15.02.2005 19:04:00
|
Phoenix Helps Enterprises and Governments Protect and Recover Digital
Phoenix Helps Enterprises and Governments Protect and Recover Digital Devices New White Papers Highlight Solutions to Today's Most Pressing Digital Device Cyber Security And Recovery Challenges
Despite best efforts by operating system, patch management, and antivirus vendors, digital device vulnerabilities have grown. Malicious coders are more numerous, better organized, and better financed than ever before -- and delivering payloads that are potentially more destructive than ever before.
At the same time, new legislative and regulatory mandates require companies to achieve increasing levels of security. Stockholders vote with their wallets when a denial-of-service attack or a security breach shakes public confidence. Potential customers read about these problems in the business pages of the newspaper, turning to alternative vendors that can guarantee uptime and data security.
To help its customers combat cyber attacks, Phoenix Technologies Ltd. (Nasdaq:PTEC) has delivered three cutting-edge digital device security White Papers designed to aid CIOs and IT Managers in their fight to secure their networks. The three White Papers, "Device-level Security for a Trusted Corporate Network," "Securing Government-Owned Devices and Networks," and "Closing the Disaster Recovery Gap in Government IT," address the increasing security challenges facing the enterprise and government sectors.
These White Papers offer CIOs and IT Managers a call to action to secure the endpoint devices accessing their networks, and to close the widening disaster recovery gap. All new security-focused Phoenix White Papers will be available from Phoenix at the RSA Conference 2005, the largest event for information security professionals, which is being held February 14-18 in San Francisco. Phoenix, an innovator of advanced, built-in security and recovery software technologies that allow users to enable, protect and recover their digital devices, will demonstrate its advanced security software in RSA Conference 2005 booth #440.
"Device-level Security for a Trusted Corporate Network"
In today's volatile security paradigm, simple user authentication is not enough -- because a network is only as secure as the devices that connect to it. Even if you are a known user, accessing the network from an unknown or unmanaged device leaves the network vulnerable to viruses and other malware that may be present on those devices. This White Paper is designed to give CIOs and IT Managers a better understanding of the importance of ensuring that only trusted devices -- devices that comply with the organization's network and security policies -- have access to the network and its resources.
By enabling trust at the device level, companies can protect their digital assets, eliminate human-caused vulnerabilities, and make it much easier to do business securely -- on campus or off. Only by authenticating both the user and the device can enterprises strengthen conventional security solutions to provide true security.
This Phoenix White Paper provides detailed analysis of the benefits of device level security, such as the ability to keep untrusted personal devices off of the network, making digital certificates theft-proof; enabling truly secure VPN access; putting a stop to the forced cycle of security product updates, training and management -- and ultimately, saving money while protecting digital assets.
"Securing Government-Owned Devices and Networks"
The stakes are even higher when you move from the realm of private enterprise to government. In general, government agencies collect more information than the typical business -- and much of that information is extremely sensitive. Government networks are more likely to be targeted for attack -- whether by a disgruntled hacker or a well-funded team of cyberterrorists. Because of the volume, value and vulnerability of information on their networks, governments typically spend much more than businesses for data security. According to a PriceWaterhouseCoopers and CIO Magazine survey of 7,500 IT security officers worldwide, the average organization spends $964 per employee on information security. For government agencies, that figure soars to $1,797 per employee -- placing government at number six on a list of 41 industries in IT security spending.(1)
Government IT professionals in organizations at all levels understand the severe consequences of citizen service interruption if critical digital infrastructure fails due to physical or electronic attacks. To prevent catastrophic systems failure from hostile attacks, government IT leadership has upgraded network security capabilities with advanced firewall, virus protection, intrusion prevention and access control technologies, and implemented regular backup of key server-resident databases. This White Paper helps guide government IT managers through the issues surrounding not only protection of critical systems, but of the priceless and often sensitive information housed on those systems.
"Closing the Disaster Recovery Gap in Government IT"
Nevertheless, a 'disaster recovery gap' remains when desktop and notebook PC workstations upon which most government professionals rely for day-to-day agency or departmental operations continue to be shipped without built-in system and data recovery capabilities. This disaster recovery gap is an ominous problem for government IT administrators, in that over 60 percent of business-critical content and applications reside on employee machines, not on enterprise servers, according to industry experts.
