Press Releases

SilverSky Named Microsoft Office 365 Syndication Partner

March 12, 2014 Toggle Content

Office 365 Offerings Bolstered by Innovative Email Security Solutions, Industry Specific Compliance Bundles, 100 Percent SLA, and 24/7 High Touch Support

NEW YORK, March 12, 2014 – SilverSky, the leading provider of cloud-based managed security solutions, today announced its partnership with Microsoft Corp., becoming an Office 365 syndication partner. As a trusted reseller of the full Microsoft Office 365 product line, SilverSky offers customers a fully integrated solution, enhancing Office 365’s security and compliance features through its Email Protection Suite.

SilverSky offers Microsoft Office 365 desktop software and cloud services together, offering a complete enterprise solution: Word, Excel, PowerPoint and OneNote are fully integrated with professional email and calendars, unlimited online meetings and webinars, HD videoconferencing, instant messaging and file sharing. Customers across highly regulated industries such as financial services, life sciences and retail can now maximize productivity by working from anywhere, on any device, while being supported by the trusted security and protection services that they demand.

With the addition of customized packages for financial services, life sciences and retail, SilverSky builds on Office 365’s strong security and compliance features to offer one of the most robust cloud-based managed security solutions on the market.  Microsoft Office 365 provides a comprehensive security and compliance solution, offering a wide range of built in capabilities ranging from physical security to encryption at rest and customer controls ranging from E-discovery, Archiving, and Auditing to encryption and DLP. SilverSky further supports industry specific security needs by including pre-loaded email security policy engines and quick-start packs that can be tailored to specific customer needs.

“Microsoft Office 365 partners are essential to providing our customers with the custom solutions they need,” said Aziz Benmalek, General Manager, Partner Hosting and Cloud Services, Microsoft. “SilverSky is a well-known and trusted brand in email security, and are well equipped to deliver a customized Office 365 offering to regulated industries around the world.”

“As a Microsoft syndication partner, we look forward to taking our established, trusted service relationships with our customers to the next level – packaging Office 365 with a comprehensive email protection solution to deliver the applications customers want and the security they need,” said Tim Harvey, CEO, SilverSky. “Together with Microsoft, we are proud to offer our customers the availability, industry expertise and around-the-clock, support from SilverSky’s leading security experts.”

The addition of Office 365 to its robust suite of cloud-based messaging and security solutions enables SilverSky to better serve its growing customer base of more than 6,000 global organizations by offering customers additional services, enhanced functionality and customer support. SilverSky’s expert consultants work with each Office 365 customer to help customize a tailored solution that fits their unique requirements. SilverSky also offers the same personalized service throughout the migration, activation, user training and support process. To learn more about Office 365 from SilverSky, please visit https://www.silversky.com/knowledge-center/data-sheets/office-365-from-silversky or call 1-800-234-2175.

SilverSky Announces Groundbreaking Service for Targeted and Zero-Day Attack Prevention

February 11, 2014 Toggle Content

Utilizes Innovative Techniques to Provide Industry’s Most Up-to-date Protection for Advanced Email-Borne Threats

NEW YORK, NY, February, 11, 2014 – SilverSky, the leading independent provider of cloud-based managed security services, today announced the launch of its Targeted Attack Prevention (TAP) solution. TAP will help customers better prepare for and prevent today’s more sophisticated threats, including targeted attacks, zero-day attacks and advanced persistent threats (APTs). SilverSky’s newest product offering breaks new ground by leveraging leading-edge statistical analysis techniques, static and dynamic analysis, machine learning and innovative sandbox techniques that analyze unknown objects with malware engines while applying advanced techniques to detect and prevent attacks, even without signatures.

“It’s no secret that the bad guys are smarter, better funded and more organized than ever before,” said John Viega, executive vice president of products, strategy and services, SilverSky. “Yesterday’s signature-based approaches and simple content filtering, while still necessary, aren’t enough. Further, they are often deployed out-of-band and, as a result, are detective and not preventative. Our TAP service is deployed in-line with customer email, allowing for a preventative approach.”

SilverSky TAP, part of SilverSky’s Email Protection Services, is a cloud-based service that stops targeted attacks, spear phishing, “longline” phishing, and advanced zero-day exploits without relying on anti-virus signatures, which take time to develop, leaving customers vulnerable in the meantime. In addition to sandboxing, a technique used by other targeted attack solutions, SilverSky TAP uses advanced techniques including statistical analysis, machine learning and static and dynamic analysis to catch attacks that can defeat simple sandboxing.

As part of the broader portfolio of SilverSky Managed Security Services, customers have access to security at all points of the kill chain; providing a rich, in-depth defense strategy that includes web security, employee training, 24/7/365 event monitoring and cross-customer correlation.

According to research from the Online Trust Alliance (OTA) 2014 Data Protection and Breach Readiness Guidein analysis of nearly 500 breaches in the first half of 2013, 89 percent could have been avoided had simple controls and security best practices been implemented. SilverSky aims to use its Targeted Attack Prevention product to help its customers further prepare for these ongoing and increasing outside attacks and add new protections to counter the advancing state of adversaries.

SilverSky’s Targeted Attack Prevention service will be showcased at the RSA Conference (in South Expo booth # 1501). The product is now available for pre-orders and will be generally available in March 2014.

Today the company also announced the expansion of SilverSky Labs and the addition of vulnerability expert, Brandon Edwards as vice president SilverSky Labs. See more information here: https://www.silversky.com/news-and-events/press-releases/SilverSky-Announces-Expanded-Lab-Capabilities-Hire-of-Threat-Prevention-Expert-Brandon-Edwards.

“Traditional zero-day systems are flawed in that they assume that a payload will exhibit detectable behavior in the allotted time-window,” said Brandon Edwards, vice president SilverSky Labs. “With our TAP solution we can help customers adjust protections to prepare for specific and unusual attack scenarios and offer more comprehensive detection techniques.”

SilverSky Announces Expanded Lab Capabilities, Hire of Threat Prevention Expert Brandon Edwards

February 11, 2014 Toggle Content

Uniquely Positioned with Access to Massive Amounts of Transactional Data, Labs to Focus on Vulnerability Research, Attack Simulation and Reverse Engineering of Targeted Threats

NEW YORK, NY, February, 11, 2014 – SilverSky, the leading independent provider of cloud-based managed security services, today announced the expansion of its SilverSky Labs. At the forefront of vulnerability research and analysis, the lab exercises advanced threat research capabilities to share intelligence that benefits the broader market and enhances the SilverSky service suite. Recently hired threat prevention expert Brandon Edwards will lead the talented pool of experts as vice president of SilverSky Labs.

Formerly of Exodus Intelligence, HP TippingPoint ZDI, NASDAQ OMX and McAfee, Edwards is respected as a leading researcher in exploiting vulnerabilities. In addition to his position as adjunct lecturer and content contributor for NYU’s Poly security curriculum, Brandon is a frequent presenter at leading security conferences, and has participated, judged and contributed to numerous Capture-The-Flag competitions. Edwards has found and exploited vulnerabilities in every major operating system and the Java runtime environment.

“Brandon is recognized as one of the top vulnerability researchers in the world. His incredible wealth of expertise will keep SilverSky Labs on the forefront of threat research, providing unparalleled security, knowledge and peace of mind to our customers,” said Tim Harvey, CEO, SilverSky. “Under Edwards’ leadership, our labs team will propel SilverSky toward becoming a one-stop shop for organizations seeking insight and guidance on today’s top threats.”

Through advanced analysis and early detection of threats, SilverSky Labs leverages the technical security expertise of its team to identify problem areas and bolster the product suite to manage all possible exploits and proactively thwart adversaries. As a cloud-based managed security services provider, SilverSky processes nearly 500 million security events a day, and as a secure cloud email provider the company processes more than 50 million emails a day. As a result, SilverSky Labs is uniquely positioned to examine, correlate and analyze a massive transactional data set that other vendors do not. The Labs will leverage that research to apply “Outbreak Intelligence,” preventative rules pushed to customers faster than possible before.

SilverSky Labs’ core functional areas of focus include:

·       Vulnerability Research: leverage massive amounts of customer data points to improve SPAM, virus and zero-day protection
·       Attack Simulation: explore the many ways malicious attacks would occur and build services to prevent those attacks
·       Reverse Engineering of Targeted Threats: backtrack targeted threats to gain unique insight
·       Service Portfolio Enhancements: provide a unique, exploit researcher perspective on SilverSky’s service portfolio; as well as advanced rules, datasets and signatures to improve execution

“The time for upping the ante in vulnerability analysis and threat prevention efforts is now,” said Brandon Edwards, vice president of SilverSky Labs. “I look forward to working with this renowned team of experts to further explore potential risks, and the solutions that will keep threats at bay and further eliminate possible downtime for our customers.”

Today, SilverSky also announced the launch of its Targeted Attack Prevention product, developed in conjunction with SilverSky Labs. TAP provides the industry’s most state-of-the-art techniques to detect and prevent more types of advanced attacks, more precisely than ever before. For more information on Targeted Attack Prevention: https://www.silversky.com/news-and-events/press-releases/SilverSky-Announces-Groundbreaking-Service-for-Targeted-and-Zero-Day-Attack-Prevention.

SilverSky Positioned in the Challengers Quadrant of the Gartner Magic Quadrant for Enterprise Information Archiving

November 14, 2013 Toggle Content

Company Announces Limited Time Offer for Email Continuity and Email Archive Services

SilverSky, the expert cloud provider of information security solutions, today announced that Gartner, Inc. has positioned the company as a Challenger in the newly published Magic Quadrant for Enterprise Information Archiving report1. The company is now offering free data migration as well as one free month of Email Continuity and/or Email Archive services to customers purchasing these services before the end of the year.

“We consider our first appearance in Gartner’s Magic Quadrant as a ‘Challenger’ confirmation of our mission to dramatically simplify how organizations secure their most important information through our advanced Security-as-a-Service platform,” said John Viega, EVP of Products, Strategy and Services, SilverSky. “With numerous Fortune 500 customers, including a single deployment of more than 50,000 archive users, we continue to innovate and execute on our product roadmap to further enhance our market position in the enterprise information archiving space.”

Among the 22 vendors evaluated in the report, SilverSky was listed as a “Challenger.” As noted by Gartner, “They have capable products and can perform well for many enterprises.” Gartner analysts evaluate service providers on their completeness of vision and ability to execute.

Both part of the SilverSky Email Protection Suite, the Email Continuity service eliminates costly business disruption in the event of outages by providing full email redundancy and 24x7 availability, while the Email Archive service securely stores tamper-proof messages and provides customers with enhanced capabilities to perform eDiscovery and compliance archiving for fast message recovery. The new SilverSky limited time offer is available immediately to new and existing qualified customers who do not currently deploy these solutions and will purchase by December 31, 2013. For more information about this offer, please visit: http://web.silversky.com/archive-promo.

For more than 17 years, customers around the world have relied on SilverSky to consistently deliver best-of-breed security solutions that help safeguard their corporate communications while satisfying the world’s most demanding industry regulations and audits. SilverSky’s proven SaaS delivery model enables organizations to simplify administration, avoid expensive integration and significantly reduce support costs.

(1) Gartner, Magic Quadrant for Enterprise Information Archiving, Alan Dayley, Garth Landers, November 5, 2013.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

SilverSky Selects SoftLayer, an IBM Company, to Enable Cloud Based Email Security Services

October 24, 2013 Toggle Content

Selection Boosts Security and Availability of Email and Collaboration Services for Businesses Worldwide

DALLAS, TX--- SoftLayer, an IBM Company, today announced that SilverSky, a leading provider of cloud-based information security and messaging solutions, has chosen SoftLayer to help power its cloud-based email and Email Protection Suite offerings. SilverSky's comprehensive security services, running on SoftLayer's cloud platform and distributed through IBM's global sales channel, will enable businesses around the world to quickly move email workloads and critical information into the cloud in a secure and cost-effective way.

As a provider of cloud-based information security, secure messaging and collaboration services, SilverSky protects $525 billion in customer assets and handles more than 500 million security events each day. SilverSky's growing customer base includes 6,700 organizations around the globe in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors.

SilverSky chose SoftLayer to serve this dynamic set of customers from a more comprehensive infrastructure platform at a lower cost, with significant improvements in SilverSky's ability to scale and customize environments as its business needs grow. The SoftLayer platform empowers SilverSky with state-of-the-art disaster recovery services that ensure automated redundancy and immediate recovery times, providing unparalleled availability and reliability for customers, as well as SLAs of 99.999 percent. With data centers worldwide, SoftLayer gives SilverSky greater opportunity to increase its international presence and reach new markets. In addition, with support from IBM sales and distribution channels, SilverSky can also facilitate even more growth, enabling customers to purchase its services directly from IBM or through SilverSky and its other partners.

"As the lifeblood of business, email represents one of the most critical applications in the cloud today. Choosing SoftLayer enables us to speed adoption and growth of our security and messaging solutions by offering them a simple to use, cloud-based model," said Tim Harvey, CEO of SilverSky. "High availability and uptime is paramount to successful cloud email deployments -- and SoftLayer enables us to provide extensive geo-redundancy, instantaneous disaster recovery capabilities, more aggressive service level agreements and a number of Exchange enhancements to our customers."

A recent independent study commissioned by SilverSky revealed that security decision-makers want to move critical functions, such as email, to the cloud because they expect it will reduce expenditures (67 percent), simplify operations (66 percent) and increase the reliability of business functions (56 percent). However, strong security and privacy concerns continue to inhibit widespread cloud email adoption, far surpassing other barriers. Whether a high-tech start-up with high computational needs for generating content such as video, photos or a small medical clinic that needs to share health records -- companies are seeking out new low-touch and low-cost security offerings.

About IBM Cloud Computing 
IBM is the global leader in cloud with an unmatched portfolio of open cloud solutions that help clients build, rent or tap into cloud capabilities. No other company has the ability to bring together unique industry knowledge and unmatched cloud capabilities, that have already helped more than 20,000 clients around the world. Today, IBM has more than 100 cloud SaaS solutions, 37,000 experts with deep industry knowledge helping clients transform and a network of more than 25 global cloud delivery centers. Since 2007, IBM has invested more than $6 billion in acquisitions to accelerate its cloud initiatives. Most recently IBM acquired SoftLayer with more than 21,000 clients in 140 countries to further build out its IaaS portfolio with an easy and secure on ramp to cloud integrating IBM SmartCloud. For more information about cloud offerings from IBM, visit http://www.ibm.com/smartcloud.

About SoftLayer, an IBM Company 
SoftLayer, an IBM Company, operates a global cloud infrastructure platform built for Internet scale. With 100,000 devices under management, 13 data centers in the United States, Asia and Europe and a global footprint of network points of presence, SoftLayer provides Infrastructure-as-a-Service to leading-edge customers ranging from Web startups to global enterprises. SoftLayer's modular architecture provides unparalleled performance and control, with a full-featured API and sophisticated automation controlling a flexible unified platform that seamlessly spans physical and virtual devices, and a worldwide network for secure, low-latency communications. For more information, please visit softlayer.com.

About SilverSky
SilverSky is the expert provider of cloud security solutions. Born from our success as a managed services provider, our Security-as-a-Service platform delivers cloud-based software and managed services, such as the Email Protection Suite with advanced Data Loss Prevention, theNetwork Protection Suite, and managed email services, that protect critical information simply and cost effectively. By tirelessly safeguarding our customers' most important information, we enable growth-minded leaders to pursue their business ambitions without security worry. Our growing customer base includes 6,700 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit SilverSky.com.

 

 
CONTACT INFORMATION
  • Press Contacts:

    Andre Fuochi
    SoftLayer Technologies
    M: 469-394-7274
    E: Email Contact

    Jill Queenan
    For SilverSky
    T: 781-966-4112
    E: Email Contact

     

 

    SilverSky Announces Limited Time Offer for Advanced Email DLP & Encryption Solutions

    October 15, 2013 Toggle Content

    Powerful SilverSky Email DLP and Email Encryption Solutions Now Available for Free 30-Day Trial

    MILFORD, Conn., October 15, 2013 – SilverSky, the expert cloud provider of information security solutions, today announced a special, 30-day free trial offer of its industry leading Email Data Loss Prevention (DLP) and Email Encryption solutions. As part of the SilverSky Email Protection Suite, Email DLP and Email Encryption support any business email system, including on-premise or hosted Microsoft Exchange, Office 365, and Google Apps for Business. Offered together as a powerful combination or available separately, these easy-to-deploy and use cloud services enable organizations to achieve comprehensive message security without complexity.

    Since implementing SilverSky’s Email DLP and Encryption solutions, San Diego-based Cabrillo Credit Union Chief Technology Officer Frankie Duenas can easily build and enforce granular policies to block, quarantine or automatically encrypt sensitive, inappropriate and risky messages using the tunable policy-driven rules engine in the SilverSky Management Console.

    “By partnering with SilverSky, the use of email encryption has surged by nearly 50 percent, clearly showing that Email DLP is successfully catching sensitive content before it leaves the organization,” said Duenas. “SilverSky’s advanced technology, expert intelligence and superior scale has enabled us to significantly reduce the costs and complexity of email security, allowing my team to focus on continued innovation for Cabrillo’s members.”

    • SilverSky's policy-based Email Encryption solution makes it easy to send encrypted secure email to anyone – regardless of email system. It provides an easy and straightforward tool for senders and recipients to communicate securely without the hassle of managing or remembering encryption keys. With SilverSky’s new Email Encryption Plug-In for Outlook Users, senders can automatically secure a message at the touch of a button, while SilverSky’s filtering engine checks for available rules, custom rules and other policies to which the user is subscribed. The email is encrypted, stored in a secure server and a notification is sent to the recipient(s) that a secure email is available for viewing via a password-protected Web portal.
    • SilverSky’s advanced Email DLP solution provides granular, context-aware policies that filter both inbound and outbound email for threats such as targeted phishing emails and for risks such as inadvertent disclosure of sensitive corporate or customer data via email. Data loss prevention policies and workflow enable flagged emails to be handled in many ways, including being blocked, redirected, quarantined, redacted or encrypted. SilverSky’s unified policy engine allows companies to write single policies that apply to all email security features, while rollup reporting provides enhanced visibility, reduced risk and lower administrative overhead.

    New enhancements to the SilverSky DLP solution allow personal identifiable information (PII) to be redacted from an email after it has been sent, to ensure greater privacy and control. Additionally, a new Manager Quarantine system allows managers to view and take action on quarantined mail for their direct reports – a functionality previously only provided by on-premise DLP products. Enhanced protection capabilities also provide deeper protection against targeted phishing attacks.

    “Email is the lifeblood of business communications, and keeping it secure, compliant and highly available is an increasingly daunting challenge for many organizations,” said John Viega, Executive Vice President, Products, Strategy, and Services, SilverSky. “SilverSky’s cloud-based Email DLP and Email Encryption solutions offer organizations comprehensive message security without the complexity – while breaking new ground in combining ease of use and sophisticated, market-leading capabilities.”

    The 30-day free trial offer is available immediately to new and existing qualified customers. For more information about SilverSky’s limited time offer, please visit: http://web.silversky.com/free-trial.html.

    SilverSky Enhances Email Protection Suite for Microsoft Office 365

    September 25, 2013 Toggle Content

    Delivers Industry’s Most Comprehensive Suite of Email Security Software – Taking the Mailbox to Next Level of Security, Compliance and Reliability 
     
    SilverSky, the expert cloud provider of information security solutions, today introduced an enhanced version of its industry-leading Email Protection Suite (EPS) for Microsoft Office 365. 
     
    “To truly protect your organization’s critical communications, ensuring your email is secure, compliant and highly available at all times is a business imperative,” said John Viega, Executive Vice President of Products, Strategy and Services, SilverSky. “SilverSky’s Email Protection Suite for Office 365 provides users with a robust, bullet-proof suite of advanced security solutions built onto the mailbox for increased assurance and guaranteed 24x7 availability – even when Office 365 is down.”
     
    Dedicated to providing cloud-based email security solutions that simplify how companies protect their data, SilverSky delivers the industry’s most advanced Security-as-a-Service platform to Office 365 users. The SilverSky EPS can be implemented collectively or a la carte, and integrates seamlessly with Office 365. The suite includes the following components, all fully controlled by SilverSky’s Unified Management Console:
     
    • Email Security: SilverSky’s multiple anti-spam and anti-virus engines offer broad and accurate detection and protection. 
    • Email Data Loss Prevention (DLP): The industry’s most powerful and easy-to-use email DLP solution reduces corporate security threats with multi-layered policy libraries, and offers infinitely flexible search algorithms and customizable tuning levels for false-positive reduction or elimination – per individual risk tolerances. 
    • Email Encryption: SilverSky’s intuitive, policy-based and user-level message encryption is fully integrated into the suite for easy, more effective enforcement and protection.
    • Email Archive: SilverSky’s email archiving securely stores messages and provides customers with enhanced capabilities to perform eDiscovery and compliance archiving for fast message recovery. 
    • Email Continuity: SilverSky offers platform redundancy and 24x7 continuity – even when Office 365 is down. 
    For more than 17 years, customers around the world have relied on SilverSky to consistently deliver best-of-breed security solutions that help safeguard their corporate communications while satisfying the world’s most demanding industry regulations and audits. SilverSky’s proven SaaS delivery model enables organizations to simplify administration, avoid expensive integration and significantly reduce support costs. 
     
    For more information about SilverSky’s EPS for Microsoft Office 365, please visit: https://www.silversky.com/solutions/services/email-protection-suite. 
     
    About the Cloud Security Provider, SilverSky
    SilverSky is the expert provider of cloud security solutions. Born from our success as a managed services provider, our Security-as-a-Service platform delivers cloud-based software and managed services, such as the Email Protection Suite with advanced Data Loss Prevention, the Network Protection Suite, and managed email services, that protect critical information simply and cost effectively. By tirelessly safeguarding our customers' most important information, we enable growth-minded leaders to pursue their business ambitions without security worry. Our growing customer base includes 6,700 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit SilverSky.com.
     

    SilverSky Achieves New High in Monthly Recurring Revenue, Notes Continued Momentum in 1H 2013

    August 22, 2013 Toggle Content

    Record Channel Performance and Growth, Ground-Breaking Innovation, Industry Accolades and Global Expansion Key Successful First Half of the Year

    MILFORD, Conn., Aug. 22, 2013 – SilverSky, the expert cloud provider of information security solutions, today announced substantial momentum in making information in the cloud more secure, accessible and compliant, including new highs in monthly recurring revenue (MRR), which grew 14 percent year-over-year for the period ending June 30, while total headcount has increased by double digits.

    “2013 has been a year of unprecedented growth for SilverSky,” said Tim Harvey, CEO, SilverSky. “This continued momentum is a testament to our team’s unwavering focus on three major objectives: escalating sales of our own proven intellectual property, transforming our relationships with our channel partners and making strategic investments in the organization to support our continued growth.”

    Record Channel Performance and Growth
    On the heels of a record-breaking quarter for SilverSky’s channel program, recently named SilverSky channel chief Del Ross and vice president of managed security sales Brian Herman are leading the way as SilverSky transforms its global channel strategy and program and extends its channel services and support offerings throughout the sales process. Newly appointed vice president of sales engineering Steve Faruque is leading the charge in empowering SilverSky partners with enhanced technical pre-sales assistance and support, and placing increased emphasis on rewarding them for performance and commitment. The arrival of these three executives is aimed at supporting current and future partners with expert training, access to an expanding cloud services portfolio and an easy-to-manage sales process through SilverSky’s feature-rich partner portal.

    Strategic Investments and Global Expansion
    SilverSky’s June 2013 acquisition of the Managed Security Services division of StillSecure represents the latest in a series of major investments the company has made in the past four years to develop cloud-based security software, purpose-built to safeguard the information assets of thousands of leading enterprises. StillSecure’s award-winning managed security suite is a natural extension of SilverSky’s industry-leading Managed Security Services portfolio, which combines advanced technology, expert intelligence and superior scale to reduce the costs and complexity of network security, while improving customers’ security posture and easing the compliance burden. 

    Asian markets are red-hot, with companies leapfrogging over the technologies of yesterday and heading straight to the cloud in search of simple, manageable and cost-effective security solutions. To support and manage its growing portfolio of international customers and channel partners in the Asian market, including a large payment processor with more than 1,000 users, SilverSky has opened an Asia-Pacific headquarters in Manila. The Manila office also boasts a new, world-class Security Operations Center (SOC). Richard Dobrow, president, Asia Pacific region and chief compliance officer at SilverSky, will manage the company’s regional sales team across Singapore, Taiwan and Hong Kong.

