Content-Aware ILP Solution protects confidential data.

Press Release Summary:



PortAuthority v5.0 provides total protection of confidential information in motion, at rest, and in use. Combining Information Leak Prevention (ILP) as well as content monitoring and filtering capabilities, it covers over 370 file formats and prevents unauthorized copying of confidential documents to portable media. Along with over 150 pre-built policies and reports, scalable solution has purpose-built security appliances with management, reporting, and compliance capabilities.



Original Press Release:



PortAuthority Technologies Redefines Total Protection of Confidential Information



PortAuthority 5.0 Adds Significant Data Protection Coverage While Breaking Complexity Barriers for Customers; Paves the Way for Widespread Adoption of Policy Enforcement

PALO ALTO, Calif. - Oct. 30, 2006 - PortAuthority Technologies, Inc.,(TM) the Authority in Information Leak Prevention (ILP), today announced it has redefined what the industry has considered as total protection of confidential information with the release of PortAuthority v5.0, the next-generation of its leading ILP solutions. With this release, PortAuthority 5.0 is the only solution to provide comprehensive protection for data-in-motion, data-at-rest and data-in-use.

Loss of private information by internal users, whether malicious or unintended, continues to plague organizations worldwide. According to the latest research, the top reasons organizations cannot enforce policies designed to prevent data breaches is lack of resources, and the complexity and expense of current offerings1. With unmatched simplicity, flexibility and scalability offered in an ILP and Content Monitoring and Filtering product, PortAuthority 5.0 addresses complexity concerns while adding the industry's broadest coverage for protection, enabling organizations to more totally secure their confidential information.

"We have had excellent service from PortAuthority as one of many tools we use to control and protect our confidential information," said Rob Mims, Vice President of Security and Network Engineering at MedAvant Healthcare Solutions. "The system detects and blocks confidential information that is not encrypted from being distributed electronically outside our company. With the latest version of PortAuthority, we look forward to improved reporting functions that will help us better manage the rare incidents of policy violations."

According to a recent report co-authored by Rich Mogull, Research Vice President, Information Security and Risk, Gartner, Inc., "Organizations with realistic expectations are finding that this (Content Monitoring and Filtering) technology does indeed meet their expectations and significantly reduces non-deliberate outflows of sensitive data. Most information leaks are the result of accidents or bad processes, and CMF is evolving rapidly to address more malicious attacks. As the technology matures, network-only mechanisms will evolve to a more comprehensive model that also addresses host protection2."

PortAuthority 5.0 delivers the industry's most comprehensive coverage available in an ILP product today. It is the only content-aware leak prevention solution to protect confidential data, whether in motion, at rest, or in use, including on endpoints and over internal mail and networked printers. PortAuthority 5.0 protects information in more than 370 file formats, the most in the industry, including structured and unstructured data, text and graphics, and CAD documents. PortAuthority also expands total protection of information to data-in-use by delivering content-aware protection of unauthorized copying of confidential documents to portable media such as USB drives or CD-ROMs.

PortAuthority 5.0's purpose-built security appliances with enhanced management, reporting and compliance capabilities increase data-protection simplicity while lowering the total cost of ownership of ILP solutions. The PortAuthority Graphical User Interface has been redesigned to provide "3 Clicks Manageability" for reporting and compliance - users can now typically manage policy violations from investigation to remediation with three clicks. With more than 150 pre-built policies and reports, as well as automated data classification and protection, PortAuthority 5.0 enables more rapid deployment for enterprises and global organizations than products before. Robust policy-based enforcement and encryption, as well as seamless migration from auditing to prevention, provide organizations with a highly flexible solution for preventing information leaks. In addition, PortAuthority's new product provides a distributed architecture and hierarchical management and remediation, and scales to tens of thousands of users and millions of documents.

In a separate report, co-author Rich Mogull of Gartner, Inc., also states, "Although they are technical tools, they solve a business problem and are typically used by technical and non-technical staff (such as HR or legal). Preference is given to products capable of strong segregation of duties, with management interfaces designed for technical and non-technical staff. Workflow should allow for robust incident handling, and delegated administration and case management for legal investigations should be tightly integrated. At a minimum, there should be roles for technical management, policy creation and policy enforcement3."

PortAuthority 5.0 adds significant capabilities in three major areas organizations have identified as critical - manageability, endpoint security and advanced integration - to the most advanced ILP policy enforcement solution, which leads the industry with 27 patents pending and the most widespread deployment of leak prevention customer installations. PortAuthority 5.0 includes case management tools to manage policy violations, report trends and investigate events through their complete life cycles. Advanced urgency-based views allow administrators to quickly and efficiently detect the incidents that require immediate attention. Finally, PortAuthority 5.0's forensics engine now provides enhanced details for HTML documents, including Outlook mail and other types of documents using HTML.

PortAuthority's new products are the industry's first to integrate monitoring and enforcement in a single appliance. PortAuthority 5.0 can be deployed in multiple modes, including transparent mode providing passive monitoring, in-line mode for monitoring and enforcement, and proxy mode using ICAP integration with content proxies. In addition, PortAuthority 5.0 is Documents Right Management (DRM) ready and can be used to protect documents outside the firewall by integrating with different DRM products, automatically adding rights management capabilities to any document or email that is authorized to be sent outside the network.

"PortAuthority 5.0 sets a new benchmark for total protection of confidential information with comprehensive protection of data-in-motion, data-at-rest and data-in-use," said Raj Dhingra, vice president of marketing at PortAuthority Technologies. "There has been a complexity barrier affecting organizations interested in deploying data protection solutions. PortAuthority breaks through this complexity barrier with its unmatched flexibility and '3 Clicks Manageability.' With these ground-breaking advancements, based on industry feedback, organizations are more readily able to implement the policy enforcement they need to ensure their confidential information is kept secured from leaks."

About PortAuthority Technologies
PortAuthority Technologies is the Authority in Information Leak Prevention, providing security solutions that reliably and accurately control the unauthorized distribution of sensitive information for data privacy, confidential information protection and true compliance. Using patented PreciseID(TM) technology, it is the only content-aware solution to provide comprehensive protection of data-in -motion, data-at-rest and data-in-use. With its 3 Clicks Manageability and automated identification and protection, PortAuthority delivers ease of deployment and the lowest cost of ownership. PortAuthority ensures compliance with regulations such as GLBA, PCI, HIPAA, CA CC1798, PIPEDA and SOX by closing the gap between employee behavior and corporate and legal policies. PortAuthority Technologies is a privately held company backed by Greylock Partners, Lexington Ventures, New Enterprise Associates, and Sequoia Capital. The company is headquartered in Palo Alto, Calif., and has offices throughout the U.S. For more information, please visit portauthoritytech.com, or call 877-843-4879.

Note 1 - The Ponemon Institute, National Survey on the Detection and Prevention of Data Breaches, Aug. 29, 2006.

Note 2 - Gartner, Inc., Hype Cycle for Information Security, 2006; Rich Mogull, et al; July 10, 2006. Top Five Steps to Prevent Data Loss and Information Leaks; Rich Mogull; July 12, 2006.

Note 3 - Gartner, Inc., Magic Quadrant for Content Monitoring and Filtering, 2006; Paul E. Proctor, Rich Mogull; February 17, 2006.

All Topics