Software stops information leaks.

Press Release Summary:



Eliminating leaks of sensitive customer data and confidential information over web communications and networked-printing in real-time, PortAuthority v4.0 supports ICAP-based web monitoring and blocking, allowing it to transparently integrate with existing web content-filtering infrastructure from Blue Coat, Cisco, and Network Appliance. It also offers granular policy management for selective blocking and enforcement, and automated data protection using PreciseID(TM).



Original Press Release:



PortAuthority Technologies Introduces the First and Only Solution to Reliably Stop Information Leaks Over Web Communications and Networked Printing



PALO ALTO, Calif., Jan. 24 -- PortAuthority Technologies, the leader in Information Leak Prevention, today announced PortAuthority 4.0, the industry's first and only solution to reliably stop leaks of sensitive customer data and confidential information over web communications and networked-printing in real-time. New support for industry standard ICAP-based web monitoring and blocking allows PortAuthority to transparently integrate with existing web content-filtering infrastructure from vendors such as Blue Coat, Cisco and Network Appliance. PortAuthority 4.0 also extends industry leadership through expanded coverage of monitoring and information leak prevention capabilities, granular policy management for selective blocking and enforcement, automated data protection using PortAuthority's patented PreciseID(TM) for databases containing sensitive information, and plug-and-play appliances purpose-built for data security. Only PortAuthority 4.0, allows companies to reliably, accurately, precisely, and selectively stop information leaks over outbound mail, web communications, internal mail and networked printing to ensure data privacy, protect confidential information, and achieve regulatory compliance.

According to a September 2005 independent survey from the Ponemon Institute, direct and total costs to recover from a data breach averaged anywhere from $5 - $14 MM per company, per incident. In fact, over the past year alone, security breaches have affected companies in a variety of sectors, including financial services, government, healthcare and technology. The information leaks occur across multiple business applications and channels thereby necessitating a solution that accurately monitors and prevents information security breaches across the entire network.

"With increasing incidents of identity theft and privacy breaches, PortAuthority Technologies understands that monitoring sensitive data in-transit is not enough. A comprehensive solution must reliably and accurately stop the dissemination of all unauthorized dissemination of sensitive corporate information," said Kirk Drake, vice president of Information Technology at the National Institute of Health Federal Credit Union. "Now we can automate and enforce our security policies for the communication of sensitive data passing over web and other channels. We are confident that our customers' sensitive information, as well as, our own sensitive corporate data is protected regardless of protocol, application or network."

"The addition of ICAP support for PortAuthority gives customers the ability to seamlessly integrate with their existing high-performance proxy appliance," said Dan Wilson, vice president of Partner Relations at Accuvant. "Now that PortAuthority can integrate into any ICAP-compliant environment, customers are able to implement PortAuthority's industry-leading security solution while protecting themselves against information leaks over the web."

PortAuthority 4.0 reliably, accurately and precisely monitors and prevents information leaks with the following capabilities:

- Information Leak Prevention over the Web: PortAuthority monitors and enforces outgoing Web communications in conjunction with web proxies using standards-based ICAP support. Transparent deployment through integration with leading HTTP proxy providers allows for accurate and selective blocking of sensitive information on outbound and inbound web communications without any changes to the IT infrastructure

- Information Leak Prevention for Networked Printing Environments: Monitor and enforce policies for information leaks in a networked printing environment. Transparent deployment requires no infrastructure changes. Security administrators can now automate policy enforcement by selectively blocking printing of sensitive data by departments without disrupting business workflow for authorized users.

- Plug-and-play Deployment with Appliances Purpose-built for Data Security: A new range of monitoring and management appliances, PortAuthority M100, M500 and MX, that monitor any network segment using a SPAN port or Network TAP. Appliances are purpose-built for easy set-up and real-time monitoring, management in distributed environments.

- Enhanced Granular Policy Management: Granularly manage and control policy by sender, recipient, communication channel and content, to monitor and automate selective blocking and enforcement of policies for regulatory and/or corporate compliance. Companies can now selectively lock sensitive content over outbound mail, suspicious content over web ommunications and intellectual property leaks over any communication channel while selectively encrypting emails to partners and customers.

- Automated Data Protection with PreciseID(TM): Automated protection of databases with patented PreciseID fingerprinting for sensitive data residing in ODBC compliant databases. Wizards enable ease of use and automation to dynamically keep policies and sensitive data updated for real-time monitoring and enforcement.

- Enhanced Forensic Investigation and Reporting: New reports provide detailed forensic analysis and auditing for managing risk and compliance.

"Traditional security solutions are ineffective against the growing threat of information leaks affecting enterprises and government agencies. PortAuthority Technologies sets the industry standard for stopping information leaks with expanded prevention capabilities, scalable management and plug-and-play appliances for ease of use," said Pete Foley, President and CEO of PortAuthority Technologies. "This is our most powerful information leak security solution to date and we will continue to seek innovative ways to help our customers protect sensitive corporate and customer information."

Pricing and Availability
PortAuthority 4.0 is available immediately and pricing starts at $25,000. For more information about purchasing a PortAuthority Information Leak Prevention security solution, please visit portauthoritytech.com.

About PortAuthority Technologies
PortAuthority Technologies is the leading provider of Information Leak Prevention security solutions that reliably and accurately control the unauthorized distribution of sensitive information for data privacy, confidential information protection and true compliance. PortAuthority stops information leaks of customer data and confidential information by monitoring internal and outbound enterprise communications and delivering policy enforcement in real-time. PortAuthority Technologies ensures compliance with regulations such as Gramm-Leach-Bliley, HIPAA, CA CC1798, PIPEDA and Sarbanes-Oxley by closing the gap between employee behavior and corporate and legal policies.

PortAuthority Technologies is headquartered in Palo Alto, California. For more information on PortAuthority Technologies, visit portauthoritytech.com or call 877-843-4879.

PortAuthority Technologies and the PortAuthority logo are registered trademarks of PortAuthority Technologies. All other trademarks are the property of their respective owners.

All Topics