    Additionally, the company unveiled a second U.S. SOC in 2013, its third SOC location worldwide.  Each month, SilverSky’s SOCs analyze more than 15 billion raw events and more than 14,000 documented security alerts.

    Ground-Breaking Innovation Protects More Than 100,000 Global Users
    Today, SilverSky’s industry-leading, cloud-based Email Data Loss Prevention (DLP) platform, part of the SilverSky Email Protection Suite (EPS), monitors and protects more than 100,000 user email accounts at leading enterprise organizations. With SilverSky's Email DLP solution, CIOs and IT managers can guard against motivated malicious insiders and accidental negligence by employees to greatly reduce corporate security threats. Email DLP breaks new ground in combining ease of use and sophisticated features for companies of all sizes and easily integrates with any email solution, on-premise or in the cloud, including Office 365 and Google Apps.

    Strategic New Hires
    SilverSky recently appointed the following industry veterans to leadership positions within the organization:

    • Mike Dalton, Senior Vice President, Research and Development: An industry veteran hailing from McAfee and Bridgeway Software, Dalton brings executive oversight and leadership to SilverSky’s global technology assets related to software engineering.
    • Del Ross, Vice President of Worldwide Channel Sales: Recognized in 2012 and 2013 as a CRN Magazine “Channel Chief” with more than 20 years of technology and channel sales leadership experience, Ross is responsible for building SilverSky’s highly scalable, global channel partner program.
    • Steve Faruque, Vice President of Sales Engineering: A results oriented, customer-focused technology executive with 14 years’ experience delivering value for Fortune 500 customers, Faruque joins SilverSky from RSA, the security division of EMC. Today, he leads the execution of SilverSky’s product, sales and marketing strategy.
    • Brian Herman, Vice President of Managed Security Sales: Recognized as a 2013 CRN Magazine “Channel Chief,” Herman has more than 15 years’ experience in the information technology industry with a strong focus on IT infrastructure and telecommunications. Herman is responsible for creating, developing and implementing the vision, strategy and execution for SilverSky’s managed security services channel partner sales and development.

    Driving Discussion
    Influencers and end-users alike continue to take notice of the significant market contributions made by SilverSky. The company’s newly launched EPS was featured in the 2013 Gartner Magic Quadrant for Content-Aware Data Loss Prevention. SilverSky was also recognized by the Radicati Group as a ‘Top Player’ in its Cloud Business and Consumer Email Market, 2013-2017 report. The company has also sustained its thought leadership mantel by addressing audiences at several prominent industry events throughout the first half of the year and continuously offering new and fresh content to the industry through its popular Altitude Blog. The company’s newly released report on Email Security Habits examines the perception and reality breakdown of corporate email users at U.S. organizations across a variety of industries. 

    New SilverSky Study Finds Overconfident Employees and Lack of Email Security Tools Lead to Risky Behavior

    July 17, 2013 Toggle Content

    Study shows email security and vehicle driver perceptions are analogous

    MILFORD, Conn., July 17, 2013 – A new study published today by SilverSky, the expert cloud provider of information security solutions, reveals that when it comes to email security in the workplace, 98 percent of employees believe they demonstrate either equally secure or more secure behaviors than their colleagues. SilverSky’s study examines corporate email security habits and perceptions, and is based on an online, quantitative survey conducted in July 2013. Respondents included 119 business professionals at U.S. organizations across a variety of industries.

    Key findings from the study include:

    • Forty-three percent of respondents indicated they were “very concerned about email security and go above and beyond the company prescribed procedures” to protect their business communications. • Thirty percent of respondents claimed to be “much more security conscious” than their co-workers.
    • The majority of respondents (56 percent) have accidently sent an email to the wrong person while at work. Additionally, more than half of employees (53 percent) have received unencrypted, risky corporate data (credit card numbers, social security numbers, etc.) via emails or email attachments.
    • One in five respondents know of someone within their organization who has been caught and reprimanded for sending out sensitive information without adhering to corporate protocol.
    • Many (53 percent) were quick to single out co-workers, saying they’ve received unencrypted, sensitive data – such as sensitive attachments, social security numbers, protected health information and valuable corporate secrets – via email. Yet only 17 percent admitted to sending out this risky data themselves.
    • Only 32 percent of organizations currently use an email data loss prevention (DLP) solution, and even fewer (21 percent) use an email encryption solution. As such, 46 percent of respondents indicated that email security could be improved within their organizations.

    This study points to a strong “superiority bias” effect, or inflated employee overconfidence, when it comes to corporate email security. However, this overconfidence could be potentially dangerous for businesses, as it could lead to poor email security habits, which ultimately lead to real legal, regulatory and reputational risks through data loss.

    “How many times have you been slapped with a speeding ticket in the past year? Now think about how many times you’ve driven over the speed limit in the same time period – my guess is for most of us, that number is significantly higher,” said Andrew Jaquith, Chief Technology Officer and SVP, Cloud Strategy at SilverSky. “The new SilverSky study draws many parallels between email security habits and driving habits. The vast majority of drivers perceive themselves to be attentive, safe operators, but in reality, most speed, eat and talk or text while behind the wheel. Likewise, many employees consider their email security behaviors to be superior to those of their colleagues. However, this hubris is likely to lead to careless behavior that could have serious consequences for the organization.”

    To download the full report and infographic, please visit here.

    To learn more about these new research findings, and to find out what else your employees aren’t telling you about their email security habits, please join SilverSky’s webinar on Thursday, July 18 at 1:00 p.m. ET. Register here for free.

    SilverSky Appoints Channel Chief Del Ross as Vice President of Worldwide Channel Sales

    June 25, 2013 Toggle Content

    Transforming Global Channel Program Primary Objective

    MILFORD, Conn., June 25, 2013 –SilverSky, the expert provider of cloud security solutions, today announced it has named Del Ross vice president of worldwide channel sales. Ross’ arrival supports the transformation and growth of SilverSky’s channel partner program, which enables organizations to market the industry’s most comprehensive set of integrated cloud security, compliance and messaging services as part of their own solutions portfolios.

    “Del brings to SilverSky the proven ability to architect and lead highly successful channel programs and we couldn’t be happier to add him to our management team,” said Tim Harvey, CEO, SilverSky. “His proven expertise in partner-based sales and go-to-market strategies, coupled with his deep relationships within the channel community, will be an invaluable asset to SilverSky as we continue to evaluate the role of our channel program in supporting our company’s growth trajectory.”

    With more than 20 years of technology and channel sales leadership experience, Ross will be responsible for building a highly scalable, global channel program, in which partners are rewarded for performance and commitment and empowered to grow their own businesses.   

    Prior to joining SilverSky, Ross served as vice president of mid-market and channel sales at SugarCRM, where he grew the company’s U.S. channel program by more than 20 percent. Ross was recognized in 2012 and 2013 as a CRN Magazine “Channel Chief,” an honor reserved for the most influential and powerful leaders in the IT channel who are directly responsible for driving channel sales and growth within their organizations, while evangelizing and defending the importance of the channel throughout the entire IT industry. Previously, he served in sales management roles at several leading technology organizations including B4 Consulting (formerly IMG Americas), SAP and Sage Software.

    “Cloud services are transforming the IT and business landscapes, and it’s an exciting time to join the company at the forefront of cloud security innovations and solutions,” said Ross. “I look forward to leveraging my years of channel leadership experience to transform SilverSky’s burgeoning partner program, helping organizations increase their customer engagement and differentiate themselves from the competition through a mutual investment and strong commitment to success.

    Selling SilverSky's cloud security services is a high-profit and high-margin proposition. There are no upfront costs or infrastructure required, so companies can focus on selling top quality services to their customers. For more information, please visit our partner page

    SilverSky Joins North Bridge Venture Partners, GigaOM Research and Industry Collaborators to Unveil Results of 2013 Future of Cloud Computing Survey

    June 19, 2013 Toggle Content

    MILFORD, Conn. – June 19, 2013 – SilverSky, the expert provider of cloud security solutions, today announced its role as a collaborator in releasing the results of the third annual Future of Cloud Computing Survey, conducted by North Bridge Venture Partners, GigaOM Research and supported by 56 other collaborating organizations. This year’s survey is the largest to date, examining viewpoints on drivers, inhibitors and opportunities in cloud computing across a sample of 855 respondents, including business users, IT decision makers and cloud vendors. More than a third of respondents were C-level executives within their organizations.

    Cloud adoption continued to rise in 2013, with 75 percent of those surveyed reporting the use of some sort of cloud platform – up from 67 percent last year. That growth is consistent with forecasts from GigaOM Research, which expects the total worldwide addressable market for cloud computing to reach $158.8B by 2014, an increase of 126.5 percent from 2011.

    This year’s survey finds several important shifts in why and how cloud computing is being used, obstacles to adoption, where cloud decision-making resides within organizations, and how the vendor landscape is changing. It also serves as a barometer for the industry’s progression. Feedback from across the different categories of respondents was consistent, signaling a convergence of vendor and user needs. Further, the survey reveals that business is driving the revolution deriving clear benefits from cloud adoption in the form of continuous innovation and business agility to yield competitive advantage.

    Survey Highlights

    • Business is dominating the use of cloud technology:
      • Organizations average 52 percent current use of applications that advance business priorities, compared with an average 36 percent that use applications that advance IT priorities – underscoring the increasing value placed by organizations on facilitating the delivery of services beyond IT via the cloud
      • Of the 16 cloud application areas tracked (8 business cloud applications and 8 IT cloud applications), 4 business cloud applications (file sharing, business productivity, CRM/marketing and social business/collaboration) are in use by more than half of all organizations, yet not a single IT cloud application is in use by more than half of all organizations
      • Still, going forward respondents stated that 6 out of the top 7 fastest areas of growth in cloud applications will be in IT areas: Big Data, mobile, systems management, backup/DR/BC, helpdesk and security
      • Over two-thirds (68 percent ) see greater migration to the cloud as bringing equal or better total cost of ownership (TCO) to the organization
    • Software-as-a-Service (SaaS) leads but fastest growth is in Infrastructure-as-a-Service (IaaS), which will give way to Platform-as-a-Service (PaaS) in five years:
      • SaaS remains the most popular form of cloud service, used by 63 percent of organizations, up from 55 percent last year
      • However, the fastest growth today is in IaaS, with usage rising from 35 percent to 45 percent, a 29 percent increase over the prior year
      • The top cloud companies cited are brand name, infrastructure players, including Amazon, Microsoft, Google and Rackspace, but 300 companies had less than 2 percent of responses each, indicating that there are a large number of up and coming companies, and no single company has captured all of the momentum
      • Meanwhile, platform-as-a-service (PaaS) is forecast to grow the fastest in the next five years, with 72 percent of respondents expecting to use PaaS in their organization within that time
    • Agility and scalability are the primary drivers for cloud adoption. However, the need for cloud services to support mobility and the ability for continuous innovation to drive competitive advantage through more integrated business processes are all key drivers for the future.
      • More than half of respondents cited business agility (54.5 percent) and scalability (54.3 percent ) as the main drivers
      • Cost is close behind with 48 percent citing it as a driver
      • Mobility is the next major driver with a quarter of the respondents recognizing the that mobility is powered by cloud services
      • And innovation (22 percent) as delivered continuously from the cloud is ultimately leading to competitive advantage (14 percent)
      • Cloud APIs are also cited as important this year as users look to move beyond stove pipe applications to more integrated business services
    • Security is starting to lose its label as the primary inhibitor to cloud adoption as other significant adoption issues arise:
      • Though still the top inhibitor, security is declining year-over-year from 55 percent of respondents in 2012 to only 46 percent in 2013
      • At least as important to security, 46 percent described the management of IT as “more complex” with the growing use of cloud components, reflecting the immaturity of the cloud stack
      • Vendor lock-in (35 percent) and Interoperability (27 percent) continue to weigh on customer’s minds as they look for best of breed choices in the schism between a few large players and the long tail of alternative emerging vendors
      • Reliability (22.3 percent) and complexity (21 percent) were among the top inhibitors, reflecting real world obstacles to an “always-on” services infrastructure
      • Additional inhibitors include regulatory compliance (30 percent) and privacy (26 percent )
      • Cost is up sharply as a perceived barrier – almost 50 percent year-over-year – and is now cited by 28 percent of respondents as all of the above factors weigh in
    • Challenges to IT present opportunity:
      • In response to the inhibitors to cloud adoption, a majority of respondents (55 percent) expect hybrid or multi-cloud providers to emerge to challenge the current cloud ecosystem in the next 2-3 years
      • In five years, more than three-quarters (76 percent) of respondents expect hybrid clouds to be the core of their cloud strategies overtaking public and private clouds
      • Nearly 40 percent of respondents expect to increase their training investment to support a cloud computing expansion in their organization
      • Despite the rise of cost as an inhibitor, surprisingly, more than half (53 percent) of respondents are neither tracking nor recording service costs

    Supporting Quotes:

    Andrew Jaquith, Chief Technology Officer & Senior Vice President Cloud Strategy, SilverSky
    “CIOs are moving their critical workloads to the cloud to cut their costs, simplify their architectures and enable new opportunities. But security has always been a key concern. Customers are essentially entrusting services they can’t do without to someone they don’t know. Fortunately, this year’s survey suggests that cloud vendors have an opportunity to provide more clarity, transparency and assurance about customer data protection than ever before. Customers may find that vendors are doing things better in the cloud than they can in-house. If this is the case, the time to switch is now!”

    Michael Skok, General Partner, North Bridge Venture Partners
    “Clearly, even in the 3rd year of our survey, we're still very early in the cloud-computing revolution. Yet the cloud formations we identified in last year’s survey are clearly on an unstoppable rise. Self-empowered consumers and businesses are taking the lead, and in many instances, regardless of IT. But IT is investing heavily both adapting internal infrastructure and adopting public infrastructure to respond on demand while managing the inevitable issues of compliance and regulation through hybrid approaches. And to realize the promise of the cloud, there is a clear call for the industry as a whole to help reduce complexity, and provide better interoperability.”

    Describing a vision of Bring Your Own Cloud services (BYOC) and the new reality of what Skok calls “Boundary-less” computing and “Out-servicing” he continued:
    “Cloud services are being adopted and used in a “boundary-less” way where users are seamlessly integrating them at home and work across all their devices. And in an increasingly mobile pattern of business today companies are compelled to accept and adopt this BYOC model. In fact businesses themselves are adopting the boundary-less approach as they look to disintermediate and squeeze money from their value chains, focus on their core competencies and “out-service” (outsource non-core services) via the cloud. With all this in mind they are looking to gain competitive advantage from a core benefit of the cloud, namely continuous innovation by passing it along to their customers in the form of faster time to market and responsiveness to market needs.” (For more including industry predictions, see blog post.)

    David Card, Vice President of Research, GigaOM
    "Technology buyers expect cloud adoption will make managing IT increasingly complex, yet the plurality also expect overall better cost of ownership. That's either wishful thinking or an intriguing opportunity for suppliers and systems integrators."

    Supporting Links:
    Survey Results
    Survey Results Blog
    Twitter

    SilverSky to Acquire StillSecure’s Managed Security Services Business

    June 5, 2013 Toggle Content

    MILFORD, Conn., June 5, 2013 SilverSky, the expert provider of cloud security solutions, announced today it has acquired the Managed Security Services division of StillSecure, a Colorado-based managed security services and certified compliance provider. This acquisition is the latest in a series of major investments SilverSky has made in the past four years to develop cloud-based security software, purpose-built to safeguard the information assets of thousands of leading enterprises.

    StillSecure’s award-winning managed security suite is a natural extension of SilverSky’s industry-leading Managed Security Services portfolio, which combines advanced technology, expert intelligence and superior scale to reduce the costs and complexity of network security, while improving customers’ security posture and easing the compliance burden. The Managed Security Services portfolio, along with SilverSky’s cloud email and email security solutions, are key components of the company’s charter to secure their customers’ most important information.

    With the addition of StillSecure’s technology portfolio, security analysts and engineers, SilverSky can provide its fast-growing customer base with an enhanced suite of cloud-based offerings – including a new Log Archiving solution and Web Application Firewall service. This robust suite offers a complete solution for customers seeking to protect their most important information, and enables growth-minded business leaders to pursue their business ambitions without security worry.

    SilverSky will continue to fully support StillSecure customers and channel partners, providing them full access to its comprehensive portfolio of software and managed services. StillSecure customers and partners will also benefit from SilverSky’s unmatched scalability, its widely acclaimed Security Operations Center (SOC) and its world-class team of expert security professionals and practitioners.

    “StillSecure’s world-class team, innovative technologies and services fit perfectly into SilverSky’s portfolio and existing customers of both companies stand to benefit greatly through this acquisition,” said Tim Harvey, CEO, SilverSky. “This deal allows us to further realize our strategic objectives for expanding our product portfolio and broadening our domain expertise to further assist our customers and partners.”

    Each day, SilverSky protects $525 billion in customer assets and analyzes 500 million security events with global reach for more than 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. All SilverSky solutions are served on a world-class, carrier grade cloud platform that has been audited to the industry’s highest security standards. For more, please visit www.SilverSky.com, or the SilverSky Altitude Blog.

    About the Cloud Security Solutions Provider, SilverSky
    SilverSky is the expert provider of cloud security solutions. Born from our success as a managed services provider, our Security-as-a-Service platform delivers cloud-based software and managed services that protect critical information simply and cost effectively. By tirelessly safeguarding our customers’ most important information, we enable growth-minded leaders to pursue their business ambitions without security worry. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit www.SilverSky.com

     

    SilverSky Joins NetApp Service Provider Partner Program

    April 30, 2013 Toggle Content

    Customers Gain Seamless Migration to the Cloud with SilverSky and NetApp

    MILFORD, Conn.April 30, 2013 /PRNewswire/ -- SilverSky, the expert cloud provider of messaging and information security solutions, today announced that it has joined the NetApp Partner Program for Service Providers.

    The NetApp Partner Program for Service Providers brings together NetApp and world-class service providers to deliver cloud-based solutions that address customers' needs. With NetApp, SilverSky is able to bring its differentiated messaging and email services to market faster. Additionally, in collaboration with NetApp, SilverSky can provide end users with a one-stop shop for their unique data storage needs — on-premise, cloud-based or a hybrid environment of the two.

    By joining the NetApp® Partner Program, SilverSky becomes part of an industry-leading ecosystem of products and services. NetApp customers can access a wide spectrum of SilverSky services focused on corporate email to help them store, protect and meet data compliance standards.

    In collaboration with NetApp, SilverSky delivers comprehensive email security and network security services that protect critical information simply and cost effectively. A comprehensive software-as-a-service (SaaS) solution, SilverSky helps customers safeguard information in their networks through critical services such as vulnerability managementWeb securitylog managementmobile device management and brand protection.

    "SilverSky technology will allow NetApp users to enjoy all the benefits of storing their data in the cloud while eliminating the number one concern of most users: security," said Randal Skipper , executive vice president, Global Sales, SilverSky. "Our mission is to remove the uncertainty that can accompany a move to the cloud and ensure that the user receives unparalleled security protection while realizing the many benefits and flexibility afforded by the cloud."

    "SilverSky is one of the innovative organizations in NetApp's expanding partner program ecosystem," said Jon Mellon , vice president and general manager, Service Provider Partners, NetApp. "Our collaboration with SilverSky enables the seamless migration of data to the cloud which can be continuously and easily managed through NetApp's advanced architecture."

    For more information, please visit https://www.silversky.com/.

    About the Cloud Security Provider, SilverSky
    SilverSky is the expert provider of cloud messaging & security solutions. Born from our success as a managed services provider with 10+ years experience & 2M+ cloud-based email users under management, our Security-as-a-Service platform delivers cloud-based software and managed services that protect critical information simply and cost effectively. By tirelessly safeguarding our customers' most important information, we enable growth-minded leaders to pursue their business ambitions without security worry. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit www.SilverSky.com.

    NetApp, the NetApp logo, and Go further, faster are trademarks or registered trademarks of NetApp, Inc. in the United Statesand/or other countries.

    Independent Analysis Projects U.S. Bank Will Realize 304% ROI with SilverSky's Network Security Solutions

    April 25, 2013 Toggle Content

    MILFORD, Conn.April 25, 2013 /PRNewswire/ -- SilverSky, the expert provider of cloud security solutions, today announced the exciting results of a commissioned study conducted by Forrester Consulting on behalf of SilverSky. The study projects that one of SilverSky's customers, a U.S. community bank with $750M in assets, 12 branches and approximately 120 employees, will realize a return on investment (ROI) of 304 percent over a three year period by using SilverSky's network security solutions.

    According to The Total Economic Impact™ Of SilverSky Network Security Solutions study*, "By implementing SilverSky network security services, the community bank meaningfully improved its network security while increasing the overall productivity of the IT organization and avoiding costs that would have resulted had the company continued to use an in-house approach to network security. The organization also gained valuable reassurance that its network was being monitored 24x7x365 by a team of network security experts with the capacity to respond quickly and effectively to network security threats, a paradigm that would have been extremely costly and complex for the organization to manage on its own."

    Prior to engaging SilverSky, the bank relied on out-of-the-box security products and managed its network security using an in-house approach. However, after a significant expansion and suffering a security breach, the bank's management recognized the critical need to reduce costs and complexity and improve network security. To accomplish this, the bank implemented SilverSky's cloud security solutions – including its Managed Security ServicesNetwork Protection Software, and Professional Services.

    Forrester Consulting's study identifies the following five key benefits of SilverSky's network security services based on in-depth interviews with the SilverSky customer: 

    • Reduced IT staff hiring costs: The bank improved its ability to execute network security tasks using SilverSky's robust, automated cloud solutions, while significantly reducing its need to hire additional in-house IT personnel. The study projects that reduced hiring costs will save the bank $652,138 over a three year period.
    • Improved IT staff productivity: With SilverSky, the bank conducted network security tasks more efficiently and with a higher degree of reliability, boosting staff productivity and reducing man-hours by 12 to 25 hours per week.
    • Decreased security incident remediation costs: SilverSky's solutions helped the bank prevent three potential security breaches in 2012, saving the customer an estimated $104,550 in remediation and downtime costs in the first year of the contract alone.
    • Eliminated point solution licensing and management costs: Following the SilverSky implementation, the bank eliminated several network security point solutions, leading to savings from previous licensing/maintenance expenses and streamlined vendor management.
    • Decreased support costs for compliance and audits: SilverSky's compliance expertise and audit-ready reporting helped the bank reduce time spent on compliance-related activities by 60 percent for its CISO and 50 percent for its IT staff.

    "SilverSky's solutions provide value to our customers by reducing costs and complexity, improving network security and reducing the compliance burden," says Andrew Jaquith , chief technology officer at SilverSky. "I believe that this study, using data from a current customer, shows our value proposition in action and will help potential customers understand how they can benefit from SilverSky's network security solutions."

    In the Forrester Consulting study, a senior IT manager at the bank describes, "After contacting SilverSky, speaking with them, and seeing a demo of their solutions, we were sold right off the bat. We were already familiar with competitors' products, knew what they'd offer and had a good handle on their pricing structures; we knew others weren't going to provide everything SilverSky had to offer."

    To download a free copy of the case study, please visit here.

    *"The Total Economic Impact™ Of SilverSky Network Security Solutions," Forrester Consulting, March 2013 (a commissioned study conducted on behalf of SilverSky)

    **Based on a Three-Year Risk-Adjusted ROI

    SilverSky Enables K-12 Schools to Consider Email and Data Protection Services with E-Rate Funds

    March 5, 2013 Toggle Content

    Flexible, Reliable and Secure Cloud Services from SilverSky Up To 90 Percent off in USAC E-Rate Program

    MILFORD, Conn., March 5, 2013 -- SilverSky, the expert cloud provider of information security solutions, today announced its support for the Universal Service Administrative Company's (USAC) E-Rate government funding for telecommunications and Internet services. The rapid pace of change in security technology, coupled with the alarming number of information security breaches, highlight the need to truly protect intellectual property. Cyber threats are rising steadily and are continuing to increase in both frequency and sophistication. Email services, data protection and firewall solutions from SilverSky represent the next generation of security and are being discounted up to 90 percent for eligible schools, libraries and consortia through the program.

    "The USAC E-Rate program represents a tremendous opportunity for school systems to upgrade their technical capabilities and allow students and faculty to freely correspond via email," said Randal Skipper , EVP, SilverSky. "Establishing best practices for email security is a key consideration for schools at every level as educators need to have confidence that email communications will be kept private and secure. This is where SilverSky can assist them greatly."