This White Paper is designed to give government IT professionals the information they need to close the disaster recovery gap, with information on modern recovery solutions that provide onboard capabilities for instant-on system and data restoration. The White Paper also includes a checklist of "10 Things to Look For in a Next Generation Recovery Solution."
These White Papers and more can be downloaded from Phoenix.com's thought leadership pages at http://www.phoenix.com/en/About+Phoenix/Thought+Leadership/default.htm
About Phoenix Technologies
Phoenix Technologies develops a complete product suite of Core System Software, tools and applications to deliver trusted, seamless computing to digital devices for an Internet-connected world. Phoenix Technologies helped launch the PC industry nearly 25 years ago. Today the company is extending its leadership and knowledge at the core of machines, beyond the PC to a wide range of platforms and devices.
Phoenix Core System Software has set the standard for the world's leading branded PC OEMs and their global network of supply chain and software partners. Today, Phoenix solutions enable, secure, connect, and recover the world's best-known systems. These solutions are built into the device core, where they are protected from viruses, user errors, hackers, and corruption. Phoenix is headquartered in Milpitas, Calif. (Silicon Valley), with offices in global business and technology centers. For more information, visit www.phoenix.com.
Phoenix, Phoenix Technologies and the Phoenix Technologies logo, and TrustConnector are trademarks and/or registered trademarks of Phoenix Technologies Ltd. All other trademarks are the property of their respective owners.
(1) Scott Berinato and Lorraine Cosgrove, "The State of Information Security 2003," CSO Magazine, October 2003. www.csoonline.com/read/100103/survey.html
--30--EL/sf*
Business Editors/High-Tech Writers
RSA Conference 2005
SAN FRANCISCO--(BUSINESS WIRE)--Feb. 15, 2005--
Despite best efforts by operating system, patch management, and antivirus vendors, digital device vulnerabilities have grown. Malicious coders are more numerous, better organized, and better financed than ever before -- and delivering payloads that are potentially more destructive than ever before.
At the same time, new legislative and regulatory mandates require companies to achieve increasing levels of security. Stockholders vote with their wallets when a denial-of-service attack or a security breach shakes public confidence. Potential customers read about these problems in the business pages of the newspaper, turning to alternative vendors that can guarantee uptime and data security.
To help its customers combat cyber attacks, Phoenix Technologies Ltd. (Nasdaq:PTEC) has delivered three cutting-edge digital device security White Papers designed to aid CIOs and IT Managers in their fight to secure their networks. The three White Papers, "Device-level Security for a Trusted Corporate Network," "Securing Government-Owned Devices and Networks," and "Closing the Disaster Recovery Gap in Government IT," address the increasing security challenges facing the enterprise and government sectors.
These White Papers offer CIOs and IT Managers a call to action to secure the endpoint devices accessing their networks, and to close the widening disaster recovery gap. All new security-focused Phoenix White Papers will be available from Phoenix at the RSA Conference 2005, the largest event for information security professionals, which is being held February 14-18 in San Francisco. Phoenix, an innovator of advanced, built-in security and recovery software technologies that allow users to enable, protect and recover their digital devices, will demonstrate its advanced security software in RSA Conference 2005 booth #440.
"Device-level Security for a Trusted Corporate Network"
In today's volatile security paradigm, simple user authentication is not enough -- because a network is only as secure as the devices that connect to it. Even if you are a known user, accessing the network from an unknown or unmanaged device leaves the network vulnerable to viruses and other malware that may be present on those devices. This White Paper is designed to give CIOs and IT Managers a better understanding of the importance of ensuring that only trusted devices -- devices that comply with the organization's network and security policies -- have access to the network and its resources.
By enabling trust at the device level, companies can protect their digital assets, eliminate human-caused vulnerabilities, and make it much easier to do business securely -- on campus or off. Only by authenticating both the user and the device can enterprises strengthen conventional security solutions to provide true security.
This Phoenix White Paper provides detailed analysis of the benefits of device level security, such as the ability to keep untrusted personal devices off of the network, making digital certificates theft-proof; enabling truly secure VPN access; putting a stop to the forced cycle of security product updates, training and management -- and ultimately, saving money while protecting digital assets.
