortune 1000 companies, government organizations, and smaller healthcare and financial services companies to protect their brands, shareholder value and mission critical operations by revealing hidden risks in the first 48 hours of deployment Without exception, every deployment has enabled these organizations to quickly remediate the risks that could have damaged or destroyed their organization.

Give us two days, you'll know(TM). Call Reconnex today at 1-866-940-4590 or visit us on the web at reconnex.net.

Kevin Cheek Robb Henshaw
Rconnex Corporation Engage PR
650-940-7705 510-748-8200 ext. 217
kcheek@reconnex.netrhenshaw@engagepr.com

Source: Reconnex Corporation

CONTACT: Kevin Cheek of Reconnex Corporation, +1-650-940-7705, or kcheek@reconnex.net; or Robb Henshaw of Engage PR, +1-510-748-8200, ext. 217, or rhenshaw@engagepr.com, for Reconnex Corporation

Web site: http://reconnex.net/

All Topics