    Email is often regarded as the most critical business service; therefore, keeping it secure is among the highest priorities along with compliance, availability and performance. As a premier provider of cloud security solutions, SilverSky technology and services are available to eligible participants in the USAC program and will deliver the utmost value for K-12 schools and libraries seeking email security and data protection.

    SilverSky's hosted Microsoft Exchange service and SilverSky's Firewall Management solution are both eligible for funding as part of the program. SilverSky provides enterprise-class, highly secure hosted Exchange, along with a the industry's most comprehensive Email Protection Suite featuring advanced anti-virus/anti-spam, email DLP, encryption and compliance archiving. SilverSky's Firewall Management solution is the first line of defense for your network, supported by 24x7 technical support and a team of security experts to analyze and prevent threats in real time.

    Eligible parties have until March 14, 2013 to choose an E-Rate service provider. For more information, please contact info@silversky.com.

    About SilverSky
    SilverSky is the expert provider of cloud security solutions. Born from our success as a managed services provider, our Security-as-a-Service platform delivers cloud-based software and managed services that protect critical information simply and cost effectively. By tirelessly safeguarding our customers' most important information, we enable growth-minded leaders to pursue their business ambitions without security worry. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit SilverSky.com.

    SilverSky to Showcase Industry's Only Advanced Security-as-a-Service Platform and Newly Launched Email Protection Suite at RSA Conference

    February 21, 2013 Toggle Content

    MILFORD, Conn., February 21, 2013 – SilverSky, the expert cloud provider of information security solutions, today announced that it will showcase its advanced security-as-a-service platform from the cloud at RSA Conference 2013. Additionally, John Viega, best-selling security author and executive vice president of products, strategy and services at SilverSky, will be featured on a panel titled, “Software Security: A Waste of Time, ” and Andrew Jaquith, chief technology officer and noted author, will be featured in a debate titled, “Internet Gun Control - Are Pentesting Tools Good or Evil?”

    SilverSky will host RSA attendees in booth #149 in the Moscone Convention Center for a series of innovative demonstrations and discussions. Attendees can experience:

    • The industry’s only advanced security-as-a-service platform, which makes the cloud simple, manageable and cost-effective. SilverSky manages, secures and monitors organizations’ vital information assets with a comprehensive portfolio of software and managed services, delivered through this unified policy-aware platform.
    • SilverSky's Email Protection Suite (EPS), which delivers a complete, fully integrated suite of email security solutions, featuring advanced DLP, email archiving, email continuity and AV/AS and encryption. SilverSky’s EPS is built on a single cloud management platform, providing unified security and control over both inbound and outbound corporate messaging.

    RSA attendees can also preview newly released data from a survey of U.S. CIOs that reveals a dramatic surge in cloud confidence over the past 12 months, yet points to overarching security concerns that continue to inhibit widespread cloud adoption.

    Additionally, attendees are also invited to a cocktail reception, hosted by SilverSky, at B Restaurant & Bar on Wednesday, February 27, from 6:00 – 9:00 p.m. PST.

    An oft-cited application security authority, author of numerous security books – including the seminal Building Secure Software – and former McAfee CTO, SilverSky’s John Viega will participate in a panel discussion, “Software Security: A Waste of Time,” on whether or not it’s important to fix every bug. So is it worth it, or not? Find out during this presentation, which will take place on Wednesday, February 27, at 9:20 a.m., in room 132 at the Moscone Convention Center.

    A recognized authority on data, endpoint and mobile security topics, Andrew Jaquith is chief technology officer and senior vice president at SilverSky. The top-rated RSA Conference speaker was previously a senior analyst with Forrester Research. At this year's RSA Conference, Jaquith will share his perspective on the rise of penetration testing tools, and whether the benefits of such tools outweigh their detriments in a debate, “Internet Gun Control - Are Pentesting Tools Good or Evil?” This will take place on Tuesday, February 26, at noon in the Security Theater – Expo (Gateway 102/103/104) at the Moscone Convention Center.

    The RSA Conference continually evolves program offerings to meet the ever-changing needs of delegates in the dynamic information security industry. The conference will be held February 25 – March 1, 2013 at the Moscone Convention Center in San Francisco. To schedule a one-on-one meeting with SilverSky experts during RSA Conference 2013, please call 781-966-4112.

    SilverSky's Independent Study Reveals Dramatic Surge in Cloud Confidence and Adoption, but Cloud Security Concerns Continue to Dominate

    February 20, 2013 Toggle Content

    One quarter of all business functions currently in the cloud; security and privacy concerns underscore critical need for vendor transparency, clarity and assurance

    MILFORD, Conn., Feb. 20, 2013 /PRNewswire/ -- SilverSky, the expert cloud provider of information security solutions, today revealed findings of an independently commissioned study which examines key drivers of – and barriers to – cloud adoption. The study reveals that as a whole, companies are much more confident in the cloud than they were 12 months ago, yet security and privacy concerns continue to hold many back from widespread adoption.

    Two hundred U.S. chief information officers and senior level security decision-makers were surveyed in the company's new "Silver Lining Report." Nearly all (97 percent) of survey respondents indicate their confidence level in the cloud has either increased or stayed the same in the past 12 months. On average, respondents have moved one-quarter of all their business functions and services to the cloud, the most popular being e-Commerce (41 percent), closely followed by email (39 percent) and storage (30 percent). Many respondents have plans to migrate additional applications within the next 12 months, particularly storage and e-Commerce (both 16 percent) and middleware/infrastructure (14 percent). However, traditional back-office functions such as finance and accounting and procurement applications show no upward movement.

    Surveyed executives want to move more functions and services to the cloud because they expect it will reduce expenditures (67 percent), simplify operations (66 percent) and increase the reliability of business functions (56 percent). However, 74 percent of respondents harbor strong concerns around privacy and security, and for some, these concerns outweigh benefit expectations. Although the percentage of executives that are enthusiastic about cloud services is fairly high (28 percent), they are outnumbered by the skeptics (39 percent).

    Though cost is noted as the number one driver for cloud adoption, 38 percent of respondents indicate that cost is also an inhibitor. Additionally, one out of every two executives surveyed are currently unsure whether cloud-based services will cut internal support costs, or add to them. However, based on migration trends revealed in this study, SilverSky expects 2013 to represent a tipping point for assessing the financial benefits of cloud adoption.

    When it comes to cloud vendor evaluation, survey data shows that influencers sway short lists, especially recommendations from analysts (52 percent) and colleagues (64 percent); but ultimately, personal research trumps all at 76 percent. Vendor commitment is also critical in the evaluation process. Once organizations decide to migrate to the cloud, they look at three primary determining factors when evaluating potential cloud partners: assurance that the vendor can commit to stringent service level agreement (SLA) guidelines (43 percent), assurance that the vendor can migrate their employees efficiently (41 percent) and assurance that third parties can vouch for the provider's security (39 percent).

    "Moving to the cloud should be career-defining, not career-limiting," said Andrew Jaquith , CTO, SilverSky. "When CIOs and security decision-makers move their critical workloads to the cloud, they seek providers that cut their costs, simplify their architectures and protect their data. But equally important, they are making a leap of faith by entrusting services they can't do without to someone they don't know. The data in the Silver Lining Report show us why transparency, clarity and assurance are so essential."

    To download the entire report and infographic, please visit here.

    Methodology
    SilverSky's "Silver Lining Report" is based on an online, quantitative market research study commissioned by SilverSky and conducted by independent research firm ResearchNow in late 2012. Respondents included 200 CIOs and senior-level security decision-makers (171 chief information officers and 29 chief technology officers) at U.S. organizations. Respondents came from 17 verticals, with 62 percent from four industries: manufacturing, professional services, information services and financial services. Most respondents were enterprise (36 percent) and midsize (39 percent) IT decision-makers.

    About the Cloud Security Provider, SilverSky
    SilverSky is the expert provider of cloud security solutions. Born from our success as a managed services provider, our Security-as-a-Service platform delivers cloud-based software and managed services that protect critical information simply and cost effectively. By tirelessly safeguarding our customers' most important information, we enable growth-minded leaders to pursue their business ambitions without security worry. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit SilverSky.com.

    SilverSky to Recruit New Email DLP Channel Partners at 2013 Parallels Summit

    February 4, 2013 Toggle Content

    SilverSky's New Email Protection Suite Now Available as White-Label Solution for Managed Services Providers

    MILFORD, Conn.Feb. 4, 2013 /PRNewswire/ -- SilverSky, the expert cloud provider of information security solutions, today announced company executives will attend the 2013 Parallels Summit on February 4 - 6 in Las Vegas, and will be actively recruiting new channel partners to market SilverSky's expanded cloud security services – including the company's brand new comprehensive Email Protection Suite (EPS) – as part of their own solutions portfolios.

     

    SilverSky's Email Protection Suite (EPS) is fully integrated and built on a single cloud management platform, providing unified security and control over both inbound and outbound corporate messaging.

    SilverSky partners have access to the SilverSky Management Console, the hub for SilverSky's comprehensive EPS that provides anti-virus and anti-spam security, best-in-class email business continuity, compliance archiving, email encryption and a fully integrated, email data loss prevention (DLP) service, which offers content-aware policies normally reserved for standalone enterprise DLP solutions. SilverSky's email DLP is fully integrated into the suite, and the unified policy engine allows companies to write single policies that apply to all email security features, while rollup reporting provides enhanced visibility, reduced risk and lower administrative overhead. With access to SilverSky's powerful Web-based management console, partners have SilverSky's robust cloud services at their fingertips, streamlining deployment, management and customer support.

     

    "SilverSky's broad suite of differentiated services – from integrated cloud security to compliance and messaging services – provide our partner organizations with a one-stop-shop for their customers' email security needs," said Tim Harvey, CEO, SilverSky. "Our Web-based SilverSky management console is fully partner-enabled, providing reseller partners with valuable insights into their own customers and service usage trends. This deeper customer engagement empowers reseller organizations to continuously enhance their own services and differentiate themselves from the competition."

     

    Selling SilverSky's cloud security services is a high-profit and high-margin proposition. There are no upfront costs or infrastructure required, so companies can focus on selling top quality services to their customers. SilverSky offers two partner programs: reseller and referral. For more information, please visit: https://www.silversky.com/about-us/partners.

     

    About SilverSky

     

    SilverSky is the expert provider of cloud security solutions. Born from our success as a managed services provider, our Security-as-a-Service platform delivers cloud-based software and managed services that protect critical information simply and cost effectively. By tirelessly safeguarding our customers' most important information, we enable growth-minded leaders to pursue their business ambitions without security worry. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit SilverSky.com.

    SilverSky Announces Industry’s Most Comprehensive Email Protection Suite

    January 31, 2013 Toggle Content

    Fully Integrated Suite Features Most Advanced Data Loss Prevention Solution for Email

    MILFORD, Conn., January 31, 2013 – SilverSky, the expert cloud provider of information security solutions, today announced the industry’s most advanced family of email security software. SilverSky’s Email Protection Suite (EPS) is fully integrated and built on a single cloud management platform, providing organizations with unified security and control over both inbound and outbound corporate messaging. SilverSky’s flagship email data loss prevention (DLP) solution offers content-aware policies normally reserved for standalone enterprise DLP solutions. Email DLP is fully integrated into the suite, and the unified policy engine allows companies to write single policies that apply to all email security features, while rollup reporting provides enhanced visibility, reduced risk and lower administrative overhead.

    This new offering is being announced in tandem with the launch of SilverSky, announced separately. (See separate release here: Introducing SilverSky: Perimeter E-Security and USA.NET Unify Brands and Launch Industry’s Only Advanced Security-as-a-Service Platform).

    SilverSky has invested millions of dollars into developing email security software that is purpose-built to safeguard corporate communications of thousands of large enterprises and highly regulated businesses. Its heritage as the industry’s most trusted managed services provider has enabled SilverSky to develop software and implement controls that satisfy the world’s most demanding industry regulations and audits. The company is making this formerly exclusive security software available to any organization or partner as a single, unified, comprehensive and easy to use software-as-a-service solution.

    “To meet the exceedingly high security standards that our heavily regulated and enterprise customers demand, we had to build out the stack of email security software that was better than any commercial alternative,” said Tim Harvey, CEO, SilverSky. “We are excited to make this innovative technology available as a standalone software-as-a-service offering.”

    While strong oversight of inbound messaging is important, strict control of outbound messaging is critical, especially in today’s Bring Your Own Device (BYOD) era. The SilverSky platform delivers a complete, fully integrated suite of email security solutions, including advanced DLP, email archiving, email continuity and AV/AS and encryption. In addition, deep integration with external IP stores for superior data risk reduction and alignment with highly regulated infrastructure and policies are included in the platform.

    “At Farmers, we have highly customized policy requirements that track the flow of sensitive email with zero tolerance for business disruption,” said Rod Chamberlin, AVP, eBusiness/AIMS, Farmers Insurance Group, a SilverSky customer. “We picked SilverSky’s Email DLP based on scalability, functionality, integration and financial impact. It was simply the best choice for us.”

    SilverSky’s single policy engine makes it easy to write one policy across all services based on any message data or metadata – even third party services. The basic content control allows customers to block critical outbound information such as credit cards and social security numbers, while its leading DLP technology allows for fine-grained actions that ensure the industry’s highest level of data protection.  Advanced analysis features like content-aware fingerprinting and proximity checking, full redaction capabilities and the ability to test policies before deploying them, usually reserved for standalone, enterprise solutions, are now available to secure email.

    “When it comes to security, companies often spend too much time concerned with incoming traffic and protecting themselves against viruses, worms and botnets. While those things are important, it’s the critical information flowing out of your organization that represents the greatest risk,” said John Viega, executive vice president, SilverSky. “Our email DLP technology is a quantum leap over the one-dimensional channel DLP and content filtering solutions, and it protects confidential information, while our extraordinarily flexible definition framework matches the exact risk appetite and tolerance for business disruption of each individual organization.”

    About SilverSky
    SilverSky is the expert provider of cloud security solutions. Born from our success as a managed services provider, our Security-as-a-Service platform delivers cloud-based software and managed services that protect critical information simply and cost effectively. By tirelessly safeguarding our customers’ most important information, we enable growth-minded leaders to pursue their business ambitions without security worry. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit SilverSky.com.

    CONTACT: Jill Queenan, InkHouse Media + Marketing, For SilverSky, +1-781-966-4112, jill@inkhouse.com

    Introducing SilverSky

    January 31, 2013 Toggle Content

    Perimeter E-Security and USA.NET Unify Brands and Launch Industry’s Only Advanced Security-as-a-Service Platform

    MILFORD, Conn., January 31, 2013 – SilverSky, the expert cloud provider of information security solutions, launched today, combining the assets of Perimeter E-Security and USA.NET into a unified brand focused on delivering the industry’s only advanced security-as-a-service platform. SilverSky manages, secures and monitors customers’ vital information assets with a comprehensive portfolio of software and managed services, delivered through its unified policy-aware platform. (See separate release titled: SilverSky Announces Industry’s Most Comprehensive Email Protection Suite).

    Led by some of the market’s foremost security pioneers, including key leaders from McAfee, XAware, Symantec/MessageLabs, Verdasys, @Stake and Forrester Research and backed by respected investors including Goldman Sachs and Bessemer Ventures, SilverSky has mobilized to realize the promise of cloud security solutions – simple, manageable, cost-effective. The company has invested more than $20 million in the past four years to develop cloud-based security software, purpose-built to safeguard the information assets of thousands of leading enterprises and regulated businesses, while satisfying the most demanding regulations and audit standards.

    “SilverSky is the culmination of the innovative technology, industry leading business email and proven managed security services we have delivered to market for years with our carrier-class software platform,” said Tim Harvey, CEO, SilverSky. “As SilverSky, our strategy is to unbundle our previously exclusive software to make it available to every customer organization. We believe this is a game changer – and will enable growth-minded leaders to pursue their business ambitions by providing true IP loss prevention to minimize security concerns.”

    SilverSky is offering a complete solution for customers seeking to protect their most important information:

    • Email Protection Suite: A comprehensive software-as-a-service (SaaS) solution for safeguarding organizations’ most important information asset: email. Key features of SilverSky EPS include email archive (personal and compliance editions), email continuity, email encryption, email security, and email DLP, a new advanced data loss prevention solution announced today.
    • Network Protection Suite: A comprehensive software-as-a-service (SaaS) solution that helps customers safeguard critical information in their network. Key services include vulnerability management, Web security, log management, mobile device management, and brand protection.
    • Managed Application Services: SilverSky manages critical communications, such as email, with a comprehensive set of cloud services, including Microsoft Exchange, Lync and SharePoint, SilverSky Mail – SilverSky’s proprietary mail service – and managed policy definition services.
    • Managed Security Services: A comprehensive suite of managed security solutions and services, 24x7x365 event monitoring and response, managed firewall, IDS/IPS, and VPN remote user access.

    Each day, SilverSky protects $525 billion in customer assets and 500 million security events for more than 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. All SilverSky services are hosted within the United States on a world-class, carrier grade cloud platform that has been audited to the industry’s highest security standards. For more, please visit www.SilverSky.com, or the SilverSky Altitude Blog.

    About SilverSky
    SilverSky is the expert provider of cloud security solutions. Born from our success as a managed services provider, our Security-as-a-Service platform delivers cloud-based software and managed services that protect critical information simply and cost effectively. By tirelessly safeguarding our customers’ most important information, we enable growth-minded leaders to pursue their business ambitions without security worry. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit SilverSky.com.

    CONTACT: Jill Queenan, InkHouse Media + Marketing, For SilverSky, +1-781-966-4112, jill@inkhouse.com

    Perimeter E-Security Announces Cloud Mobile Device Management

    September 27, 2012 Toggle Content

    Provides CIOs with Device and Application Management, Prescriptive Policy Guidance, Compliance Reporting and Bring-Your-Own-Device (BYOD) Kit

    Milford, CT, September 27, 2012Perimeter E-Security, the leading provider of secure cloud services, today announced that it has added Mobile Device Management (MDM) technology to its broad portfolio of secure messaging and network security services. With Perimeter’s new Cloud MDM service, CIOs can protect company data on all employee-owned and company-issued smartphones and tablets for best-in-class security and compliance. Cloud MDM also features a unique Bring-Your-Own-Device Kit to help companies of all sizes successfully manage the risks associated with employee-owned devices.

    "Formal BYOD programs are a relatively new but fast-growing phenomenon. In 2009, it was typical to see no BYOD program whatsoever in business, even though there has always been a substantial amount of 'stealth' use of personal devices. But now, formal programs supported by IT are rapidly gaining steam. In a 2011 study, we found that, on average, U.S. CIOs expect 38 percent of their workforce to use personal devices at work by the end of 2012." [Gartner, "Bring Your Own Device: New Opportunities, New Challenges," David A. Willis, August 16, 2012.]

    Perimeter’s Cloud MDM service features industry-leading technology powered by AirWatch LLC, best practice security policies and complete integration with Perimeter email and other services. Company IT departments can enforce corporate policy across multiple device types, push configuration profiles and security policies, manage mobile applications, reduce the cost and effort of device deployments, increase IT efficiencies and response times and remotely wipe lost or stolen devices.

    "Enterprise CIOs want to take advantage of new mobile opportunities, but unlike desktop computing, with mobile, CIOs must navigate a minefield. Diverse operating systems, hundreds of devices of suspect provenance, privacy concerns and new ownership models make it impossible to know how to keep company data secure,” said Andrew Jaquith, CTO, Perimeter E-Security. “Perimeter’s new Cloud MDM simplifies the complex security and policy choices enterprises must make. Instead of giving customers a 'me-too' technology solution that leaves the messy security, policy and privacy details up them, Cloud MDM provides a prescriptive solution that includes zero-configuration best practice security policies, a BYOD Kit, privacy controls and complete email integration right out of the box. We’ve brought everything we've learned in more than 15 years of managing hundreds of thousands of mobile devices to Cloud MDM. With our service, companies can secure all of their mobile devices — and implement a safe, secure and legal BYOD program — in just a few hours."

    The most comprehensive, customizable and feature-rich MDM solution in the industry, Perimeter E-Security’s Cloud MDM offers:

    • Industry-leading MDM Platform: A complete device, application and content management solution for iOS, Android, BlackBerry, Windows Phone, Symbian and Windows Mobile devices, powered by AirWatch technology. Hundreds of controls allow administrators to configure email, wireless, security and other details.
    • Pre-configured Policies: Tested, best-practice data protection policies include bi-level, standards-aligned passcode polices; encryption enforcement; and carefully tuned device policies for Android and iOS. Customers can use these as-is by default or extend them as needed.
    • Complete Email Integration: Fully integrated with Perimeter’s hosted Exchange service so that mobile devices are configured for email automatically, eliminating end-user hassles and administrator support tickets.
    • Bring-Your-Own-Device (BYOD) Kit: Includes a Model Acceptable Use Policy and accompanying policy guidance, co-developed in partnership with international law firm Proskauer Rose LLP, designed to help companies implement and manage the risks of employee-owned BYOD device programs.
    • Privacy Protection: Limits the collection of personally identifiable information (PII), reducing privacy exposures while aligning with EU and U.S. local, state and federal privacy laws. Administrators can wipe devices clean, or wipe only enterprise managed data and settings, while leaving personal information intact.
    • Compliance: Built-in passcode policies align with U.S. federal standards for electronic authentication strength (NIST Special Publication 800-63). More than 40 standard reports allow companies to demonstrate effective controls by reporting on how devices comply with their mobile security policies.
    • One, Simple Bill: True, usage-based billing keeps costs predictable and transparent.

    For more information, please visit http://www.perimeterusa.com/services/messaging/mobile-device-management/.

    About Perimeter E-Security

    Perimeter E-Security delivers secure infrastructure from the cloud that businesses of all sizes rely on. Our advanced technology, expert intelligence, and superior scale make our clients' information more secure, more highly available, compliant with regulations and less costly to manage. By using our solutions, our customers can focus on their core businesses and take advantage of new opportunities. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit www.perimeterusa.com.

    Perimeter E-Security Announces Archive Anywhere for Microsoft Office 365

    August 15, 2012 Toggle Content

    Solution Allows Enhanced Continuity for Users Accessing Archived Email on Any Device at Any Time

    MILFORD, Conn., August 15,2012 -- Perimeter E-Security, the leading provider of secure cloud services, today announced their new Archive Anywhere solution for Microsoft Office 365. Archive Anywhere is a cloud-based service that makes it easy for users to view and search their entire mailbox archives anywhere, on any device. It also provides redundant continuity, allowing access to email when users are unable to connect to Office 365. Eliminating the need for remote Web portal access, Archive Anywhere helps organizations provide secure messaging for employees and reduce legal liability. The solution supports any modern mobile device, including all versions of Windows, Apple and Linux, both mobile and desktop.

    Announced in September of 2011, Perimeter E-Security's Compliance and Continuity Suite for Office 365 allows organizations to archive every email, meet and demonstrate adherence to industry-specific regulatory requirements and preserve uptime. Using Perimeter's automated compliance workflow system, Office 365 administrators are able to identify potential compliance violations before they occur, reducing risk. The Archive Anywhere service extends that capability, providing anywhere, anytime access to those compliance and continuity archives.

    "When people go looking for that important email they accidentally deleted, archiving ensures it’s recoverable,” said John Viega, executive vice president, Perimeter E-Security. "With Archive Anywhere for Office 365, users can have all the mail they’ve ever sent at their fingertips, wherever they are.”

    Generally available today, Perimeter's Archive Anywhere is an innovative service that enables email users to easily access and search their entire mailbox archive on virtually any device, whether they are in the office, at home, or on-the-go. The service is available as a feature to all existing customers, as well as customers of other hosted mail solutions and in-house email, and is also available as part of Perimeter's comprehensive suite of secure cloud messaging solutions.

    Perimeter E-Security has more than one million secure messaging users and is the only enterprise-class security services provider offering both comprehensive threat management and secure messaging, underpinned by strong compliance expertise. For more information on Archive Anywhere, please visit http://www.perimeterusa.com/services/messaging/archive-anywhere/.

    About Perimeter E-Security

    Perimeter E-Security delivers secure infrastructure from the cloud that businesses of all sizes rely on. Our advanced technology, expert intelligence, and superior scale makes our clients' information more secure, more highly available, compliant with regulations and less costly to manage. By using our solutions, our customers can focus on their core businesses and take advantage of new opportunities. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit www.perimeterusa.com.

