NEXOR ANNOUNCES SECURITY LABEL GUARDING ON MICROSOFT’S INTELLIGENT APPLICATION GATEWAY 2007
March 2008
Microsoft certified partner, Nexor, a provider of security capability to meet the information assurance needs of the military and government sectors, announces its latest innovative guarding technology exploiting Microsoft Intelligent Application Gateway (IAG) 2007.
In the light of increased concern over data leakage, Nexor is keen to contribute its extensive experience to solving the issue. By combining its Microsoft expertise with its in-depth understanding of guarding technology, Nexor has architected a standards-based, security policy module incorporated into the IAG 2007 APIs to provide policy enforcement.
The IAG provides a general framework to allow authenticated remote clients to securely access data behind a corporate firewall. The addition of the Nexor IAG Security Policy Module ensures that the data being accessed is authorised for release via the remote channel. For example, a company confidential document or email may be prevented from being accessed remotely over the Internet, whereas documents or emails identified as unclassified can be read via the Internet.
Colin Robbins, Nexor’s CTO comments:
“This is a really exciting development for Nexor, expanding our proven market position in messaging guards into the more challenging data guard arena. With Nexor’s modular architecture to security policy, we have rapidly integrated our security labelling and access control enforcement expertise to the IAG platform to solve a key piece of the jigsaw of a pan-government problem.”
IAG 2007, part of the Microsoft Forefront™ line of business security products, provides Secure Sockets Layer (SSL) virtual private network functionality, a web application firewall and endpoint security management capabilities.
RECENT BLOG POSTS
Press Release – Guardian 3.1 – High Availability
Nexor are pleased to announce that our Guardian solution has been enhanced with a number of key features in a new release 3.1 of the guard application which is now available: Increased Reliability: Deploy as an active -passive High-Availability ("HA") application...
Making Effective Use Of Zero Trust Security
One year on from our introductory blog on Zero Trust Architecture, what has changed and what friction points have started to appear for organisations after implementation? Crucially, where does Zero Trust fit within the to-do list, or the essential security risk...
Cyber Essentials – Under The Bonnet
What does Cyber Essentials cover? Cyber Essentials is a UK Government backed scheme that helps protect your business against a range of the most common cyber-attacks. Cyber-attacks can come in many forms and may be carried out against businesses of any size of...
Be the first to know about developments in secure information exchange