"Securing Government-Owned Devices and Networks"
The stakes are even higher when you move from the realm of private enterprise to government. In general, government agencies collect more information than the typical business -- and much of that information is extremely sensitive. Government networks are more likely to be targeted for attack -- whether by a disgruntled hacker or a well-funded team of cyberterrorists. Because of the volume, value and vulnerability of information on their networks, governments typically spend much more than businesses for data security. According to a PriceWaterhouseCoopers and CIO Magazine survey of 7,500 IT security officers worldwide, the average organization spends $964 per employee on information security. For government agencies, that figure soars to $1,797 per employee -- placing government at number six on a list of 41 industries in IT security spending.(1)
Government IT professionals in organizations at all levels understand the severe consequences of citizen service interruption if critical digital infrastructure fails due to physical or electronic attacks. To prevent catastrophic systems failure from hostile attacks, government IT leadership has upgraded network security capabilities with advanced firewall, virus protection, intrusion prevention and access control technologies, and implemented regular backup of key server-resident databases. This White Paper helps guide government IT managers through the issues surrounding not only protection of critical systems, but of the priceless and often sensitive information housed on those systems.
"Closing the Disaster Recovery Gap in Government IT"
Nevertheless, a 'disaster recovery gap' remains when desktop and notebook PC workstations upon which most government professionals rely for day-to-day agency or departmental operations continue to be shipped without built-in system and data recovery capabilities. This disaster recovery gap is an ominous problem for government IT administrators, in that over 60 percent of business-critical content and applications reside on employee machines, not on enterprise servers, according to industry experts.
This White Paper is designed to give government IT professionals the information they need to close the disaster recovery gap, with information on modern recovery solutions that provide onboard capabilities for instant-on system and data restoration. The White Paper also includes a checklist of "10 Things to Look For in a Next Generation Recovery Solution."
These White Papers and more can be downloaded from Phoenix.com's thought leadership pages at http://www.phoenix.com/en/About+Phoenix/Thought+Leadership/default.htm
About Phoenix Technologies
Phoenix Technologies develops a complete product suite of Core System Software, tools and applications to deliver trusted, seamless computing to digital devices for an Internet-connected world. Phoenix Technologies helped launch the PC industry nearly 25 years ago. Today the company is extending its leadership and knowledge at the core of machines, beyond the PC to a wide range of platforms and devices.
Phoenix Core System Software has set the standard for the world's leading branded PC OEMs and their global network of supply chain and software partners. Today, Phoenix solutions enable, secure, connect, and recover the world's best-known systems. These solutions are built into the device core, where they are protected from viruses, user errors, hackers, and corruption. Phoenix is headquartered in Milpitas, Calif. (Silicon Valley), with offices in global business and technology centers. For more information, visit www.phoenix.com.
Phoenix, Phoenix Technologies and the Phoenix Technologies logo, and TrustConnector are trademarks and/or registered trademarks of Phoenix Technologies Ltd. All other trademarks are the property of their respective owners.
(1) Scott Berinato and Lorraine Cosgrove, "The State of Information Security 2003," CSO Magazine, October 2003. www.csoonline.com/read/100103/survey.html
--30--EL/sf*
CONTACT: The Hoffman Agency for Phoenix Technologies Melissa Burns, 916-683-9068 mburns@hoffman.com
KEYWORD: CALIFORNIA INDUSTRY KEYWORD: HARDWARE COMPUTERS/ELECTRONICS GOVERNMENT SOFTWARE TRADESHOW SOURCE: Phoenix Technologies
Copyright Business Wire 2005
Der finanzen.at Ratgeber für Aktien!
Wenn Sie mehr über das Thema Aktien erfahren wollen, finden Sie in unserem Ratgeber viele interessante Artikel dazu!
Jetzt informieren!
Wenn Sie mehr über das Thema Aktien erfahren wollen, finden Sie in unserem Ratgeber viele interessante Artikel dazu!
Jetzt informieren!
JETZT DEVISEN-CFDS MIT BIS ZU HEBEL 30 HANDELN
Handeln Sie Devisen-CFDs mit kleinen Spreads. Mit nur 100 € können Sie mit der Wirkung von 3.000 Euro Kapital handeln.
82% der Kleinanlegerkonten verlieren Geld beim CFD-Handel mit diesem Anbieter. Sie sollten überlegen, ob Sie es sich leisten können, das hohe Risiko einzugehen, Ihr Geld zu verlieren.
Nachrichten zu Phoenix Technologies Ltd.mehr Nachrichten
Keine Nachrichten verfügbar. |
Analysen zu Phoenix Technologies Ltd.mehr Analysen
Indizes in diesem Artikel
S&P 600 SmallCap | 935,46 | -0,94% |