    CONTACT:
    Jill Newberry, InkHouse Media + Marketing, For Perimeter E-Security,
    +1-781-966-4112, jill@inkhouse.net

    Patent Pending Cloud-based Email Service Allows Users to Access Archived Email on Any Device at Any Time

    July 12, 2012 Toggle Content

    MILFORD, Conn., July 12, 2012 /PRNewswire/ -- Perimeter E-Security, the leading provider of secure cloud services, today introduced a new offering that enables email users to easily access and search their entire mailbox archive on virtually any device, whether they are in the office, at home, or on-the-go. Perimeter's cloud-based Archive Anywhere service provides an easy alternative to remote Web portal access, helping organizations of all sizes provide easy, safe and secure messaging for their employees while reducing legal liability and ensuring business continuity.

    "Customers want their email archives integrated into the app they use every day: their email client," said John Viega, executive vice president, Perimeter E-Security. "Perimeter's revolutionary Archive Anywhere service lets users search, save and see their archives just like the rest of their email. Our solution eliminates the pain of password juggling, separate search boxes and proprietary portals. Who says you have to trade off ease-of-use and enterprise archiving? With Archive Anywhere, you can have both — right in your inbox. Additionally, in the event of a global Exchange interruption, users are assured the ability to send and receive email – thereby ensuring critical messaging continuity."

    This innovation paves the way for administrators to perform email compliance review on their iPad on the train home from work – all in the same inbox they've been using for the last 20 years.

    Generally available today, Perimeter's Archive Anywhere enhances its existing Messaging Continuity and Messaging Compliance Manager services, and is available as a feature to all existing customers, as well as customers of other hosted mail solutions and in-house email. The service is also available as part of Perimeter's comprehensive suite of secure cloud messaging solutions.

    Additional features include:

    • Any Device, Anywhere: Supports archive browsing and search across all desktop computing platforms including Windows, Apple and Linux, and email-enabled mobile devices including iPhone, iPad, BlackBerry, Android and Windows phones.
    • Quick and Simple Deployment: Archive Anywhere can be up and running in under 30 minutes, for 100 or 100,000 users, without the need for additional software, costly on-premise hardware, or technical support.
    • Easy Message Recovery: Message identification and recovery speeds are greatly improved through advanced search and filtering controls.
    • Flexible Sync Options: Take control of what is synchronized to local storage: which folders, and for how long. Use Perimeter's recommended out-of-the-box defaults or pick specific folders.
    • Instant Message Recovery: Eliminates the burdensome task for Exchange users to export and store emails to PST files.
    • Premier Support: Perimeter's 24/7/365 network operations center provides constant monitoring and support to ensure organizations have consistent protection.

    With more than one million secure messaging users, including 300,000 on Hosted Exchange, Perimeter E-Security is the only enterprise-class security services provider offering both comprehensive threat management and secure messaging, underpinned by strong compliance expertise. For more information on Archive Anywhere, please visit http://www.perimeterusa.com/services/messaging/archive-anywhere/.

    About Perimeter E-Security 
    Perimeter E-Security delivers secure infrastructure from the cloud that businesses of all sizes rely on. Our advanced technology, expert intelligence, and superior scale makes our clients' information more secure, more highly available, compliant with regulations and less costly to manage. By using our solutions, our customers can focus on their core businesses and take advantage of new opportunities. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit www.perimeterusa.com.

    Perimeter E-Security Unveils SaaS Web Security Solution

    May 8, 2012 Toggle Content

    Cloud-based Web Content Filtering Solution Supports Mobile Users Against Modern Security Threats

    Milford, CT, May 8, 2012 – Perimeter E-Security, the leading provider of secure cloud services, today unveiled a new offering that protects roaming Web users, whether they are in the office or working remotely. Perimeter’s cloud-based SaaS Web Security solution filters Web traffic and protects against Internet threats, helping organizations provide a safe and productive workplace for their employees while reducing legal liability, security risks and unnecessary strain on corporate bandwidth.

    “On-premise Web security gateways that filter URLs and detect viruses work very nicely — assuming you are actually on premise.” said Andrew Jaquith, chief technology officer of Perimeter E-Security. “But the modern workforce isn’t shackled to a desk. Employees are mobile: they go on the road, work from home and meet prospects for coffee. Perimeter’s new Web Security service works just like a Web security appliance, but it’s in the cloud. By applying the same policies to both roaming and workplace users, we give companies unrivaled protection against rapidly emerging Web-based threats.”

    Perimeter E-Security’s Web Security offering complements its Network Security suite, providing a single, comprehensive solution that simplifies how organizations secure their networks, while eliminating the need for costly on-premise equipment and support. The service is also available as part of Perimeter’s suite of secure cloud messaging solutions, already the most comprehensive available.

    The rise of pervasive malware syndicates and cybercrime has created new security challenges for enterprise organizations, which can no longer trust websites to be safe and free of malicious content. This, coupled with increasing concerns about mobile workforces, underscores the critical need for a solution that minimizes the risk of exposure.

    Perimeter E-Security’s trusted expertise and high-touch support gets organizations up and running quickly, while helping to dramatically reduce risk and cost associated with securing Web connectivity and ensuring compliance with complex industry regulations. Additional solution highlights include:

     

    • Instant Deployment: SaaS Web Security can be turned on in less than five minutes, completely eliminating deployment headaches, unpredictable costs and complicated upgrades.
    • No On-Premise Equipment: Because SaaS Web Security lives in the cloud, Perimeter’s customers eliminate the need for capital expenditures and obsolete hardware.
    • Expanded Scale: Customers gain superior reliability and reduced latency through economies of scale attained through enterprise-class email and Web security infrastructure.
    • 24/7/365 Support: Perimeter’s professional security operations center (SOC) provides constant, around the clock support and monitoring, ensuring organizations have constant protection.
    • Simple Pricing: SaaS Web Security’s simple and elastic per-user, per-month pricing model keeps costs predictable and transparent.

    Perimeter E-Security Introduces SaaS Network Security Solutions, Advanced 24/7 Monitoring

    April 10, 2012 Toggle Content

    Integrated Cloud-based Offerings Empower Organizations to Self-Manage Network Security with Ease

    Milford, CT, April 10, 2012 – Perimeter E-Security, the leading provider of security as a service (SaaS) solutions, today unveiled SaaS Network Security, a new suite of services that helps organizations secure their networks and lower the cost of compliance. This comprehensive cloud-based suite demonstrates Perimeter’s commitment to providing customers with fully integrated, single provider solutions that support all network security needs.

    Today’s security environment is more dangerous than ever before, with hard-to-detect threats stemming from Web-borne attacks and exploited vulnerabilities. Left unchecked, these threats can jeopardize organizations’ intellectual property, infrastructures and reputations. At the same time, companies face increased scrutiny from regulators and business partners.

    “CIOs are being squeezed from two sides: mounting security and compliance pressures on the one hand, and time, resource and staffing constraints on the other,” said Andrew Jaquith, Chief Technology Officer, Perimeter E-Security. “With our SaaS Network Security suite, we give CIOs the essential tools they need to stay ahead of threats and extend the reach and effectiveness of their security teams. By monitoring customer devices, analyzing security logs and providing superior intelligence, we free up your staff to focus on key business initiatives.”

    Perimeter’s SaaS Network Security suite helps organizations take total control of their networks while eliminating the need for expensive infrastructure and staff associated with traditional on-premise network security products. SaaS Network Security offers simple and efficient log management, vulnerability management, device discovery, flexible reporting and detailed data mining features — all in the cloud. Using SaaS Network Security, customers can enforce policies and identify potential vulnerabilities in real-time. As an option, Perimeter offers supplementary 24/7, nonstop security monitoring for critical devices, providing continuous peace of mind.

    SaaS Network Security provides optimized solutions for every potential security requirement, offering three bundled suite options:

    • Standard Edition: SaaS Network Security, Standard Edition provides a comprehensive set of self-service tools needed to effectively manage network security and attain compliance. Standard features include log management, vulnerability management, device discovery, reporting and data mining. In addition, cloud-based roaming Web security protects employees from Web-based attacks whether they are in the office or on the move.
    • Premium Edition: In addition to all Standard Edition features, SaaS Network Security, Premium Edition extends your staff’s effectiveness by adding coverage from Perimeter’s acclaimed Security Operations Center (SOC). Perimeter’s 24/7 security monitoring service continuously monitors critical security devices and provides proactive alerts on potential breaches, while empowering organizations to manage their own network and devices as they choose. By harnessing the power and scalability of its cloud-based SOC, Perimeter monitors and correlates data across its 6,000 customers, identifies emerging security threats and provides customers with enhanced intelligence that helps them respond faster.
    • Managed Services and Consulting: For customers seeking a completely hands-off solution, Perimeter offers fully managed UTM devices and services for simplified security. Organizations can also engage Perimeter’s skilled consultants for customized security, risk and assurance and compliance consulting to help them stay ahead of threats on their networks.

    As part of Perimeter’s ongoing commitment to delivering simplified, cloud-based security solutions to the market, its SaaS Network Security suite embraces simple, predictable monthly subscription pricing. For more information, please visit https://www.perimeterusa.com/services/network-security/.

    Perimeter E-Security Executives to Present at RSA Conference 2012

    February 21, 2012 Toggle Content

    Recognized Industry Thought Leaders On Key Security Trends Panels at RSA Conference 2012

    Milford, CT, February 21, 2012 – Perimeter E-Security, the premier cloud security provider, today announced that two of its top executives and security industry thought leaders will have a strong presence at RSA Conference 2012. The company will also showcase its industry-leading cloud security solutions as a premier sponsor at the eighth annualAmerica’s Growth Capital Conference, being held during the RSA Conference.

    A recognized authority on data, endpoint and mobile security topics, Andrew Jaquith is chief technology officer at Perimeter E-Security. The top-rated RSA Conference speaker was previously a senior analyst with Forrester Research. At this year’s RSA Conference, Jaquith will share his perspectives during the following panel presentations:

    • Big Data and Security: The Rules Have Changed: Industry focus has shifted to put as much emphasis on broad threat awareness as it has on prevention. However, conventional security technologies don’t innately have the intelligence to deal with rapidly emerging threats and Web innovation. A mix of innovative technology and big data analysis is critical. Jaquith will join industry experts from CSO Magazine, Sourcefire, Twitter and Securosis in a panel discussion focused on adapting big data to security decisions, and best practices for analyzing data. This presentation will take place on Tuesday, February 28, at 3:50 p.m. in room 301 at the Moscone Convention Center.
    • The Metric System: Why Meaningful Metrics Matter: Jaquith will join top executives from John Deere, White Hat Security and a leading financial services institution to discuss how meaningful security metrics can be used to improve enterprise security and to demonstrate business value. Drawing on the extensive experience of the panel, participants will explore practical examples that can enable real security improvements within their own organizations. This presentation will take place on Wednesday, February 29, at 10:40 a.m. in room 309 at the Moscone Convention Center.

    Additionally, as co-founder of SecurityMetrics.org, Jaquith will co-host Mini-MetriCon 6.5 , a one-day, invitation-only event for security practitioners on Monday, February 27, at University of San Francisco. Through the cooperation of RSA, this invitation-only workshop will take place as part of RSA Conference 2012, and will facilitate the exchange of new ideas and practical experience in using metrics to drive better security, compliance and risk management.

    John Viega, executive vice president of Perimeter E-Security and recognized application security expert will also be presenting at RSA Conference. The acclaimed security author and former McAfee CTO will present in the following panel discussions.

    • Embedded Insecurity: What Lies Beneath: From cell phones to voting machines to pace makers to printers – embedded devices are everywhere. Although many are network-enabled, security has often been ignored. Viega will join experts from MSNBC.com, Columbia University and Accuvant in a panel discussion that will explore the state of embedded device security – and what it means for organizations today. This presentation will take place on Wednesday, February 29, at 8:00 a.m. in room 132 at the Moscone Convention Center.
    • Vetting Mobile Apps for the Warfighter: Viega will join representatives from NIST, George Mason University, SAIC and the Naval Postgraduate School to explore the security challenges of the mobile apps revolution, and the state of the art practices and technologies that address those challenges. This panel will take place on Thursday, March 1, at 9:30 a.m. in room 305 at the Moscone Convention Center.

    Additionally, Viega serves as editor-in-chief of IEEE Security & Privacy Magazine. The publication will host a high-caliber panel during the RSA Conference titled Innovation and Technology Transfer in Security: From the Lab to General Use. This distinguished panel of innovation experts and entrepreneurs will discuss how they make tech transfer work. Panelists include experts from Cigital, Fortify Software, National Science Foundation, Naval Postgraduate School and Cryptography Research. The panel discussion will take place on Wednesday, February 29, at 8:00 a.m. in room 310 at the Moscone Convention Center.

    Perimeter E-Security is a premier sponsor at the eighth annual America’s Growth Capital Conference, taking place during the RSA Conference on February 27 and 28 in San Francisco. The conference will focus on the most innovative emerging growth companies in information security, cloud computing, financial services IT, healthcare IT, mobile, services and software.

    To schedule a one-on-one meeting with Perimeter E-Security experts during RSA Conference 2012, please call 781-966-4112. For more information, please visit www.perimeterusa.com.

    Perimeter E-Security Launches SaaS-Based Log Management Solution

    September 27, 2011 Toggle Content

    Simple Pricing and Ease of Deployment Allows Companies to Effortlessly Secure Their Networks and Comply with Regulations

    Milford, CT, September 27, 2011 – Perimeter E-Security, the leading provider of security as a service, today unveiled a new SaaS-based Log Management solution, which allows organizations to secure their networks and comply with regulations that require log data to be collected, reviewed, and archived securely. The solution introduces a unique, “per-device” pricing model, eliminating the complexity of traditional variable pricing models. Perimeter’s Log Management solution complements the Company’s current service offerings, such as intrusion detection and vulnerability assessment, and will add an extra layer of security and compliance to its network security suite.

    "Every company needs to centralize and monitor their security, server and device logs. It’s a security best practice, and financial regulations and mandates such as PCI-DSS increasingly require it. But today’s log management solutions are hard to buy and complex to deploy. Customers shouldn’t have to figure out ‘events-per-second,’ or use a crystal ball to size their capacity needs,” said Andrew Jaquith, CTO of Perimeter E-Security. ”Our new SaaS Log Management solution leaves old-world shrink-wrapped security far behind. Customers just need to answer two simple questions: how many devices do you have and how long do you want to keep the logs for? Customers can increase their security and meet their obligations in less than a week."

    Perimeter’s Log Management solution collects logs from customer devices and infrastructure with a thin, lightweight collector appliance that is centrally managed from the Perimeter’s Security Operations Center. Logs are collected without agents by the appliance and then compressed, encrypted and forwarded to highly secure and redundant data centers for processing and storage. Customers can log into a web portal to perform real-time searches or run easy-to-read reports, such as for audit and compliance purposes, or log events, making collecting and analyzing log data simple and less time consuming.

    Highlights of Perimeter's Log Management solution include the following:

    • Detects threats and defend networks from security breaches and attacks with a cost-effective SaaS solution
    • Reduces hassle and cost of installing traditional and complex security monitoring products
    • Perimeter's Security Operation Center allows security experts to assist organizations in detecting and remediating attacks
    • Easily collects logs across the whole organization and safely stores event logs in Perimeter’s SAS70 Type II data centers
    • Patented 7-factor threat scenario modeling allows events to be accurately identified and correlated
    • Log Management web portal offers around-the-clock access to dynamic reports and flexible search tools for powerful analysis, forensic capabilities, and compliance reports

    Perimeter E-Security is the only enterprise security services provider offering both comprehensive threat management and secure messaging, underpinned by strong compliance expertise.

    Perimeter E-Security Unveils Compliance and Continuity Suite for Microsoft Office 365

    September 12, 2011 Toggle Content

    Perimeter E-Security Unveils Compliance and Continuity Suite for Microsoft Office 365

    Solution Augments Office 365 with Key Analytics and Automation Capabilities to Meet Compliance and eDiscovery Requirements

    Milford, CT, September 12, 2011 – Perimeter E-Security, the trusted provider of secure and compliant infrastructure for companies of all sizes, today launched its Compliance and Continuity Suite for Microsoft Office 365 with enhanced continuity and eDiscovery capabilities for securely capturing and storing all incoming and outgoing messages.

    According to The Radicati Group, the average corporate employee will send and receive about 112 email messages per day in 2011 and this volume will continue to grow. Many of these emails contain potentially sensitive information that could put the enterprise at risk if improperly disclosed. In addition, both internal policies and mandates by the SEC, FINRA, HIPAA, SOX, and the Federal Rules for Civil Procedures (FRCP) require companies to retain all messages for specific periods of time and have processes in place to discover, identify and retrieve potential messages with sensitive information. Selecting and managing an in-house archive solution has always been an expensive and time-consuming problem. With the movement of productivity applications and data to the cloud, this problem becomes more urgent.

    “Enterprise CIOs love Office 365’s value and convenience, but they are concerned about the security of their applications and data. When they move their productivity suites to the cloud, CIOs want to meet their compliance and security obligations without consuming valuable resources or staff time,” said Andrew Jaquith, CTO of Perimeter E-Security. “Our new Compliance and Continuity Suite archives and retains all messages sent, received and stored in Office 365. In addition to being able to fulfill eDiscovery and audit requests in a timely fashion, Office 365 customers now have a solution from a trusted security provider — Perimeter — that meets all of their archiving, business continuity and security needs.”

    With Perimeter E-Security’s Compliance and Continuity Suite for Office 365, organizations can now archive every email, preserve uptime, and increase the accuracy of internal and external compliance reviews. Using Perimeter’s automated compliance workflow system, Office 365 customers can reduce risk and allow administrators to identify potential compliance violations before they occur.

    Key features of Perimeter’s Compliance and Continuity Suite for Office 365 include:

    • Message mirroring, allowing 100 percent message availability through a web-based business continuity portal that allows users 24/7 access to their archives where they can send and receive emails in the event of an exchange outage.
    • Tamper-proof storage that guarantees the integrity of message archives, essential for establishing chain of custody and
      complying with FRCP.
    • User-friendly web-based interface that enables organizations to define their own complex, weighted policies for compliance monitoring. Administrators have 24/7 access to reports, policy configurations and role-based access control. Administrators and employees alike have 24/7 access to their own personal archives, plus others they have rights to.
    • Parametric search to allow administrators, reviewers, counsel and employees the ability to quickly search
      archives based on message metadata, group membership, full-text or attachment contents and other parameters.
    • Flexible message retention options governing the length of time messages are kept in the archive, which helps to minimize the risk of exposure and reduce archive expenses. These include support for multiple retention holds and role-based collections.
    • Support for Electronic Discovery Reference Model functionality, notably the identification, collection and preservation of email and other critical information types.

    Perimeter’s Compliance and Continuity Suite for Office 365 builds on the same proven technology that powers the Company’s SaaS Secure Messaging Suite 6.0. Released in July 2011, Secure Messaging 6.0 is the market’s first complete secure cloud messaging solution with full support for Microsoft Exchange 2010. Perimeter’s Secure Messaging solutions have been recognized by industry analysts such as Gartner, Forrester, Enterprise Management Group and Radicati Group as providing high
    value, strong return on investment, and tightly integrated security services.

    Perimeter E-Security is the only enterprise security services provider offering both comprehensive threat management and secure messaging, underpinned by strong compliance expertise. With one million secure messaging users, USA.NET is consistently ranked as a top player in the business email services market. The Company filters 50 million emails per day, analyzes 240 million security events every day, and manages 200 terabytes of customer archives.

    About Perimeter

    Perimeter E-Security delivers secure infrastructure from the cloud that businesses of all sizes rely on. Our advanced technology, expert intelligence, and superior scale makes our clients' information more secure, more highly available, compliant with regulations and less costly to manage. By using our solutions, our customers can focus on their core businesses and take advantage of new opportunities. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visitwww.perimeterusa.com.

    Perimeter E-Security Launches First Comprehensive Secure Cloud Messaging Solution with Exchange 2010 Support

    July 26, 2011 Toggle Content

    Perimeter E-Security Launches First Comprehensive Secure Cloud Messaging Solution with Exchange 2010 Support

    Hosted Email and Messaging Suite Built for Secure, Compliant Communications

    Milford, CT, July 26, 2011 – USA.NET, a Perimeter E-Security brand and the trusted provider of secure and compliant infrastructure for companies of all sizes, today released SaaS Secure Messaging 6.0, the market’s first complete secure cloud messaging solution with support for Microsoft Exchange 2010. With more organizations choosing cloud-based email services to save money, modernize their mail systems, reduce complexity and provide simplified remote access for their employees, choosing the right partner is critical. Many organizations find themselves struggling with unanticipated cost, complexity and effort making their messaging services secure and compliant. SaaS Secure Messaging 6.0 addresses these needs by providing a fully integrated, secure and compliant solution.

    "Any vendor can sell you a cheap mailbox,” said Andrew Jaquith, CTO of Perimeter E-Security. "By contrast, our SaaS Secure Messaging solution with Exchange 2010 provides all of the security and compliance features that a modern business needs. These include messaging, anti-virus and anti-spam, encryption, data leak prevention, business continuity mirroring, tamperproof archiving, eDiscovery, mobile management, collaboration, compliance and review workflows — all for one price, and integrated in one solution. Enterprises won't find a better value anywhere."

    The value of USA.NET's SaaS Secure Messaging solution has been recognized by multiple analyst firms. In May 2011, a commissioned study conducted by Forrester Consulting on behalf of USA.NET titled “The Total Economic Impact of USA.NET SaaS Secure Messaging Solution,” analyzed the return on investment (ROI) that enterprises can achieve by deploying SaaS Secure Messaging. From an analysis of an 3,500-seat enterprise customer, Forrester found that by choosing USA.NET, the company realized a risk-adjusted ROI of 84 percent with a rapid payback period of just two months. As stated in the study, Forrester Consulting "projects a three-year risk-adjusted total net present value (NPV) of $1.9 million representing the net costs and benefits attributed to the USA.NET SaaS Secure Messaging solution versus the customer's previous messaging solution." 

    Similarly, in May 2011, Radicati Group found that by switching to USA.NET, the customer saved $15,000 a month, while enjoying superior security services, better administration and controls, full compliance with archiving regulations, enhanced wireless support and decreased downtime.

    Highlights of Perimeter's SaaS Secure Messaging 6.0 solution include:

    • Hosted Microsoft Exchange 2007 or 2010
    • Hosted Perimeter Commercial Messaging, for companies seeking a standards-based alternative to Exchange
    • SharePoint 2010 and Microsoft Office Communicator 2010
    • BlackBerry Express and ActiveSync mobile management
    • Integrated anti-virus, anti-spam and content filtering
    • Data leak prevention and message encryption, featuring new easy-to-use credential, key and workflow management
    • Business continuity archiving for 100% availability
    • Compliance archiving, featuring automated message review, litigation holds, and multiple retention policies
    • SAS/70 Type II certified, TIA-942 Tier 4 datacenters
    • Free migration for many organizations

    SaaS Secure Messaging also includes key usability enhancements that make migration and deployment easier than ever, while flexible deployment options support cloud and hybrid configurations. Comprehensive platform support allows organizations to embrace the latest technology without sacrificing security and compliance.

    Perimeter E-Security is the only enterprise security services provider offering both comprehensive threat management and secure messaging, underpinned by strong compliance expertise. With one million secure messaging users, USA.NET is consistently ranked as a top player in the business email services market. The company filters 50 million emails per day, analyzes 240 million security events every day, and manages 200 terabytes of customer archives.

    About Perimeter

    Perimeter E-Security delivers secure infrastructure from the cloud that businesses of all sizes rely on. Our advanced technology, expert intelligence, and superior scale makes our clients' information more secure, more highly available, compliant with regulations and less costly to manage. By using our solutions, our customers can focus on their core businesses and take advantage of new opportunities. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. 

    Perimeter E-Security's E-Mail Archiving Services Recognized by Leading Industry Analyst Firm

    June 2, 2011 Toggle Content

    Milford, CT, June 2, 2011 - Perimeter E-Security, the trusted market leader of information security and secure messaging services that deliver enterprise-class protection and compliance to companies of all sizes, today announced that Gartner, Inc. recognized the company in the latest "Outsourcing E-Mail Archiving: 2Q11 Vendor Update" report.

    "Companies today are under tremendous pressure to be compliant and therefore need to update their messaging systems to support and follow the constantly changing regulations," said Tim Harvey, CEO of Perimeter E-Security. "We are honored to be profiled in the outsourced email archiving sector where businesses can objectively view the strengths of our services, which include our ability to help manage e-mails in a secure, compliant manner without affecting IT budgets."

    Perimeter E-Security offers15 services that are divided into three categories: SaaS Managed Security, SaaS Vulnerability Management and SaaS Security Messaging, which includes Messaging Compliance Archiving and Messaging Continuity and Archiving services.

    Perimeter E-Security is the only enterprise-class security services provider offering both comprehensive threat management and secure messaging, underpinned by strong compliance expertise. The company offers all customers the same level of security as a Fortune 500 firm, by providing solutions that allow them to easily assess, monitor and reduce their messaging, security and compliance risks. With one million secure messaging users, USA.NET, a Perimeter E-Security company, filters 50 million emails per day and handles 240 million security events every day with 200 terabytes of managed archives.

    About Perimeter

    Perimeter E-Security is the trusted market leader of information security services that delivers enterprise-class protection and compliance. Through its cost-effective and scalable SaaS platform, Perimeter offers the most comprehensive compliance and security solutions that include: end-to-end secure messaging solutions, managed security services, vulnerability management and security consulting services.

    For more information about Perimeter, visit www.perimeterusa.com.

    Join Our Community
    Blog: www.perimeterusa.com/blog
    Twitter: www.twitter.com/PerimeterNews 
    Facebook: www.facebook.com/perimeterusa
    LinkedIn: http://www.linkedin.com/groups/Perimeter-ESecurity-3109606

    Independent Analysis Shows USA.NET’s SaaS Secure Messaging Solution Saves Large Customer $15,000 per Month

    May 31, 2011 Toggle Content

    National Broker-Dealer Gains Fully CompliantSolution with Reduced Downtime, and Higher Productivity, According to RadicatiGroup Study

    Milford,CT, May 31, 2011 - USA.NET,a Perimeter E-Security company, today released a commissioned case study reportconducted by The Radicati Group, illustrating the full compliance, cost savingsand business productivity gains that a national broker-dealer organization experiencedfrom deploying USA.NET's SaaS Secure Messaging solution. The Radicati Groupfound that by switching to USA.NET, the customer saved $15,000 a month, whileenjoying superior security services, better administration and controls, fullcompliance with archiving regulations, enhanced wireless support and decreaseddowntime.

    "Today, financial institutions are looking to update their messagingsystems to support compliance and regulations implemented by the SEC and FINRA,"said Tim Harvey, CEO of Perimeter E-Security. "This case study affirms ourfinancial services market leadership and ability of our SaaS Secure Messaging solutionto provide everything a broker-dealer needs to manage messaging in a secure,compliant, comprehensive and cost-efficient way."

    The case study illustrates that this organization with over 800 usershad outgrown its outdated email provider and was looking for a cloud providerthat offered hosted Microsoft Exchange with hosted email encryption services aspart of a consolidated suite of services, while staying within its IT budgetand meeting key technology requirements.  

    The company chose USA.NET for its complete suite of hosted email andsecurity services, including SaaS Secure Hosted Email, SaaS Email Security, SaaSEmail Encryption, SaaS Archiving and Compliance and Mobile Messaging. Inaddition, "USA.NET also actively helped with the migration process by designinga number of scripts to automate the migration of end-users' emails to its newsolution and taking the company through a number of staged migrations thatoccurred during off-peak hours," according to the case study.

    By implementing USA.NET, the company achieved:

    • Integrated email, encryption and archiving services, which can be managed under one interface, helping to reduce the complexity, costs and uncertainty of deploying multiple solutions from multiple providers.
    • Ensures full compliance with regulatory review requirements, such as email sampling as required by FINRA and SEC regulations.
    • Greater uptime and savings with downtime virtually eliminated. This alone saves the company an estimated $15,000 a month in lost IT administrator time and lost user productivity (based on the previously reported average of three hours of unexpected outages per month).
    • Improved business productivity and efficiency across the organization gained by the full feature set of collaboration services and well-integrated mobile support from USA.NET's platform.
    • Knowledgeable partner going forward with deep understanding of security requirements to ensure that its solutions will keep pace with evolving security and industry compliance regulations.
    • Future proofing of the chosen solution to ensure that it would evolve seamlessly to incorporate new features and technologies without requiring future costly upgrades.

    The customer's CIO stated in the report, "Working with USA.NET was veryeasy, their team was willing to work closely with us on customization andmaking sure that all our specific project and implementation requirements werebeing met. We are very pleased with the security features we have gained bydeploying USA.NET, and we feel we are finally at the forefront of what securitytechnologies can provide today."

    With one million secure messaging users, USA.NET filters 50 millionemails per day and handles 240 million security events every day with 200terabytes of managed archives. The Radicati Group ranked USA.NET as a "TopPlayer" in both the HostedBusiness Email-Market Quadrant 2010 report and the Hosted MicrosoftExchange-Market Quadrant 2010 report.

    About Perimeter

    Perimeter E-Security is the trusted market leader of informationsecurity services that delivers enterprise-class protection and compliance.Through its cost-effective and scalable SaaS platform, Perimeter offers themost comprehensive compliance and security solutions that include: end-to-endsecure messaging solutions, managed security services, vulnerability managementand security consulting services.
    For more information about Perimeter, visit www.perimeterusa.com
     

    Join Our Community
    Blog: www.perimeterusa.com/blog
    Twitter: www.twitter.com/PerimeterNews
    Facebook: www.facebook.com/perimeterusa
    LinkedIn: www.linkedin.com/groupRegistration?gid=3109606

    Independent Research Firm Highlights Tremendous Customer ROI of USA.NET's SaaS Secure Messaging Solution

    May 23, 2011 Toggle Content

    Total Economic Impact Study Reveals 84% Customer ROI and Rapid Payback Period

    Milford, CT, May 23, 2011 - USA.NET, a Perimeter E-Security company, today released a commissioned study conducted by Forrester Consulting on behalf of USA.NET, analyzing the return on investment (ROI) that enterprises can achieve by deploying USA.NET's SaaS Secure Messaging solution. From the analysis of an enterprise customer, Forrester found that by choosing USA.NET, the company realized a risk-adjusted ROI of 84 percent with a rapid payback period of just two months.

    "This study validates the tremendous value that we bring to companies like the enterprise customer profiled," said Tim Harvey, CEO of Perimeter E-Security. "In this instance, our client is achieving an ROI of five to ten times higher than most companies' normal capital hurdle rates. Our SaaS Secure Messaging offering provides everything that a compliance-oriented business needs to manage its messaging in a secure, compliant, comprehensive and cost-effective way."

    A webinar detailing the study's findings is scheduled for May 26, 2011 at 1 PM ET, co-hosted by Andrew Jaquith, Chief Technology Officer at Perimeter E-Security, and Nikki Babatola, Consultant at Forrester Research, Inc. To register for the webinar, please visit: http://www.perimeterusa.com/knowledge-center/webinars/upcoming.

    The study titled, "The Total Economic Impact of USA.NET SaaS Secure Messaging Solution," examined the specific costs, benefits, flexibility, and risk elements that the Perimeter E-Security customer experienced over the past three years using the SaaS Secure Messaging solution that includes hosted email, archiving, messaging security, collaboration and mobile access.

    According to Forrester Consulting, the customer's main goal of moving to the USA.NET service was to manage its messaging infrastructure more cost-effectively while still being able to internally manage the allocation of messaging capacity as well as retain full control of the user accounts. In addition to the 84 percent risk-adjusted ROI, Forrester "projects a three-year risk-adjusted total net present value (NPV) of $1.9 million representing the net costs and benefits attributed to the USA.NET SaaS Secure Messaging solution versus the customer's previous messaging solution."

    Amongst other key customer ROI highlights found in the study:

     

    • Achieved a net financial benefit of $1.8 million over three years, which was comprised of $4 million in savings versus $2.2 million in costs
    • Avoided hardware and software costs and saved more than $1 million, over a three-year period, compared with paying for dedicated infrastructure
    • Eliminated hosting fees by hosting its own servers in the third-party data center and saved more than $200,000 over a three-year period
    • Eliminated dedicated Exchange administrative services, generating a savings of more than $3 million over a three-year period

     

    With one million secure messaging users, USA.NET filters 50 million emails per day and handles 240 million security events every day with 200 terabytes of managed archives. USA.NET was also recognized by Forrester Research in a March 2011 report titled, "Market Overview: Cloud-Based Email Vendors," positioning USA.NET as a vendor for SMB, mid-market and enterprise companies with the largest reported customer at 300,000+ seats.

    About Perimeter
    Perimeter E-Security is the trusted market leader of information security services that delivers enterprise-class protection and compliance. Through its cost-effective and scalable SaaS platform, Perimeter offers the most comprehensive compliance and security solutions that include: end-to-end secure messaging solutions, managed security services, vulnerability management and security consulting services.

    For more information about Perimeter, visit www.perimeterusa.com.

    Join Our Community
    Blog: www.perimeterusa.com/blog
    Twitter: www.twitter.com/PerimeterNews
    Facebook: www.facebook.com/perimeterusa
    LinkedIn: www.linkedin.com/groupRegistration?gid=3109606

    Contact:
    Maggie Duquin Nolan / Sharon Oh
    Brainerd Communicators
    212-986-6667

    duquin@braincomm.com / oh@braincomm.com

    Perimeter E-Security Alliance Offers Preferred Security and Messaging Solutions to Credit Unions

    April 18, 2011 Toggle Content

    CUNA Strategic Services Renews Relationship, Citing Perimeter's Compliance Expertise and Comprehensive Security and Messaging Services

    MILFORD, CT - April 18, 2011 - Perimeter E-Security, the trusted market leader of information security and secure messaging services that deliver enterprise-class protection and compliance to companies of all sizes, today announced that CUNA Strategic Services (CSS) has renewed its strategic alliance relationship with Perimeter for security and messaging solutions.

    "The credit union conundrum is clear. They have to address the same regulatory and security challenges as major financial institutions with significantly limited internal resources," said Tim Harvey, CEO of Perimeter E-Security. "We're grateful for CSS' continued support of Perimeter. Since we comply with the same rigorous industry oversight as credit unions, we're best served to deliver security and messaging solutions that meet the complex compliance needs and threats facing smaller financial institutions."

    Perimeter's unique centralized architecture offers best-in-class pre-integrated technology with complete redundancy and continuous upgrades, complemented with a 24/7 engineering staff of trained subject-matter experts. Perimeter is a Certified Cisco MSSP Partner and exhibits significant industry oversight with an annual SAS70 Type II, FFIEC oversight as well as CyberTrust - TruSecure Certified Service Provider designation.

    "Perimeter delivers the most comprehensive compliance, security and messaging services, providing state-of-the-art, yet affordable, solutions for credit unions of all sizes," said Wes Millar, Senior Vice President of CSS. "Since 2006, we have recognized Perimeter as the clear choice for credit unions with its proven track record in the financial services industry."

    As the only enterprise-class security services provider offering both comprehensive threat management and secure messaging, underpinned by strong compliance expertise, Perimeter protects over a half-trillion dollars in assets for more than 6,000 customers, including 500 credit unions. Perimeter offers all customers the same level of security as a Fortune 500 firm, by providing solutions that allow them to easily assess, monitor and reduce their messaging, security and compliance risks. With 80 petabytes of managed archives, the company also filters 50 million emails and handles 240 million security events every day.

    About CUNA Strategic Services, Inc.
    CUNA Strategic Services Inc., owned jointly by Credit Union National Association (CUNA) and the state leagues, saved credit unions $25 million in 2010 through its alliance programs. It provides credit unions with access to quality products, services, and technologies delivered with a competitive advantage made possible through volume pricing and strategic program development. For more information, visit www.cunastrategicservices.com.

    About Perimeter
    Perimeter E-Security is the trusted market leader of information security services that delivers enterprise-class protection and compliance. Through its cost-effective and scalable SaaS platform, Perimeter offers the most comprehensive compliance and security solutions that include: end-to-end secure messaging solutions, managed security services, vulnerability management and security consulting services.

    For more information about Perimeter, visit www.perimeterusa.com.

    Join Our Community
    Blog: www.perimeterusa.com/blog
    Twitter: www.twitter.com/PerimeterNews
    Facebook: www.facebook.com/perimeterusa
    LinkedIn: www.linkedin.com/groupRegistration?gid=3109606

    Contact:
    Maggie Duquin Nolan / Sharon Oh
    Brainerd Communicators
    212-986-6667
    duquin@braincomm.com / oh@braincomm.com

    Perimeter E-Security Selected by AlwaysOn as OnDemand Top 100 Winner

    April 7, 2011 Toggle Content

    Recognized for Creating New Opportunities in Cloud Computing and SaaS

    Milford, CT, April 7, 2011 - Perimeter E-Security, the trusted market leader of information security and secure messaging services that deliver enterprise-class protection and compliance to companies of all sizes, today announced that it has been chosen by AlwaysOn as one of the OnDemand Top 100 winners. Inclusion in the OnDemand 100 signifies leadership amongst its peers and game-changing approaches and technologies that are likely to disrupt existing markets and entrenched players. Perimeter E-Security was selected as one of the 100 top, private on-demand and SaaS companies based on a set of five criteria: innovation, market potential, commercialization, stakeholder value, and media buzz.

    "It's an honor to be recognized among the Top 100 winners. As many companies today are transferring their practices to the cloud, innovation in storing and the distribution of secure information are more important than ever," said Tim Harvey, CEO of Perimeter E-Security. "Perimeter's comprehensive security and messaging services in the cloud has enabled us to become a highly trusted services provider to more than 6,000 customers across an expanding array of industries."

    "As the digital information created by businesses continues to explode at astronomical rates, the need to store, manage, socialize, and share this information is becoming extremely challenging," says Tony Perkins, founder and editor of AlwaysOn. "By providing innovative technologies that help enterprises better compete in this new era of information complexity and move their data out into the cloud, the OnDemand 100 represents some of the highest-growth opportunities in the private company marketplace."

    Several market trends continue to drive Perimeter E-Security's information security and messaging business including the growing sophistication of information threats, heightened compliance requirements and the consumerization of IT with growing use of smartphones and tablet devices across enterprises. As more businesses are migrating to cloud-based services, Perimeter E-Security has proven the ability to execute and build on their secure platforms to accommodate these ever-changing trends.

    The AlwaysOn editorial team, along with various industry partners, selected the top 100 winners after a thorough search for private companies that are creating new opportunities in SaaS and cloud computing. The AlwaysOn editorial team conducted a rigorous three-month selection process to finalize the 2011 list.

    Perimeter E-Security and the OnDemand Top 100 companies will be honored at AlwaysOn's OnDemand event on March 28, 2011, at Hewlett-Packard's Worldwide Headquarters in Palo Alto, CA.

    This two-and-a-half-day executive event features CEO presentations and high-level debates on how the Internet is disrupting how companies of all sizes create, store, distribute, analyze, and take advantage of their mission-critical data.

    A full list of all the OnDemand Top 100 winners can be found on the AlwaysOn website at:
    http://www.aonetwork.com/AOStory/Announcing-2011-OnDemand-100-Top-Private-Companies

    About Perimeter
    Perimeter E-Security is the trusted market leader of information security services that delivers enterprise-class protection and compliance. Through its cost-effective and scalable SaaS platform, Perimeter offers the most comprehensive compliance and security solutions that include: end-to-end secure messaging solutions, managed security services, vulnerability management and security consulting services.

    For more information about Perimeter, visit www.perimeterusa.com.

    Join Our Community
    Blog: www.perimeterusa.com/blog
    Twitter: www.twitter.com/PerimeterNews 
    Facebook: www.facebook.com/perimeterusa
    LinkedIn: www.linkedin.com/groupRegistration?gid=3109606

    About AlwaysOn
    AlwaysOn is the leading business media brand networking the Global Silicon Valley. AlwaysOn helped ignite the social media revolution in early 2003 when it launched the AlwaysOn network. In 2004, it became the first media brand to socially network its online readers and event attendees. AlwaysOn's preeminent executive event series includes the Summit at Stanford, OnMedia, OnHollywood, Venture Summit Mid-Atlantic, OnDemand, Venture Summit Silicon Valley, Venture Summit East, GoingGreen Silicon Valley, and GoingGreen East. The AlwaysOn network and live event series continue to lead the industry by empowering its readers, event participants, sponsors, and advertisers like no other media brand.

    USA.NET Services Featured in Independent Research Firm’s Cloud-Based Email Vendors Market Overview

    April 5, 2011 Toggle Content

    Perimeter E-Security's Messaging Company Cited as Serving Largest Reported Customer at 300,000+ Seats

    Milford, CT, April 5, 2011 - USA.NET, a Perimeter E-Security company, today announced that it has been recognized by Forrester Research Inc. in a March 2011 report titled, "Market Overview: Cloud-Based Email Vendors." The report positions USA.NET as a vendor for SMB, mid-market and enterprise companies with the largest reported customer at 300,000+ seats. With one million secure messaging users, USA.NET filters 50 million emails per day.

    "Today, a tremendous amount of sensitive corporate and personal data resides in email, driving more companies to turn to outside expertise to manage the growing compliance requirements and to secure the information," said Tim Harvey, CEO of Perimeter E-Security. "More than 6,000 customers across an expanding array of industries rely on our comprehensive secure, cloud-based messaging services, and it's an honor to receive this recognition as a highly trusted service provider."

    USA.NET offers a breadth of email related services including industry leading email security and compliance services, which are comprised of secure hosted email, anti-virus, anti-spam, content control, encryption, archiving, business continuity, and secure SharePoint and mobility services.

    Security in the cloud is a top priority for companies as the increase in sophistication of information threats, heightened compliance requirements and the consumerization of IT with growing use of smartphones and tablet devices across enterprises continues to develop. One major concern for companies is finding a cloud-based email vendor who tailors to the size of their business.

    In the report USA.NET is included in the vendor class of collaboration service providers and cited as experts at running and tailoring Exchange and other email and collaboration services for customers. The report notes:

    "Why not go directly to Microsoft and other platform providers? They just might not be a good fit for your company. As mentioned, Microsoft offers two flavors of Exchange Online: standard and dedicated. The dedicated version is only offered to companies with more than 5,000 seats, but technical integration or regulatory requirements might dictate greater segmentation or control than Microsoft can offer smaller companies looking to deploy Exchange. That's where collaboration service providers step in. They are experts at running and tailoring Exchange and other email and collaboration services for customers."

    The report highlights USA.NET's split-domain hybrid option, combining on-premise and cloud-based email and offering an economical way for companies to integrate their Exchange. Furthermore, USA.NET is cited as one of three vendors with a 100% SLA (service-level agreement) and is one of the only vendors to have a solution that is Microsoft Gold Certified and SAS 70 Type II certified.

    For more information on the report, please visit www.forrester.com.

    About Perimeter
    Perimeter E-Security is the trusted market leader of information security services that delivers enterprise-class protection and compliance. Through its cost-effective and scalable SaaS platform, Perimeter offers the most comprehensive compliance and security solutions that include: end-to-end secure messaging solutions, managed security services, vulnerability management and security consulting services.

    For more information about Perimeter, visit www.perimeterusa.com.

    Join Our Community
    Blog: www.perimeterusa.com/blog
    Twitter: www.twitter.com/PerimeterNews 
    Facebook: www.facebook.com/perimeterusa
    LinkedIn: www.linkedin.com/groupRegistration?gid=3109606

     

    CONTACT:
    Maggie Duquin Nolan / Sharon Oh
    Brainerd Communicators
    212-986-6667
    duquin@braincomm.com / oh@braincomm.com

    Perimeter E-Security Expands Sales Leadership Team to Drive New Product Portfolio Expansion

    March 9, 2011 Toggle Content

    Appoints Enterprise Software Sales Veteran to Executive Vice President of Global Sales

    MILFORD, CT, March 9, 2011 - Perimeter E-Security, the trusted market leader of information security and secure messaging services that deliver enterprise-class protection and compliance to companies of all sizes, today announced the expansion of its executive team with the appointment of Randal Skipper to Executive Vice President of Global Sales, effective immediately.

    Skipper's appointment comes on the heels of Perimeter's appointments of former Forrester Security Analyst Andrew Jaquith to Chief Technology Officer, and former McAfee executive John Viega to Executive Vice President of Products and Engineering.

    Several market trends continue to drive the Company's information security and messaging business including the growing sophistication of information threats, heightened compliance requirements and the consumerization of IT with growing use of smartphones and tablet devices across enterprises.

    "Perimeter finished up 2010 with strong business momentum as we sharpen our focus around our key offerings in managed security services and secure messaging," said Tim Harvey, CEO of Perimeter E-Security. "Randy's addition rounds out the executive leadership of our expanded product marketing and sales effort, complementing the outstanding technology leadership we've put in place behind John Viega and Andy Jaquith. Overall we are committed to approaching Perimeter's portfolio and our customers with a top-notch team as we seek to accelerate our growth in 2011 and beyond."

    Randy Skipper is an industry veteran that brings over 20 years of successful sales leadership to his new role of Executive Vice President, Global Sales at Perimeter. He most recently served as VP of Sales at MessageLabs, a leading provider of SaaS based email security services. He was responsible for growing and establishing the Americas business that eventually lead to a $700 million acquisition by Symantec Corporation. Prior to MessageLabs, Skipper was VP of Sales for Marimba Inc., a company he joined as a startup and grew to a successful IPO in five years and sold to BMC. In addition, Skipper has been VP of Sales-US for Intelligent Interactions, a company acquired by 24 by 7, and has held various sales management positions for Oracle Corporation. He holds a bachelor's degree in business from the University of Baltimore.

    As the only enterprise-class security services provider offering both comprehensive threat management and secure messaging, underpinned by strong compliance expertise, Perimeter protects over a half trillion dollars in assets for over 6,000 customers. The Company has been acknowledged in several prestigious rankings as one of the fastest growing security companies by the likes of Dow Jones Investment Banker, Inc. Magazine's annual Inc. 5000, and the Radicati Group.

    About Perimeter/USA.NET
    Perimeter E-Security is the trusted market leader of information security services that delivers enterprise-class protection and compliance. Through its cost-effective and scalable SaaS platform, Perimeter offers the most comprehensive compliance and security solutions that include: end-to-end secure messaging solutions, managed security services, vulnerability management and security consulting services. For more information about Perimeter/USA.NET visit www.perimeterusa.com.

    Contact:
    Maggie Duquin Nolan / Sharon Oh
    Brainerd Communicators
    212-986-6667
    duquin@braincomm.com / oh@braincomm.com

    Perimeter E-Security Delivers Threat Intelligence Service in Partnership with Secunia

    February 17, 2011 Toggle Content

    SAN FRANCISCO - February 17, 2011 - Perimeter E-Security, the trusted market leader of information security services, today announced that it has entered into a partnership with Secunia, the world-leading provider of reliable and actionable Vulnerability Intelligence.

    As the threat landscape is evolving on a daily basis, it is imperative that organizations and their IT security teams are aware of the latest vulnerability threats. Perimeter E-Security's Threat Intelligence Service, powered by Secunia, delivers the latest vulnerability information to customers. The service delivers only what is relevant to each customer, reducing the time for planning and remediation that may be required. The service will be available to both Perimeter's Vulnerability Management and MSSP customers beginning in Q1 2011.

    "Secunia's leadership in vulnerability advisories make them an excellent partner for Perimeter E-Security. With more Fortune 500 companies, financial services firms, and mid-sized businesses relying on our information security and secure messaging services than ever before, our Threat Intelligence Service must be powered by the best-in-class vulnerability data," stated John Viega, Executive VP, Products and Engineering, Perimeter E-Security. "We continue to evolve our services to deliver the most comprehensive protection for our customers' networks. The Threat Intelligence Services provides the data that customers need to plan for necessary system updates to be informed against the ever-changing cyber security threats."

    Through this partnership with Secunia, Perimeter E-Security will receive real-time vulnerability information directly from Secunia's award-winning Vulnerability Intelligence service. Threat Intelligence Service subscribing customers will receive daily updates for the vulnerabilities most relevant to their IT environments. "Knowledge is power - and powerful knowledge is what Secunia provides. Secunia's Vulnerability Intelligence is a complementary match for Perimeter E-Security's services, providing customers with valuable insights into the dangers that they may be facing so that they can adapt swiftly and take remedial action," said Niels Henrik Rasmussen, CEO & Founder, Secunia.

    About Secunia
    Secunia is the leading provider of IT security solutions that help businesses and private individuals globally manage and control vulnerability threats and risks across their networks and endpoints. This is enabled by Secunia's award-winning Vulnerability Intelligence, Vulnerability Assessment, and Patch Management solutions that ensure optimal and cost-effective protection of critical information assets. Secunia's proven, complementary portfolio; renowned for its reliability, usability, and comprehensiveness, aids businesses in their handling of complex IT security risks and compliance requirements across industries and sectors - a key component in corporate risk management assessment, strategy, and implementation.

    As a global player within IT security and Vulnerability Management, Secunia is recognised for its market-driven product development; having revolutionised the industry with verified and actionable Vulnerability Intelligence, simplified Patch Management, and automatic updating of both Microsoft and third party programs.

    Secunia plays an important role in the IT security ecosystem, and is the preferred supplier for enterprises and government agencies worldwide, counting Fortune 500 and Global 2000 businesses among its customer base. Secunia has operations in North America, the UK, and the Middle East, and is headquartered in Copenhagen, Denmark.For more information, please visit secunia.com

    Follow Secunia 
    • Twitter: http://twitter.com/Secunia 
    • Facebook: http://www.facebook.com/Secunia 
    • Blog: http://secunia.com/blog/
    • LinkedIn: http://www.linkedin.com/company/secunia

    Contact:
    Niels Henrik Rasmussen, CEO, Founder
    E-mail: nhr@secunia.com
    Mobile: +45 2123 4634

    Thomas Kristensen, CSO, Co-founder
    E-mail: tk@secunia.com
    Mobile: +45 2690 7565

    About Perimeter E-Security
    Perimeter E-Security is the trusted market leader of information security services that delivers enterprise-class protection and compliance. Through its cost-effective and scalable SaaS platform, Perimeter offers the most comprehensive compliance and security solutions that include: end-to-end secure messaging solutions, managed security services, vulnerability management and security consulting services.

    For more information about Perimeter E-Security visit www.perimeterusa.com.

    Join Our Community
    Twitter: www.twitter.com/PerimeterNews 
    Blog: www.perimeterusa.com/blog
    Facebook: www.facebook.com/perimeterusa
    LinkedIn: www.linkedin.com/groupRegistration?gid=3109606

    Contact:
    Maggie Duquin Nolan / Sharon Oh
    212-986-6667
    duquin@braincomm.com / oh@braincomm.com

    Take it to the Bank: Perimeter E-Security Unveils Top Five Critical Security Predictions for 2011

    December 16, 2010 Toggle Content

    Multiplying Threats, Mobile Security Fears and Escalating Compliance Pressures Trigger Need to Re-Evaluate Existing Security Practices

    MILFORD, CT - December 16, 2010 - Perimeter E-Security, the trusted market leader of information security services that delivers enterprise-class protection and compliance to companies of all sizes, today revealed its top five critical security predictions for 2011.

    "2010 was another year of living dangerously. Companies dealt with huge increases in malware threats, growing mobile security concerns about consumer devices such as iPads, and rising compliance pressures," said Andrew Jaquith, Chief Technology Officer of Perimeter E-Security. "Several high profile and sophisticated security attacks this year, including the attacks on Google and the release by WikiLeaks of US diplomatic cables, should cause companies of every size to reassess their existing security practices in the year ahead."

    Jaquith highlights that these incidents offered several key lessons. Increasingly sophisticated attackers are forcing defenders to raise their games, with tighter integration of defenses across content filters, endpoint controls and firewalls. The WikiLeaks incident, which culminated in the release of over 250,000 electronic cables, shows that data leakage prevention (DLP) products are no silver bullet. "Tools like DLP that inspect content are fine for filtering ‘toxic data' like credit card numbers, but less effective for controlling the spread of secrets. Traffic monitoring and regular privilege reviews would have been more effective," Jaquith added.

    As the only enterprise-class security services provider offering both comprehensive threat management and securemessaging, underpinned by strong compliance expertise, Perimeter protects over a half trillion dollars in assets for over 6,000 customers. Perimeter's broad capability and customer sets give the company a unique perspective on threat management data spanning anti-virus, firewall management, web content filteringintrusion detection and protection, and other data security and messaging applications.

    Amongst Perimeter's top five security predictions for 2011:

    Prediction #1 - Your employer will lock down your phone
    With the increasing adoption of consumer devices such as the iPad and other tablets by businesses, companies will need to impose common security controls on these devices, regardless of the brand. That means being able to manage many different types of post-PC devices. If you want to bring your mobile device to work, your employer will seek to enforce policies for passwords, device locking, remote wipe, and hardware encryption.

    Prediction #2 - DLP will go mainstream
    Although data leak prevention (DLP) products have their limitations, they are poised to go mainstream in 2011. Enterprises are under increasing pressures to keep their communications and devices free of "toxic data" such as credit card numbers, social security numbers, personal financial information and health care information. In the coming year, more companies across multiple industries will embrace DLP to keep their email and web content clean, and to filter data copied to removable media.

    Prediction #3 - The "Advanced Persistent Threat" meme will die
    The often broadly defined term "Advanced Persistent Threat" (APT), which to some vendors is described as malware, is in truth not a what, but a who. In the security community, APT refers to a long-term pattern of targeted sophisticated hacking attacks aimed at governments, companies and political activists, and also refers to the groups behind these attacks. APT will be replaced with the more accurate phrase "State-Sponsored Cyber Warfare or Actors" as opposed to the generic and misused APT.

    Prediction #4 - The U.S. will crawl towards EU-style data protection
    The U.S.'s liberal culture of shared Personal Information will move towards a more stringent consumer aware model requiring companies to be good custodians of Personal Identifiable Information, especially with financial and healthcare information. The Federal Trade Commission (FTC) December report "Protecting Consumer Privacy in an Era of Rapid Change" provided sweeping recommendations and mandates such as PCI, HITECH and state data protection laws are prime examples of this change. In addition to these regulations and recommendations, tort law will add another layer of definition making U.S. regulations much more closely aligned with EU's data privacy mandates.

    Prediction #5 - Public data security benchmarks will emerge
    Thus far, security has been hard to quantify. In the future, publicly available database sources such as Open Security Foundation's DataLossDB, a clearinghouse for documenting toxic data spills for personal information, will be used for benchmarking the safety level of companies. Mainstream security vendors will more likely showcase the health of their customers in security report cards. Furthermore, service providers will begin to collaborate to define common security metrics such as measures to compare companies and sectors and to provide a common baseline of security of companies' year over year.

    "Information security is becoming increasingly complex and requires continual education, expertise and investment to fully secure the enterprise. Every organization needs to re-evaluate their existing security policies, procedures and technologies to protect themselves from what cyber criminals and attackers are planning for 2011," added Jaquith.

    A replay of Perimeter's webinar called "Five Data Security Predictions for 2011" is available here:http://www.perimeterusa.com/knowledge-center/webinars/on-demand#162.

    About Perimeter E-Security
    Perimeter is the trusted market leader of information security services that delivers enterprise-class protection and compliance. Through its cost-effective and scalable SaaS platform, Perimeter offers the most comprehensive compliance, security and messaging services that include: hosted email, encrypted email, firewall management and monitoring, vulnerability scanning, intrusion and prevention, email anti-virus and spam, and email archiving. For more information about Perimeter visit www.perimeterusa.com.

    Media contacts

    Perimeter E-Security
    Maggie Duquin Nolan / Sharon Oh
    212-986-6667
    duquin@braincomm.com / oh@braincomm.com

    Perimeter E-Security Certified as PCI Security Standards Council Qualified Security Assessor

    November 22, 2010 Toggle Content

    Perimeter E-Security to advise on and assess client data security strategy

    MILFORD, CT - November 22, 2010 - Perimeter E-Security, the trusted market leader of information security services that delivers enterprise-class protection and compliance to companies of all sizes, announced today that Perimeter has successfully completed the PCI Security Standards Council Qualified Security Assessor (QSA) testing process and is validated ascompliant with the Payment Card Industry Data Security Standard (PCI DSS).

    The PCI Data Security Standard, endorsed by American Express, Discover Financial, JCB,MasterCard Worldwide and Visa International, requires merchants and serviceproviders that store, process or transmit customer payment card data to adopt information security controls and processes to ensure data integrity. Participating payment brands require PCI DSS compliance reports by a certifiedthird-party assessor for merchants and service providers that process credit card transactions to achieve compliance. More information on the council and the standard can be found at www.pcisecuritystandards.org

    As a Qualified Security Assessor, Perimeter is certified to help merchants manage data security risks, evaluate the security of their systems that store payment account data and assist them in achieving compliance with the PCI DSS.At Perimeter, Tom Neclerio, Chief SecurityOfficer and David Delarosa, Director of Consulting Services, were named Qualified Security Assessors for Perimeter. In an era of increasinglysophisticated attacks on systems, the PCI DSS certification reassures merchants that they are being assessed accurately and fairly against the most current payment industry requirements.

    "The PCI Security Standards Council is committed to helping everyone involved in the payment chain protect consumer payment data. By participating in the QSA certification process, Perimeter demonstrates they are playing an active part in this important end goal," said Bob Russo, general manager, PCI Security Standards Council.

    "Companies that fail to comply with these regulations not only face mounting fines, but also risk significant legal, monetary and reputational damage if customer data is lost or stolen,"said Tim Harvey, Chief Executive Officer of Perimeter E-Security. "By adding the QSA certification to our existing ASV certification, we're delivering the highest level of service and expertise to help our customers comply with the full suite of PCI standards."

    About PCI Security Standards Council 
    The mission of the PCI Security Standards Council is to enhance payment account security by fostering broad adoption of PCI security standards. For more information, please visit www.pcisecuritystandards.org

    About Perimeter E-Security
    Perimeter is the trusted market leader of information security services that delivers enterprise-class protection and compliance.  Through its cost-effective and scalable SaaS platform, Perimeter offers the most comprehensive compliance, security and messaging services that include: hosted email, encrypted email, firewall management and monitoring, vulnerability scanning, intrusion andprevention, email anti-virus and spam, and email archiving.  For more information about Perimeter visit www.perimeterusa.com.

    Media contacts 

    Perimeter E-Security
    Maggie Duquin Nolan
    212-986-6667
    duquin@braincomm.com

     

    PCI Security Standards Council
    Laura K. Johnson
    781-876-6250
    press@pcisecuritystandards.org

    Perimeter E-Security Appoints Leading Forrester Security Analyst to Chief Technology Officer

    November 8, 2010 Toggle Content

    Andrew Jaquith Will Lead Evolution of Perimeter's Flagship Security and Messaging Portfolio at Company's Boston Innovation Center

    MILFORD, CT, November 8, 2010 - Perimeter E-Security, the trusted market leader of information security and secure messaging services that deliver enterprise-class protection and compliance to companies of all sizes, today announced Andrew Jaquith as its new Chief Technology Officer, effective immediately. Most recently serving as a senior analyst with Forrester Research, Andrew brings more than 20 years of IT and information security experience.

    Andrew will spearhead Perimeter's technology strategy. He will be based in Perimeter's new innovation center in Boston, established earlier this year, to focus on the Company's core security and compliance technologies and further develop Perimeter's hallmark integrated user experience.

    "Andrew's track record and in-depth market expertise will elevate Perimeter's technology leadership and visibility as we refine our solutions to address the evolving messaging and security needs of our medium to large enterprise customers," said Tim Harvey, CEO of Perimeter E-Security.

    "Perimeter is the best kept secret in today's competitive security and compliance market," said Andrew Jaquith. "Enterprises of all sizes face increasing compliance burdens and an escalating threat environment. Over the last ten years, CIOs have had to cobble together a complex security infrastructure that isn't keeping pace. Perimeter offers cloud-based and managed services that make security simpler, with economies of scale and expertise that they can't get anywhere else. I am excited about the opportunity to drive Perimeter's vision forward and look forward to working with the management team to make that vision a reality."

    At Forrester Research, Andrew led coverage for data, endpoint and mobile security and wrote 20 popular reports on data leak prevention, encryption, endpoint security, mobile security and vendor M&A. Notable recent reports include "Security in the Post-PC Era," "Apple's iPhone and iPad: Secure Enough for Business?" and "The Forrester Wave: Data Leak Prevention Suites." Prior to Forrester, he served as program manager in Yankee Group's enabling technologies enterprise group, with coverage of client security, digital identity, and web application security. Before joining Yankee Group, he co-founded @stake, a security consulting pioneer, which Symantec acquired in 2004. Previously, he held project manager and business analyst positions at Cambridge Technology Partners and FedEx.

    Andrew is the co-developer of the Apache JSPWiki open source wiki software package and the author of the 2007 Addison-Wesley Professional book "Security Metrics: Replacing Fear, Uncertainty and Doubt." The book has sold more than 10,000 copies and has been praised by reviewers as "one of the best written security books ever." He holds a B.A. in Economics and Political Science from Yale University.

    Recently, Perimeter E-Security was acknowledged in several prestigious rankings as one of the fastest growing security companies. Dow Jones Investment Banker cited Perimeter E-Security as one of six profitable, and fast-growing venture-backed enterprise technology companies to watch. The Company was also included in Inc. Magazine's annual Inc. 5000 for the fourth consecutive year and the Connecticut Technology Council and Marcum LLP recognized Perimeter as one of the 40 fastest growing companies in Connecticut.

    About Perimeter/USA.NET
    Perimeter/USA.NET is the trusted market leader of information security and secure messaging services that delivers enterprise-class protection and compliance. Through its cost-effective and scalable SaaS platform, Perimeter/USA.NET offers the most comprehensive compliance, security and messaging services that include: hosted email, encrypted email, firewall management and monitoring, vulnerability scanning, intrusion detection and prevention, email antivirus and spam and email archiving. For more information about Perimeter/USA.NET visit www.perimeterusa.com.

    Contact:
    Maggie Duquin Nolan / Sharon Oh
    Brainerd Communicators
    212-986-6667
    duquin@braincomm.com / oh@braincomm.com

    USA.NET, a Perimeter E-Security Company, Recognized as Top Player in Hosted Business Messaging Services for 4th Year

    October 11, 2010 Toggle Content

    Recognition Comes as Growing Number of Enterprises Adopt Outsourced Email Hosting to Address Security, Compliance and Cost Challenges
     

    MILFORD, CT, October 11, 2010 -The Radicati Group, Inc., ranked USA.NET as a "Top Player" in both their Hosted Business Email-Market Quadrant 2010 report and the Hosted Microsoft Exchange-Market Quadrant 2010 report.  USA.NET, a Perimeter E-Security company, is recognized for leading the market in both market share and for its comprehensive suite of hosted business email services. 

    The recognition aligns with increasing demand for USA.NET Microsoft®Exchange Hosting solution from medium to large enterprises.  In fact, of USA.NET's new client wins to date in 2010, 80 percent are organizations with over 1,000 seats.  New customers, such as Farmers Insurance, State of Oregon and Chick-fil-A, join USA.NET existing clients who include Cheesecake Factory, UHY Advisors, Inc. and United Airlines in implementing USA.NET's secure messaging suite.

    "Email is one of the most significant compliance and security risks for any enterprise today," said Tim Harvey, CEO of Perimeter.  "There is a tremendous amount of sensitive corporate and personal data traversing email traffic today and the risks are only increasing.  Organizations recognize that email has inherent risks, and is obviously a critical business requirement to be managed.  And as such, corporations are turning to outside expertise to alleviate the burden of their own resource-constrained IT departments and budgets in managing their email systems."

    The Radicati reports highlight the full suite of end-to-end messaging solutions of USA.NET's business messaging solutions, including integratedemail/messaging archivingencryptedemailemailsecurity (anti-virus and SPAM solutions), Microsoft SharePoint® and mobility.  The reports cite the following key strengthsfor its offerings:

    • Highly scalable and customizable Microsoft Hosted Exchange solution, designed to fit a company's current infrastructure.
    • Three hosted email solutions for customers to choose from; Microsoft Hosted Exchange, Commercial Messaging Solution (CMS) and Net@dress.
    • Offers a number of proprietary email related services included in its hosted email offerings, which provides better price value to their customers.
    • SAS 70 Type II certified, Microsoft Gold Certified Partner and offers a 99.9% SLA for Microsoft Hosted Exchange solution.
    • Flexibility for customers to mix-and-match Commercial Messaging Solution (CMS) and Microsoft Hosted Exchange mailboxes to reduce their Total Cost of Ownership (TCO).
    • Free dedicated technical account manager (TAM) to serve as a private IT consultant.
    • Credibility with organizations that require enterprise-level secure hosted services.

    "Fast changing business and regulatory requirements, IT budgetary pressures, and the rapid growth in email volume are motivating medium to large organizations to outsource their messaging infrastructure," said Sara Radicati, President & CEO, The Radicati Group.  "We've ranked USA.NET as a Top Player and they have established credibility in hosting dedicated and shared environments for businesses with highly regulated or complex requirements such as financial institutions, multi-national enterprises and government agencies."

    "Being consistently ranked by The Radicati Group is a testament to our exceptional track record in the hosted email and messaging market and further validates the trend towards medium to large businesses seeking to integrate security and compliance with their business messaging needs," added Tim Harvey.

    USA.NET, a Perimeter E-Security Company, offers a breadth of email related services including secure hosted email, integrated email/messaging archiving, encrypted email, email security (anti-virus and SPAM solutions), Microsoft SharePoint and mobility solutions.  Perimeter also has a suite of security solutions to meet the increasing demands of compliance and blended security threats.   

    About Perimeter 
    Perimeter is the trusted market leader of information security services that delivers enterprise-class protection and compliance.  USA.NET, a wholly owned subsidiary of Perimeter, is the recognized leader for Hosted Email delivering secure messaging, collaboration, mobility, archiving and advanced infrastructure solutions for businesses of all sizes.  Through its cost-effective and scalable SaaS platform, Perimeter offers the most comprehensive compliance, security and messaging services that include: hosted email, encrypted email, firewall management and monitoring, vulnerability scanning, host intrusion andprevention, email anti-virus and spam, remote data backup and email archiving.  For more information about Perimeter visit www.perimeterusa.com.

    For additional informationcontact:

    Maggie Duquin Nolan / Ray Yeung
    BrainerdCommunicators
    212-986-6667

    Perimeter E-Security Consolidates R&D in United States; Opens Boston Innovation Center

    August 3, 2010 Toggle Content

    New Boston Innovation Center Complements Raleigh Facility

    MILFORD, CT - AUGUST 3, 2010 - Perimeter E-Security, the trusted market leader of information security services that deliver enterprise-class protection and compliance to companies of all sizes, today announced it has consolidated its software engineering team in Boston. The expanded group will focus on the company's core security and compliance technologies and further develop Perimeter's hallmark integrated user experience.

    "There's a difference between innovation and execution. We're here to innovate and Boston is home to outstanding engineering talent.  By centralizing our resources with our engineering and product development teams, we're creating greater efficiencies and synergies that cannot be replicated offshore," said John Viega, EVP of Products and Engineering. "The combined pressures of compliance and security have intensified the need for integrated security suites - and we plan to maintain our lead here."

    The company expects to continue to grow the team over the next two years.

    Technologies developed in the Innovation Center will be used across the company's vulnerability assessment and managed services offerings, which include robust compliance and security reporting tools and an industry-leading security-management platform that integrates multiple security services into one portal.

    Viega also cited cost advantages for the move: "When you do the real math, it's far more cost effective to do R&D in the United States."

    An esteemed author of numerous security books, including "Myths of Security" and the seminal "Building Secure Software," and a contributor to several prominent technology standards, Viega leads Perimeter's product management and product development. He founded Secure Software, later acquired by Fortify, and is an editor for IEEE Security and Privacy magazine. His technical work in cryptography has been standardized by NIST, the IEEE and IETF.

    Perimeter continues to garner an accolade of technology awards, such as SC Magazine's recent 5-Star award for Perimeter's firewall services.  Launched in 2009, Viewpoint 2.0, the industry's first correlative security engine with built-in compliance profiler, is generating enormous positive response from customers by helping them to gain an understanding and manage security threats across a company's entire network from one single platform.

    About Perimeter 
    Perimeter is the trusted market leader of information security services that delivers enterprise-class protection and compliance.  Through its cost-effective and scalable SaaS platform, Perimeter offers the most comprehensive compliance, security and messaging services that include: hosted email, encrypted email, firewall management and monitoring, vulnerability scanning, host intrusion and prevention, email antivirus and spam, remote data backup and email archiving.  For more information about Perimeter visit www.perimeterusa.com.

    For additional information contact:

    Ray Yeung / Maggie Duquin Nolan
    Brainerd Communicators
    212-986-6667
    yeung@braincomm.com / duquin@braincomm.com

    McAfee Veteran Joins Perimeter E-Security's Compliance and Security Development Team

    March 24, 2010 Toggle Content

    Accomplished Author and Security Expert with Track Record in Development of Leading Enterprise Security Offerings

    MILFORD, CT, March 24, 2010 - Perimeter E-Security, the trusted market leader of information security services that deliver enterprise-class protection and compliance to companies of all sizes, today announced the appointment of John Viega to the position of EVP of Products and Engineering. An esteemed author of numerous security books, including the recent "Myths of Security" and the seminal "Building Secure Software," as well as a contributor to several prominent technology standards, John will be responsible for leading Perimeter's product management and product development.

    "John brings a rich security expertise to further enhance the development of Perimeter's technology roadmap," said Tim Harvey, CEO of Perimeter E-Security. "We look forward to John's product leadership role in driving and refining our market leading suite of services to help address the increasingly complex compliance and security needs of our customers."

    Most recently, John was at McAfee, where his jobs included CTO and VP of Engineering for the Software-as-a-Service business unit and where he worked on M+A and also owned McAfee's core technologies, such as anti-virus and the SiteAdvisor product.

    "The combined pressures of compliance and cyber security is creating a need for a new class of tools to address the growing new regulations and threats facing all businesses today," said John Viega. "Not only is Perimeter's compliance,messaging and security business strong, but there is tremendous growth potential. Viewpoint is a particularly impressive product. No other company offers an easy to use security management platform that integrates so many security services into one portal. I look forward to bringing my technology experience to spearhead Perimeter's talented product development team."

    Perimeter continues to garner an accolade of technology awards, such as SC Magazine's recent 5-Star award for Perimeter's firewall services. Launched in 2009, Viewpoint 2.0, the industry's first correlative security engine with built-in compliance profiler, is generating enormous positive responses from customers by helping them to gain an understanding and manage security threats across a company's entire network from one single platform.

    John also founded Secure Software, which was later acquired by Fortify, where John is still an advisor. John is an editor for IEEE Security and Privacy magazine, and his technical work in cryptography has been standardized by NIST, the IEEE and IETF. He has a MS in Computer Science and a BA from the University of Virginia.

    About Perimeter 
    Perimeter is the trusted market leader of information security services that delivers enterprise-class protection and compliance. Through its cost-effective and scalable SaaS platform, Perimeter offers the most comprehensive compliance, security and messaging services that include: hosted email, encrypted email, firewall management and monitoring, vulnerability scanning, host intrusion and prevention, email antivirus and spam, remote data backup and email archiving. For more information about Perimeter visit www.perimeterusa.com.

    For additional information contact:
    Michele Clarke / Maggie Duquin
    Brainerd Communicators
    212-986-6667
    clarke@braincomm.com / duquin@braincomm.com

    Stringent, Sweeping Rise in Compliance Regulations Drives Momentum at Perimeter E-Security

    March 1, 2010 Toggle Content

    Financial Institutions Showing Strongest Need; Four New Community Banks Join More Than 2,000 Now Relying on Perimeter for Compliance, Security Suite; Company Embraces New Branding, Web Site Approach to Reflect Move

    MILFORD, CT, March 2, 2010 - Perimeter E-Security today revealed a substantial rise in demand from customers needing help complying with increasingly stringent and sweeping regulations, led by the financial services sector.  The momentum spans existing and new customers, the company said.  Separately, the company rolled out revamped branding to reflect the moves.

    "There has never been a more difficult time to comply with financial, legal, privacy and other regulations, and the outlook is for more stringent demands and complexity," said Tim Harvey, CEO of Perimeter E-Security.  "Add to that the alarming spike in security threats, and investing in compliance and information security is easily rising to the top of corporate priorities.  For larger financial institutions, the costs of managing all of this in-house are daunting; for smaller players, the burden is crippling. And the finance sector is seeing the brunt of it."

    With customers across many different industries, and leadership in the finance sector, Perimeter E-Security is the trusted market leader of compliance and regulatory security services that deliver enterprise-class protection to companies of all sizes.  Since 2008, Perimeter has added hundreds of new financial services customers and remains the market leader in serving more than 2000 financial institutions.

    Large and community financial institutions embody new imperative
    From major banks to community financial institutions, the imperatives are clear: solve the regulatory and security challenges in a way that manages costs, relieves internal resources, and improves success by reducing overall complexity.

    Community financial institutions, which constitute 97 percent of all banks and credit unions, lack the internal resources that larger banks and credit unions have to secure their institution. Yadkin Valley Bank, Lakeland Bank, Mid Penn Bank and Money One FCU join the likes of Lisbon Community Federal Credit Union and NuUnion Credit Union in turning to Perimeter for their security, regulatory compliance and risk mitigation needs.

    "As a small financial institution, key employees at Lisbon Community Federal Credit Union have to wear many hats," said George R. Roy, Lisbon Community Federal Credit Union.  "By relying on Perimeter, we are able to exceed regulatory compliance in various IT areas while continuing to do what we do best - that is, serve our Membership."

    Outsourcing makes sense for NuUnion - in terms of costs and a level of protection the credit union can't put a price on.  "The Perimeter E-Security Security Operations Center provides 24x7 network monitoring and reporting for NuUnion.  I know we're protected no matter what time of day it is," MaryAnne MacIntosh, CISSP, IT Security Administrator, NuUnion Credit Union. 

    An investment in answers
    "Perimeter has invested over $20 million over the past 10 years in the resources, expertise and best-in-class technologies to focus our customers on their most critical needs and highest return on investment, and we continue to invest in our expertise as a basic commitment to our clients," said Kurt Heinemann, Chief Marketing Officer of Perimeter E-Security.

    Indeed, to make it easier for companies of all sizes to identify and evaluate their situation, Perimeter today launched a new Web site that allows companies to look for the information they need in three different formats. They can look for specific services, services that are relevant to their industry and by compliance or regulatory need.

    The Web site is complemented by a customer communications plan and the launch of the Perimeter Secured Program.

     

    About Perimeter 
    Perimeter is the trusted market leader of information security services that delivers enterprise-class protection and compliance. Through its cost-effective and scalable SaaS platform, Perimeter offers the most comprehensive compliance, security and messaging services that include: hosted email, encrypted email, firewall management and monitoring, vulnerability scanning, host intrusion and prevention, email antivirus and spam, remote data backup and email archiving.  For more information about Perimeter visit www.perimeterusa.com.

     

    For additional information contact:
    Maggie Duquin / Michele Clarke
    Brainerd Communicators
    212-986-6667
    duquin@braincomm.com / clarke@braincomm.com

    Perimeter E-Security Releases Top 10 Information Security Threats for 2010

    January 18, 2010 Toggle Content

    Milford, CT, January 18th, 2009: Perimeter E-Security, the trusted market leader of information security services that delivers enterprise-class protection and compliance to companies of all sizes, unveiled its Top 10 Information Security Threats for 2010.

    "The start of a new year is a great time for companies to evaluate their information security practices and begin thinking about what threats they'll be facing in the coming year," said Kevin Prince, CTO, Perimeter E-Security. "As these security threats are becoming more serious and difficult to detect, it is vital for companies to understand what they can do to best protect their systems and information."

    Perimeter's ranking of the Top 10 information security threats for 2010:

    1. Malware (Rising Threat)
    Last year, Malware was listed as the second highest ranked threat to organizations on Perimeter E-Security's list of top threats. There are many methods to install malware on systems, including the use of client-side software vulnerabilities. Browsers remain a top target for vulnerabilities. In 2009, the FBI reported that for the first time ever, revenue from cyber crime had exceeded drug trafficking, estimated at taking in more than one billion annually in profits.

    2. Malicious Insiders (Rising Threat)
    Malicious insiders were listed as the top threat for 2009, but have fallen to the #2 spot for 2010. With the downturn in the economy last year, it was no surprise that many desperate and disgruntled employees attempted to exploit the companies they currently or previously worked for. There is no way to eliminate the threat of malicious insiders completely, but through good security policies and followed procedures, the incidents could be a fraction of what they are today. With the economy still suffering and still high unemployment levels, Malicious Insiders w2ill continue to be a threat.

    3. Exploited Vulnerabilities (Steady Threat)
    Vulnerability exploit is at the heart of hacking and data breaches. Worms, viruses, malware, and a host of other attack types often rely on vulnerability exploit to infect, spread and perform the actions cyber criminals want. And yet, organizations are still not doing what they need to for patch management. Hackers are more often exploiting client side vulnerabilities and other vulnerabilities associated with 3rd party applications.

    4. Careless Employees (Steady Threat)
    Careless and untrained insiders will continue to be a very serious threat to organizations in 2010. Insiders can be broken down into three categories: careless & untrained employees, employees that are duped or fall prey to social engineering type attacks, and malicious employees. Protecting a network and critical and sensitive data is done very differently for each type. Policies, procedures, training and a little technology can make a world of difference in reducing an organization's risk to careless insiders.

    5. Mobile Devices (Rising Threat)
    Mobile devices have become a plague for information security professionals. There are worms and other malware that specifically target these devices such as the iPhone worm that would steal banking data and enlist these devices in a botnet. Theft is still a major cause of data breaches as mobile devices, especially laptops, are the main culprits. Tens of thousands of laptops are stolen each year and often these have sensitive data that require public disclosure as a data breach.

    6. Social Networking (Rising Threat)
    Social networking sites such as Facebook, MySpace, Twitter and others have changed the way people communicate with each other, but these sites can pose serious threats to organizations. One main problem is that there is a trust component to these sites which makes them fertile ground for identity thieves. There is also a personal safety issue. Social networking sites are a stalker's dream come true. Social networking sites are breeding grounds for SPAM, scams, scareware and a host of other attacks and these threats will continue to rise.

    7. Social Engineering (Steady Threat)
    Social engineering is always a popular tool used by cyber criminals and phishing is still a popular method for doing just that. In fact, these new venues make social engineering even more effective. This year will have an added measure of complexity when it comes to social engineering attacks. Beginning sometime mid-2010, domain names will be expanded to include Japanese, Arabic, Hindi and even Greek characters, and with all of these characters being available for domain names, no longer will looking at a domain help one determine if it's legitimate or not.

    8. Zero-Day Exploits (Rising Threat)
    Zero-day exploits are when an attacker can compromise a system based on a known vulnerability but no patch or fix exists, and they have become a very serious threat to information security. Zero-day vulnerabilities are being discovered in traditionally very secure protocols such as SSL and TLS. The zero-day vulnerability could also be in providers.

    9. Cloud Computing Security Threats (Rising Threat)
    Using cloud based (i.e. Internet based) applications may not be as secure as once thought with many stories in 2009 regarding cloud based security issues. Many are calling for forced encryption to access "in the cloud" services. As cloud computing grows in popularity over the next few years, cloud security will become a very big issue.

    10. Cyberespionage (Rising Threat)
    Cyberespionage is a threat that's being heard more and more all the time and there have been a flood of stories in 2009 on this subject. Most of these incidents surround government bodies and agencies and therefore have not been a huge threat to most individual organizations. However, since cyberespionage has major implications for the government, it is a rising threat that must be closely monitored.

    "Information security is an ever-evolving discipline that requires tremendous expertise, time, and money to effectively manage. Every organization should take stock of what they are doing today and how well their current solutions mitigate the risk of the top 10 threats. In most cases, adjustments will need to be made and new technology should be implemented to ensure that the organization is properly prepared for what cyber criminals, spammers, phishers, and hackers are planning for 2010," added Prince.

    Perimeter E-Security Exposes Top Ten Biggest Security Breaches and Blunders of 2009

    November 23, 2009 Toggle Content

    Perimeter E-Security, the trusted market leader of information security services that delivers enterprise-class protection and compliance to companies of all sizes, announced the top ten biggest information security breaches and blunders of 2009. According to Chief Technology Officer, Kevin Prince, there is a common thread between all of these incidents: they could have been avoided.

    "2009 has been a year full of data breaches, compromises and exposures all around cyber-criminality. These incidents could have been prevented by adopting basic security standards and embracing a culture of security," added Prince. "Most companies actually know exactly where they lack security and where their gaps and exposures are. But knowing this, they still ‘play with fire' and hope that they won't get burned. Now is the time for everyone to take into account of all the malicious breaches and blunders that have happened in the last year alone, and take the time to reconfigure their network protection systems to prevent these mishaps from happening to them."

    Here's the list of the top 10 biggest information security breaches and blunders in 2009:

    #10 - Malicious Codes' Extended Stay

    Hackers broke into web servers owned by a major domain registrar and hosting provider and planted rogue malware that resulted in the compromise of more than 573,000 debit and credit card accounts. The malicious code was in place for over three months. This type of "extended stay" of malicious code is a negative trend that showed progress in 2009.

    #9 - The Ease of Hacking a CEO's Mailbox

    A significant hosted email provider offered a $10,000 prize to anyone who could hack into its CEO's mailbox. The company used the authentication method, providing one-time pin code and even gave usernames and passwords. Hackers successfully broke in, bypassing the 2nd factor authentication using a cross site scripting vulnerability.

    #8 - The Jealous Boyfriend

    You can't forget the man who sent spyware to his girlfriend, who then opened the email on her work computer, resulting in a data security breach on a major children's hospital network. The hospital could have used a web content filtering solution, but even that wouldn't completely eliminate the problem. This particular breach shows that some healthcare organizations can still be apathetic towards information security.

    #7 - Macking

    Media hacking or "macking" has become quite popular in 2009. Macking, characterized as the lowest of the low hanging fruit, can be very profitable for cyber criminals in this day in age where search engines can be easily manipulated, botnets can send billions of email messages, and social network sites have worms that can spread messages.

    #6 - Insiders Everywhere

    This year was also the year of insider breaches. A temporary telecom company employee was arrested on charges of stealing personal information and then pocketing more than $70,000 by taking out short-term payday loans. Even one of the world's leading anti-virus and internet security provider had an international office employee steal customers' credit card numbers. Insider breaches will continue to be a rising threat for 2010 and beyond, as long as companies don't have the proper policies in place to prevent them.

    #5 - 160,000 California University records hacked

    At one of California's most esteemed universities, personal information of 160,000 current and former students and alumni may have been comprised. The breach was discovered April 21, 2009, but the database had been illegally accessed by hackers over six months prior in October 2008. Organizations must be constantly tracking and aware of hackers setting up shop on one or more of their systems.

    #4 - Virginia Department of Health Professions Blackmail

    The FBI and Virginia State Police have been hunting down hackers who demanded that the state pay $10 million dollars ransom for the return of millions of personal pharmaceutical records that claimed to have been deleted and stolen from the Prescription Monitoring Program. The alleged "deleted data" was backed up and secured within days of the ransom demand. Modern hackers are becoming more bold and fearless.

    #3 - Google

    In 2009, Google had its fair share of data breaches, in its Google apps, Google AdWords, Google Docs, Gmail and more. As one of the biggest internet organizations, it's also one of the most targeted by hackers and other malicious threats.

    #2 - Social Networking Sites

    Twitter was hacked so many times in 2009 we could have a top 10 Twitter breach article by itself.

    Whether it is individual accounts being compromised like Britney Spears, Twitter employees, or

    Twitter 3rd parties, Twitter has equal opportunity exploitability. Facebook, YouTube and MySpace aren't any better. Social networking sites have had a tough year as far as data breaches and blunders are concerned and it's not going to be much better in 2010.

    #1 - Nation's largest payment processor is poster child of breaches

    One of the nation's leading payment processor is this year's new poster child of data security breaches. The official court proceedings report that 130 million records were compromised. The company processes credit cards for over a quarter of a million merchants nationwide. They have had 31 separate lawsuits filed against them as a result of the breach and about 700 banks announced losses as well. The good news is that we caught the bad guys! Albert "Segvec" Gonzalez has been indicted by a federal grand jury in New Jersey along with two unnamed Russian conspirators.

    "2009 was a banner year for negative information security news and as we enter 2010, we are seeing more regulations, more fines, and more lawsuit filings - all related to information security. Data security breaches are nasty business and should be avoided at all costs," added Prince.

    Perimeter E-Security Names Managed Services Veteran Tim Harvey as CEO

    November 9, 2009 Toggle Content

    Perimeter E-Security, the trusted market leader of information security services that deliver enterprise-class protection and compliance to companies of all sizes, today announced the appointment of Tim Harvey to the position of Chief Executive Officer. An exceptional leader with deep software sector expertise, Tim has a track record in transitioning companies to their next growth stage.

    "We are delighted to welcome Tim as our new CEO; he is an accomplished software executive, whose leadership skills align with the accelerated growth track of Perimeter," said Richard Dobrow, President and Chief Operating Officer of Perimeter E-Security. "Tim brings a rich history of experience in the software and managed services industry and we are confident that with his track record, Perimeter will reach new heights in its growth strategy as a market leader of information security and messaging services.

    "Perimeter has a highly differentiated approach towards security, tremendous talent and an amazing growth opportunity," said Tim Harvey. "I look forward to bringing my experiences to further expand Perimeter's scale in delivering superior value to its customers, partners and employees."

    Perimeter has experienced fast-paced growth and has established itself as the trusted and award-winning market leader with medium-sized financial institutions and today more than 2000 U.S. financial institution customers rely on Perimeter's services. As businesses across industries struggle with the cost, complexity and compliance requirements of managing and protecting their information, Perimeter has expanded its service offerings across broad industries. The company continues to garner an accolade of awards, such as SC Magazine's recent 5-Star award for Perimeter's firewall services and the Radicati Top Player recognition for hosted business email service.

    Most recently, Tim was the CEO and President of XAware, a leading provider of commercial open source data integration software and services, where he led the strategy and transitioned the company from proprietary middleware to an open source vendor, resulting in its subsequent sale. He joined XAware from S1 Corporation as Senior Vice President of Sales, Marketing and Product Management where he delivered a significant increase in sales revenues and implemented new sales methodologies.

    Prior to S1, Tim served as Chief Operating Officer at SynQuest where he helped manage the company's significant growth leading to an IPO in August 2000 and subsequent merger. He also served in other senior roles at Datalogix and Management Science America. Tim graduated from the University of Florida with a BSBA in Finance and served four years as an officer in the United States Marine Corps.

    Perimeter E-Security Launches Archive Manager to Address Federal Email Compliance and Maintain Business Operations During a Disaster

    October 19, 2009 Toggle Content

    Perimeter E-Security, the trusted market leader of information security services that deliver enterprise-class protection and compliance to companies of all sizes, today introduced its Archive Manager that delivers the highest level of Federal Rules of Civil Procedure (FRCP) compliance capabilities, previously afforded only to the brokerage industry, to the broader market. In addition the integrated Business Continuity engine enables companies to have full access to their email via a web browser to meet electronic discovery requests and when their primary email service is lost.

    According to IDC, e-mail volume has doubled each year to over 40 billion person-to-person e-mails daily and the volume is expected to continue to grow over 18 percent annually by 2011. To meet FRCP mandates, companies must be able to produce all data such as messages required by litigation in a federal court quickly. The compliance demands combined with email being one of the easiest ways for hackers, spammers and other malicious threats to penetrate and disrupt business operations, have made email security a top concern.

    Now all businesses can benefit from the highest level of protection with guaranteed compliance that has been demanded of the brokerage industry since the FRCP regulation went into effect, said Doug Howard, Chief Strategy Officer of Perimeter. The introduction of our Archive Manager to our Hosted Exchange service delivers the most sophisticated level of compliance functionality with full redundancy and an innovative business continuity service so our customers can focus their resources on their core business.

    The Unix-based archiving solution also delivers a web based business continuity solution so users can send, receive and archive messages in real time simply by accessing the Internet. Customers that have Perimeter's USA.NET hosted email service benefit from a 100 percent SLA with the integrated redundancy of the service.

    The Archive Manager provides roles-based access so end user roles can access their own archives, while administrator and supervisory roles can be created to allow other user archives to address legal discovery searches and HR needs. Advanced search and filter functions have also been built into the Archive Manager to assist in finding important messages quickly.

    Perimeter's USA.NET Message Continuity & Archiving solutions address the complex challenges around message security, intellectual property retention and preservation for regulatory compliance.

    About USA.NET
    USA.NET, a wholly owned subsidiary of Perimeter, is the recognized leader for Hosted Email delivering messaging, collaboration, mobility, archiving and advanced infrastructure solutions for businesses of all sizes. USA.NET's global infrastructure serves clients in over 120 countries. Cited as the "Top Player" for the hosted business email market by The Radicati Group, Inc., USA.NET is SAS 70 Type II Audited, Microsoft Gold Certified, a member of the Microsoft Technology Adoption Program for Exchange, and winner of the Microsoft Excellence Award for Exchange Hosting Solutions. For more information about USA.NET visit www.usa.net or call 800-653-0179.

    Increased Reliability Demands Drive 18% Growth in Email Hosting Service from Perimeter E-Security

    October 5, 2009 Toggle Content

    Perimeter E-Security, the trusted market leader of information security and messaging services that deliver enterprise-class protection and compliance to companies of all sizes, today announced that its USA.NET Microsoft® Exchange Hosting solution has experienced an 18% growth over the past twelve months, adding 200,000 seats on the Company’s base of 1.1 million.  The company also announced today that industry leading analyst firm, The Radicati Group, Inc., ranked USA.NET as a "Top Player" in their Hosted Business Email–Market Quadrant 2009 report and the Hosted Microsoft Exchange–Market Quadrant 2009 report.  USA.NET is recognized for leading the market in both market share and for its comprehensive suite of hosted business email services.

    Separately, Perimeter announced that an increasing number of customers are adding hosted email services to their existing security suites to create a comprehensive security approach.  

    “Being consistently ranked by The Radicati Group for the third consecutive report is a testament to our exceptional track record and unparalleled experience in the hosted email and collaboration market and underscores how mission-critical email performance is for businesses of all sizes,” said Doug Howard, Chief Strategy Officer of Perimeter.  “The power of our security, email and collaboration solutions is driving critical mass in new customer categories beyond core financial services such as hospitality.  Since April of this year, we have seen our current customers adding services to their existing hosted email packages, and new customers seeking our solutions to help them remain laser focused on their core business instead of needing to divert resources to managing email systems.” 

    The Radicati reports highlight the full suite of end-to-end messaging solutions of USA.NET’s two business messaging solutions: CMS and Microsoft Hosted Exchange.  The reports highlight the following key strengths for USA.NET:

    • Flexibility to combine Microsoft Hosted Exchange mailboxes with CMS mailboxes to tailor cost-effective email solutions.
    • Highly scalable and customizable Microsoft Hosted Exchange offering that can be modified to fit a company’s current needs and infrastructure.
    • 99.9% SLA for Microsoft Hosted Exchange solution.
    • Free dedicated technical account manager (TAM), to serve as a private IT consultant for customers.
    • Microsoft Gold partner with competencies in advanced infrastructure, mobility, hosting and security.
    • Extensive migration experience across a full spectrum of messaging applications including Novell GroupWise, IBM Lotus Notes, POP systems, competitive hosting systems and legacy versions of Exchange.
    • Enhanced credibility with Perimeter E-Security backing in verticals that rely on security, such as financial services and history as one of the first hosting providers.

    As business email systems are becoming increasingly complex, specialized and central to communications, customers such as Belo, Cheesecake Factory, UHY Advisors, Inc. and United Airlines are relying on Perimeter’s trusted hosting services to assure the reliability, uptime and security requirements of their business messaging needs.  

    “Before selecting USA.NET, we reviewed a number of top hosted email service providers and we’re thrilled with our decision.  Following a highly successful migration, we’re continuing to extend the USA.NET hosted solution across our company,” said Craig Harper, Vice President of Technology, Belo Corp.   

    Perimeter’s USA.NET Microsoft Exchange Hosting solution offers all the benefits of Microsoft Exchange with the high-touch support, integration capabilities, scalability and cost benefits of a premier outsourced model.  As part of this service, Perimeter performs maintenance, patches, upgrades and backups, conducts training for staff members, handles migration, and provides continuing management of email and email security on a 24/7 basis. 

    About USA.NET 
    USA.NET, a wholly owned subsidiary of Perimeter, is the recognized leader for Hosted Email delivering messaging, collaboration, mobility, archiving and advanced infrastructure solutions for businesses of all sizes. USA.NET's global infrastructure serves clients in over 120 countries. Cited as the "Top Player" for the hosted business email market by The Radicati Group, Inc., USA.NET is SAS 70 Type II Audited, Microsoft Gold Certified, a member of the Microsoft Technology Adoption Program for Exchange, and winner of the Microsoft Excellence Award for Exchange Hosting Solutions. For more information about USA.NET visit www.usa.net   or call 800-653-0179.

    Perimeter E-Security Garners 5 Star Product Review from SC Magazine

    September 22, 2009 Toggle Content

    Perimeter E-Security, the trusted market leader of information security services that deliver enterprise-class protection and compliance to companies of all sizes, today announced that it garnered a Five Star review from SC Magazine for its Firewall and Intrusion Prevention Service. The review, published in the September issue of the magazine, assigns Perimeter a five star rating in all seven attribute categories; features, ease of use, performance, documentation, support, value for money and overall rating. 

    The SC Magazine review declares Perimeter's Firewall and Intrusion Prevention Service as a highly customizable service that can monitor and manage various threats against the network perimeter and a very competent offering priced right. 

    "We are honored to receive this recognition from such a respected industry publication," said Kurt Heinemann, Chief Marketing Officer at Perimeter. "We strive to ensure that our customers receive the highest-quality information security services and regularly benchmark our customer satisfaction, which has consistently scored a 97.5 percent overall satisfaction rating."

    Perimeter's Firewall and Intrusion Prevention Service provide 24/7 real-time protection. The Company's security analysts are immediately notified when suspicious activity is detected and take appropriate action. The Company monitors the network, configures and maintains the firewall device, monitors logs and analyzes trends in intrusion attempts.

    Perimeter E-Security Ranks on the 2009 Inc. 5000

    August 24, 2009 Toggle Content

    Perimeter E-Security, the trusted market leader of information security services that delivers enterprise-class protection and compliance to companies of all sizes, announced its recognition on Inc. magazine’s third annual Inc. 5000, an exclusive ranking of the nation's fastest-growing private companies. The list represents the most comprehensive look at the most important segment of the economy.

    “It’s an honor to be included in this prestigious business ranking again for the third consecutive year.   Perimeter has demonstrated resilience in this economy and we’ve achieved a 38 percent growth in revenues since 2007,” said Kurt Heinemann, Chief Marketing Officer at Perimeter. “While companies have trimmed IT spending during the economic downturn, information security services remains an area of increased investment as companies across sectors face new heightened security and compliance risks.  Perimeter’s flexible and cost-effective security-as-a-service platform is becoming the go-to source for both small-to-medium and large enterprises.”

    The 2009 Inc. 5000 serves as a unique report card on the U.S. economy.  Despite the ongoing recession, aggregate revenue among the companies on the list actually increased to $214 billion, up $29 billion from last year, with a median three-year growth rate of 126 percent.  The Inc. 5000 are responsible for creating more than one million jobs since their founding, making the list perhaps the best example of the impact private, fast-growing companies can have on the economy. Complete results of the Inc. 5000, including company profiles and an interactive database that can be sorted by industry, region, and other criteria, can be found on Inc.com.

    “Savvy trend spotters and those who invest in private companies know that the Inc. 5000 is the best place to find out about young companies that are achieving success through a wide variety of unprecedented business models, as well as older private companies that are still expanding at an impressive rate,” said Inc. 5000 project manager Jim Melloan. “That’s why our list is so eagerly anticipated every year.”

    The Inc. 5000 is ranked according to percentage revenue growth from 2005 through 2008. To qualify, companies must have been founded and generate revenue by the first week of 2005, and therefore able to show four full calendar years of sales. Additionally, they have to be U.S.-based, privately held, for profit, and independent -- not subsidiaries or divisions of other companies -- as of December 31, 2008. Revenue in 2005 must have been at least $200,000, and revenue in 2008 must have been at least $2 million. The top 10 percent of companies on the list comprise the Inc. 500, now in its 28th year.

    About Inc. Magazine
    Founded in 1979 and acquired in 2005 by Mansueto Ventures LLC, Inc. (www.inc.com) is the only major business magazine dedicated exclusively to owners and managers of growing private companies that delivers real solutions for today’s innovative company builders. With a total paid circulation of 712,961, Inc. provides hands-on tools and market-tested strategies for managing people, finances, sales, marketing, and technology. Visit us online at Inc.com.

    About the Inc. 500|5000 Conference
    Each year, Inc. and Inc.com celebrate the remarkable achievements of today’s entrepreneurial superstars—the privately held small businesses that drive our economy. The Inc. 500|5000 Conference & Awards Ceremony brings together members of the Inc. 5000 community, both a new class of Inc. 5000 honorees and the list’s alumni, for three days of powerful networking, inspired learning, and momentous celebration. Please join us September 23–25, 2009, at the Gaylord National Resort and Convention Center in National Harbor, Maryland. For more information about the 2009 Inc. 500|5000 Conference & Awards Ceremony, and to register, visit www.Inc5000event.com. Stay connected with Inc. Events by following @IncEvents on Twitter.

    Perimeter E-Security and Sun Microsystems Faceoff Against Naysayers of In-The-Cloud

    July 21, 2009 Toggle Content

    Chief Strategy Officer Doug Howard Addresses Why Cloud Computing is More Secure than Traditional IT at Open Group Toronto 2009

    WHAT:
    With security frequently cited as the top barrier to enterprise adoption of cloud computing, leading IT executives will debate the cloud security argument at a special panel session at Open Group Toronto 2009

    WHY:
    Proponents cite that cloud computing can be more secure than traditional IT because of centralized security controls, the ability of some cloud computing services to limit access to specific, authorized IP addresses, and robust, granular access controls.  Those concerned about the inherent security of cloud computing cite a myriad of security issues, including the security of multi-tenant architectures, data security, compliance and audit, and a host of other concerns.

    SPEAKERS:

    • Doug Howard, Chief Strategy Officer, Perimeter E-Security
    • Glenn Brunette, Distinguished Engineer and Chief Security Architect, Sun Microsystems
    • Chris Hoff, Director of Cloud and Virtualization Solutions, Cisco and Cloud Security Alliance
    • Dr. Richard Reiner, CEO, Enomaly

    WHERE:
    The Open Group Security Practitioners Conference at the Toronto Marriott Downtown Eaton Centre

    WHEN:
    July 22, 2009 at 2:00pm EST

    Perimeter Launches Correlative Security Engine to Manage Cost, Complexity, Compliance Pressures in Real Time

    June 29, 2009 Toggle Content

    Viewpoint 2.0 also has Breakthrough Compliance Profiler that Automatically Calculates and Prioritizes Security Risks Milford, CT, June 29, 2009 – Perimeter, the trusted market leader of enterprise-class information security services for companies of any size, today announced the launch of Viewpoint 2.0, the industry’s first Correlative Security Engine with built-in Compliance Profiler.  Viewpoint 2.0 includes compliance reporting and educational risk analysis to create a profile of risk with recommended solutions.

    The new engine enables companies to view and monitor all of their security and compliance in real time through a single view across entire company systems to ensure threats can be addressed immediately, while facilitating simple compliance reporting.  Additionally, The Compliance Profiler is a new tool that offers insight into areas where companies can expand their protection by adding new solutions.  Viewpoint 2.0 manages existing customer-premise resources as well as Perimeter-provided resources, all with one engine.

    “Critical information now exists everywhere – in data centers, in the network and within a growing number and complexity of intelligent, mobile devices. With growing security threats, more complex and disparate e-mail systems and accelerated regulatory and compliance demands, the imperative to secure information has never been higher,” said Doug Howard, Chief Strategy Officer at Perimeter. “Previously, companies would have to rely on a cumbersome and fragmented approach to security data analysis.  We’ve developed a breakthrough security engine that takes information security and compliance insight to a whole new level.  Viewpoint 2.0 provides a deeper understanding of threats across a company’s entire network and IT systems, both internally and externally from one single platform.”

    Viewpoint 2.0 provides on-demand compliance reporting for all of a company’s constituents including management, technical personnel and regulators, providing each group with relevant information specific to their requirements and technical understanding.  In addition to the security reports, companies can also view employee productivity and performance usage, including how long employees are accessing various systems.  

    Built around a proprietary reporting and analysis architecture, Viewpoint 2.0 integrates the two otherwise separate worlds of open and closed source applications.  The end result is highly secure and scalable platform that is operating system agnostic on the back-end, and a user interface framework that is secure, feature rich, customizable and very robust. Offered as a monthly subscription based, pre-integrated security utility, Viewpoint 2.0 requires no assembly and offers complete cost predictability.

    “Viewpoint 2.0 represents a monumental leap forward in terms of core hardware and software architecture, raw performance, and enterprise level scalability, along with the greater cost predictability of a security-as-a-service model,” said Kevin Prince, Chief Architect at Perimeter.

    Perimeter E-Security Honored with Top Security Technology Practice Award by Everything Channel

    June 8, 2009 Toggle Content

    Company Also Ranked Again in VAR500 List of the Largest and Most Influential Solution Providers
     

    Milford, CT June 8, 2009 – Perimeter E-Security, the trusted market leader of information security services that delivers enterprise-class protection and compliance to companies of all sizes, has been recognized by Everything Channel with the Top Security Technology Practice award and as one of North America’s top technology integrators in the 15th annual VAR500 ranking.  

    “We are honored to be recognized for our unique service model that makes integration with resellers so easy,” said Kurt Heinemann, SVP of Channel/Distribution at Perimeter. “This recognition serves as further evidence of our leadership in the information security industry and the effectiveness of our channel program.  Especially in this challenging economy, companies recognize the need for information security services and we’re proud to offer reliable solutions that deliver enterprise-class protection and compliance.”

    The VAR500 list details the leading revenue producers among technology integrators and technology Solution Provider organizations in North America. The list’s ranking is based on gross worldwide revenue of hardware and software sales, as well as earnings from professional and managed information technology (IT) services.

    The 2009 VAR500 list includes 92 new companies with 10 percent of them in the Top 100 of the list.  The starting point of the list is company #500 with revenues of $26.8 million, ending with company #1 with revenues of $57.3 billion.  This list reflects the strength of the technology reseller channel. 

    “The VAR500 represents today’s largest and most influential solution providers who collectively generate nearly $600 billion in service, consulting and product revenue. Their business models span the strong regional VAR to the highly specialized players to the global services giants. The VAR500 serve today’s leading businesses whether they are at the top of the Fortune 500 or one of the small businesses that powers the U.S. economy. All of those customers turn to the VAR500 for advice on technology and product selection and ways to improve their business performance. They are the cream of the crop when it comes to the solution provider community. Oracle’s Larry Ellison, Microsoft’s Steve Ballmer and Cisco’s John Chambers are all highly reliant on the VAR500 to meet their goals. There is no more powerful network in the IT industry today than the VAR500,” said Robert C. DeMarzo, senior vice president and editorial director, Everything Channel. 

    The complete listing of the VAR500 is published in the May 25, 2009 issue and can be found online atwww.channelweb.com.

    To complete the 2009 ranking of the 500 largest North American solution providers, system integrators, VARs and IT consultants, companies were asked to complete an online questionnaire to determine prequalification.  In February 2009, Everything Channel conducted extensive research and analyzed the data.  Independent data sourcing (e.g., SEC filings, annual reports, etc.) also was conducted.  Finalists were ranked according to their fiscal year 2008 revenue, based only on their reseller-related services business.

    Everything Channel (www.everythingchannel.com , www.channelweb.com ) 
    Everything Channel is the one-stop shop for accessing, enabling, managing and accelerating technology sales channels.  From branding and recruiting to marketing and sales, Everything Channel offers technology marketers the unmatched breadth and depth of global brands and market intelligence combined with unparalleled audience loyalty and credibility serving all technology sales channels through an extensive database.  Everything Channel provides innovative field sales and marketing solutions to arm the sellers of technology with the resources they need to achieve measurable and significant results.   

    About United Business Media Limited (www.unitedbusinessmedia.com )
    UBM (UBM.L) focuses on two principal activities: worldwide information distribution, targeting and monitoring; and, the development and monetization of B2B communities and markets. UBM’s businesses inform markets and serve professional commercial communities - from doctors to game developers, from journalists to jewelry traders, from farmers to pharmacists – with integrated events, online, print and business information products. Our 6,500 staff in more than 30 countries are organized into specialist teams that serve these communities, bringing buyers and sellers together, helping them to do business and their markets to work effectively and efficiently.

    Chief Strategy Officer Doug Howard Interviewed at RSA Conference

    April 29, 2009 Toggle Content

    Perimeter E-Security Chief Strategy Officer Doug Howard was recently interviewed by BankInfoSecurity.com (GovInfoSecurity.com) at the RSA Conference held in San Francisco from April 20-24.  The conference brought together the nation’s top security experts, practitioners and vendors for a week-long exploration of the day’s most pressing security issues.

    The interview covered topics including current security marketplace trends, key Perimeter differentiators, compliance, business continuity, and effective security spending.  

    The interview can be accessed here: http://www.bankinfosecurity.com/rsa2009.php#interviews

    Perimeter E-Security CEO Recognized as 2009 Innovator of the Year

    March 24, 2009 Toggle Content

    Perimeter eSecurity‘s CEO, Brad Miller, has been named the 2009 Innovator of the Year by Business New Haven. Perimeter E-Security, the only provider of complete security on demand, began offering its innovative outsourced security services eight years ago, long before today’s “cloud computing” trend caught on. This head start has put Perimeter at the forefront of providing security and related services in a SaaS model that makes Enterprise class services available to companies at any size.

    It was by no means obvious in 2000 that Internet security services would turn into such a huge growth industry. Perimeter decided not only to focus the company on providing security services but also to initially target the financial-services industry, which has always been subject to the toughest regulatory requirements, an innovative strategy which has led to the company’s significant year over year growth. Since then the company has added other verticals such as healthcare, telecommunications, and has built a strong channel partner organization. Perimeter is the only company to offer 50 IT security services in the areas of Vulnerability Defense, Intrusion Defense, Network Defense, Email Defense, System Defense, User Defense, Secure Hosted Email and Email Archiving. Businesses connected to Perimeter’s network can order these services on demand much like you would order a pay-per-view movie from a cable company. 

    Profitable since 2001, Perimeter’s revenues have grown an average of 331 percent per year over the last five years. Perimeter reports that the current economic downturn is only increasing the willingness of customers large and small to adopt Perimeter’s software-as-a-service model which requires no CAPEX investment and is provided on an affordable subscription basis. 

    Perimeter has acquired and successfully integrated 16 companies in the last 6 years, each of which contributed critical technologies such as hosted email, email archiving, and vulnerability assessment, and/or customer base that helped to drive the company’s growth. In 2007 Perimeter received two funding rounds totaling $104 million from Goldman Sachs, Bessemer Ventures and Stripes Group. Over the past several years Perimeter has repeatedly achieved high rankings on Deloitte & Touche’s North American Technology Fast 500 list and on Inc. Magazine’s list of the country’s fastest-growing private companies, and was also positioned by Gartner, Inc. in the Visionaries quadrant of the “Magic Quadrant for MSSPs, North America, 1H07”1 report. Perimeter eSecurity has over 10,000 customers, 3,000 of which are in the financial services industry, and 350 employees.

    Mr. Miller was honored at a special reception on March 5th in New Haven. With a bachelor's degree in economics from Franklin & Marshall College and a master’s degree in business administration from Columbia University School of Business, Miller has also worked as an investment banker at Schroders, PLC and as chief operating officer of PRG, a supplier of entertainment technology products and services.

    The Top 9 IT Security Threats for 2009 & the New Years Resolutions You Can Make to Dodge Them

    December 11, 2008 Toggle Content

    2009 is expected to continue the 2008 trend of increasing size, scope, and concentration of security attacks on computer networks nationwide.  The volume of attacks from international sources will continue to increase, as will the sophistication of application level attacks such as SQL injection, buffer overflow, and cross site scripting (XSS). These will be directed towards high traffic websites (news sites or social networking sites) that when compromised will install malware to a large numbers of users. Bandwidth consumption will percolate higher in the list of IT challenges for organizations of all sizes as more and more users download HD video and graphics rich content. The top nine threats and their corresponding solutions/New Year’s Resolutions are listed below in descending order of severity.  Each threat is ranked by status as a Rising, Steady or Weakening Threat.

    “For the past several years I have listed what I believe are the top threats but this year the list is different,” said Kevin Prince, Chief Architect, Perimeter eSecurity.  “This is largely due to the current economic, political and legislative environment in the US as well as the type and volume of information that is now available on the Internet.  It doesn’t have to be all doom and gloom, however.  By identifying these threats we can limit our exposure to them. As always, with data security, it isn’t so much about having more as it is about having the right stuff.”
     

    Top 9 IT Security Threats and Solutions:

    Threat #1 
    Malicious Insiders 
    (Rising Threat): Employees with malicious intent have always been the biggest threat to their organizations. 

    • Resolution:Conduct E-Security Training:  Raising the awareness level of employees through mandatory, monthly online courses is a terrific way to remind them that security is everyone’s responsibility. Choose a training program that offers up-to-date courses, ensures users understand policies and procedures, and provides reporting to management.

    Threat #2
    Malware
     (Steady Threat):  Malicious software can include viruses, worms, Trojan horse programs, etc. but most importantly websites that host malware, which has become the most prolific distribution method. 

    • Resolution: Web Content Filtering, Patch Management and Other Protections. Proactively manage the sites where employees are allowed to surf by limiting them to safe, approved sites from reputable web publishers. Employ Patch Management and system AV & spyware protection to combat the malware threat.

    Threat #3
    Exploited Vulnerabilities 
    (Weakening Threat): Hackers find a weakness in a commonly used system or software product and exploit it for their gain. 

    • Resolution: Implement Comprehensive Patch Management:  Often some of the most sensitive data are on non-Microsoft systems such as Linux, UNIX or Macintosh.  Invest in a patch management solution offering full visibility into your network and covering all operating systems and vendors, not just Microsoft.  Consider host-based intrusion prevention (HIPS) which can monitor your system looking for anomalous behavior, applications attempting to be installed, user escalation, and other non-standard events.

    Threat #4
    Social Engineering
    (Rising Threat): With hacking you are compromising a computer, but with social engineering you compromise a human by tricking him/her into supplying personal information and passwords.  Any method of communication will be used to perpetrate this fraud including telephones, mobile phones, text messaging, instant messaging, impersonation of support/vendor staff and social networking sites. 

    • Resolution: Social Engineering Testing: In addition to employee training (see above) to raise awareness you can hire a firm to come in and test your employees for their resilience to social engineering. A 3rd party can use mock scenarios to assess your vulnerability to a real attack.

    Threat #5 
    Careless Employees (Rising Threat): Mistakes made by careless or untrained employees can lead to a significant security compromise. A poor economic climate puts strains on employees causing them to cut corners or important duties. It can also lead to less formal employee training. 

    • Resolution: See E-Security Training above
       

    Threat #6 
    Reduced Budgets 
    (Rising Threat): A weak economy leads companies to tighten their budgets, which results in less headcount and less money for upgrades and new systems. 

    • Resolution: Consider Opting for a Software-as-a-Service (SaaS) Solution to Cut Costs. A company that has traditionally kept their security management and monitoring in-house may use this as an opportunity to look at the cost benefits of outsourcing it to a leading security firm. Choose a provider that offers a broad range of services, is financially, viable and is audited by multiple independent 3rd parties.

    Threat #7        
    Remote Workers & Road Warriors
     (Steady Threat): Telecommuting and mobile workers are on the upswing. 

    • Resolution: Use The Same Systems For Telecommuters As For On-Site Employees. Don’t forget to install security on your remote VPNs. Make sure that remote users use company issued systems with updated security patches and web content filtering. Provide easily accessible on-call tech support so that employees don’t resort to fixing things themselves and possibly disabling necessary security measures. Isolate work computers at home from the kids who can download threats along with their games.

    Threat #8 
    Unstable 3rd Party Providers 
    (Rising Threat):While there is an increase in IT security expenses required to keep up with the growing threatscape and regulatory environment, there is a decrease in revenues in the market.  This may lead many providers to go out of business or cut corners that could lead to a security compromise. 

    • Resolution: Consider Streamlining Your 3rd Party Providers.  Ensure that you are using providers that have been in business for a long time, have seen hard times before and have been regulatory focused for years.  Ask for audited financials and ensure your provider is profitable. Choose a firm that can offer you multiple solutions via one integrated portal to gain the benefits of economies of scale and reduce the burden on existing IT staff resources.

    Threat #9Downloaded Software Including Open Source and P2P files (Steady Threat): IT administrators may download and install open source software or freeware in an attempt to save money, which can lead to a huge waste of time in software configuration in and fine tuning or a data breach. 

    • Resolution: Limit Download and System Update Administration to a Trained IT Professional. Don’t allow users to download and install software on their desktops. Regularly update system AV & Spyware Protection. Consider host-based intrusion prevention (HIPS) which can monitor your system looking for anomalous behavior, applications attempting to be installed, user escalation, and other non-standard events but make sure that only IT managers have access to this.

    Gordon Eubanks Joins Perimeter E-Security's Board of Directors

    November 19, 2008 Toggle Content

    Milford, CT – November 19, 2008 – Perimeter E-Security, the only provider of complete security on demand, offering over 50 different services in the areas of: Vulnerability Defense, Intrusion Defense, Network Defense, Email Defense, System Defense, User Defense, Secure Hosted Email, and Email Archiving, announced today that Gordon Eubanks, former CEO of Symantec Corp., a global leader in providing security, storage and systems management solutions, has joined their board of directors. 

    “We are gratified that Gordon Eubanks has agreed to join our board,” said Brad Miller, CEO of Perimeter E-Security. “This further validates our long held believe that the future of IT security is in the cloud. His involvement underscores Perimeter’s position as a market leader in security software-as-a-service (SaaS), a business we pioneered over nine years ago in the financial services industry and have brought to a broad spectrum of new markets today." 

    Gordon Eubanks has been at the forefront of the information technology industry for over 30 years. As the president and CEO of Symantec, he guided the company in its software utility and anti-virus businesses until he left to become president and CEO of Oblix, a Silicon Valley startup which created enterprise identity management solutions. Oblix was later acquired by Oracle in 2005. He has since been involved with a number of security software businesses and, in addition to other current leadership positions; he is chairman of Transforma Acquisition Group.

    "Businesses across all industries are searching for leaner, less capital intensive and more cost-effective solutions to cover them for their IT security and compliance needs," said Gordon Eubanks, Chairman of Transforma Acquisition Group. "Perimeter’s SaaS model in the security, compliance and email space provides immediate answers to all of those needs in an Enterprise Class solution for businesses of any size. Perimeter is a true leader in this space and I’m excited to join the Perimeter board at this point in its growth cycle.”

    About Perimeter E-Security
    As the only provider of complete security on demand, Perimeter E-Security makes security easily available and affordable for all businesses. Perimeter's on demand security services protect thousands of computer networks nationwide, offering more than 50 different services on a subscription basis in the areas of: Vulnerability Defense, Intrusion Defense, Network Defense, Email Defense, System Defense, User Defense, Secure Hosted Email and Email Archiving. Through its top rated hosted eMessaging provider subsidiary, USA.NET, Perimeter provides custom, mission critical messaging infrastructure to organizations of all sizes. With the proliferation of security threats and technologies, clients benefit from a single-source provider that offers all services through one pre-integrated platform and web portal. 

    Perimeter's security SaaS services are continuously expanded, enhanced and upgraded for current and future regulatory compliance. With nine geographically distributed technical offices and three redundant data centers, Perimeter's services are always available and have been validated by multiple independent third parties.

    Perimeter E-Security Partners with Techmate, LLC to Provide Complete IT Security, E-Messaging and Archiving Services to their Broker Dealer Clients On Demand

    October 15, 2008 Toggle Content

    Milford, CT October 15, 2008 – Perimeter E-Security, the only provider of Complete Security On Demand, announced today that it has signed a partnership with Techmate, the industry’s foremost back office software solutions company, serving the Broker Dealer Industry since 1984, to provide a complete, fully compliant IT security solution to their broker/dealer clients on demand. Perimeter will initially provide the following services to Techmate’s broker dealers, which range in size from 3 to 100 back office employees: 

    • Unified Threat Management (UTM)
    • SPAM Filtering
    • E-Security Training
    • Vulnerability Scanning
    • eMessaging Compliance & Archiving
    • Remote Backup & Recovery
    • Managed Network Intrusion Detection & Intrusion Prevention Service
    • Secure Hosted Microsoft Exchange

    “We were searching for a complete and easy to implement IT security solution that would also cover our broker/dealer clients for their compliance requirements,” said Rod Lueck, President, Techmate, LCC. “That is a tall order and Perimeter was the only provider to come in with a comprehensive, integrated package of services that would be easy to implement for our clients, who normally have no technical people in-house. In addition, Perimeter has already obtained all of the Third Party Certification & Audits that our broker/dealer clients would be obligated to obtain for themselves in order to remain in compliance with Federal Regulations.” 

    Techmate’s Operations Plus Suite of Products provide Back Office Automation to financial service companies through commission processing, compliance verification, reporting, remote entry via the Internet, and most importantly a stable environment in which to process daily activities.  Each of these items has helped Techmate become the most widely used Broker Dealer Commission Payment System in the Financial Services Industry. Techmate, LLC services firms that range from six reps to over six thousand reps. In total, more than 100 broker/dealers process their commissions through WinOPS, a complete, on demand, Broker/Dealer Back Office Administration system designed primarily for independent and insurance subsidiary firms.

    “We are very excited about our partnership with Techmate,” said Brad Miller, CEO of Perimeter E-Security. “This will greatly enhance our penetration into the broker/dealer market. Because Perimeter E-Security already serves 15% of the US Banking market and has served this market for over 9 years now, we are uniquely qualified to provide comprehensive, enterprise class network defense solutions to Techmate at an affordable price.”

    To effectively deal with the ever-changing and incredibly complex Internet “threatscape”, Perimeter has built a multi-layered network defense platform including 50 different IT security services that is designed to address all types of threats including those from malicious code, external intrusions, inside attacks and policy enforcement. Leveraging economies of scale much in the same way as a large corporation, Perimeter shares this infrastructure with many clients in order to provide a best of breed and regulatory-compliant defense for a flat monthly fee. The cornerstone of Perimeter’s service is a turnkey platform that includes all of the necessary components of a complete and comprehensive security solution, including best-of-breed technologies, a trained 24/7 security engineering team, and documented policies and procedures. 

    About Techmate, LLC 
    Techmate, LLC has been serving the financial services industry since 1984. Over the years, their Operations Plus products have become the most widely used Broker/Dealer back office systems in the industry. The three main reasons for their success are the thoroughness of the system relative to the low entry and usage fees, the ease of learning and using the system, and the quality and availability of high touch client support. Techmate’s Operations Plus Suite of Products provide Back Office Automation to financial service companies through commission processing, compliance verification, reporting, remote entry via the internet, and most importantly a stable environment in which to process daily activities. For more information about Techmate visit http://www.bdbrokerdealer.com/about

    Lou Kerner Named Chief Financial Officer of Perimeter E-Security

    August 5, 2008 Toggle Content

    Milford, CT – August 5, 2008 – Perimeter E-Security, the only provider of complete security on demand, announced today the appointment of Lou Kerner to the position of Chief Financial Officer. In this role Kerner will provide strategic, operational and financial management leadership to support the company’s continued high growth trajectory. He will be based in the company’s corporate headquarters in Milford, Conn. 

    “Lou Kerner has consistently demonstrated his mastery of Internet and IT-based businesses and he brings a deep and diverse background to Perimeter,” said Brad Miller, CEO of Perimeter E-Security. “I have known Lou for over 20 years. His strategic vision combined with his financial and management expertise will help Perimeter maximize profitable growth across all of the company's businesses.”

    “I am pleased to be joining Perimeter, a pioneer in delivering world-class, on demand security services and a highly profitable company that has increased revenues by over 300% in the last 5 years and grown its customer base to over 10,000 customers. I look forward to working with Brad and the high-caliber team he has assembled to help grow the company to the next level,” Kerner said. 

    Prior to this position, Kerner was co-founder and President of Wildsites, an aggregator of domain name portfolios, builder of branded websites and provider of a social networking applications (Bolt.com). Before that, Kerner was the Chief Financial Officer of Roo Media Corporation, a publicly traded enabler of internet broadcasting.  Previously, Kerner was the Chief Executive Officer of the dotTV Corporation, where he successfully commercialized the .tv domain before selling it to Verisign. 

    Kerner began his career on Wall Street as an Equity Analyst at Merrill Lynch, before moving to Goldman Sachs as  a Vice President - Equity Research, where he focused on media and Internet companies. Kerner received his B.A. from UCLA and his M.B.A. from Stanford University.