SANTA CLARA, CA-- May 4, 2010 - nexTier Networks, the company redefining data leak prevention (DLP) with semantic analysis, today announced a major upgrade to the features and benefits of its Compliance Enforcer 3.0 solution. The new version of the Compliance Enforcer appliance leverages nexTier's powerful DLP algorithms with semantic analysis to provide end-users with auto-classification features, the ability to customize multi-tier workflow, and monitoring capabilities for Web 2.0 applications with HTTP:POST support and analysis.
With 60 percent of all corporate data being accessed via an endpoint (according to IDC research), small- and mid-sized businesses find that as their networks expand, encryption technologies are no longer a viable protection option for their data. nexTier's Compliance Enforcer appliances deliver data security that goes above and beyond what's available through encryption, thereby protecting companies from both inadvertent and malicious attacks while also ensuring company security policies are in line with government and regulatory mandates. Compliance Enforcer uses a highly defensible, patented technology to stop data leaks before they happen. The latest version of Compliance Enforcer builds on the company's secure appliances to bring more features to organizations.
'We continue to enhance and add new features to Compliance Enforcer to ensure our customers are getting the most complete and robust data loss prevention solution on the market,' said Tarique Mustafa, CEO and founder of nexTier Networks. 'Compliance Enforcer 3.0 builds on the success of our unique DLP technology with advanced Domain Specific Ontology definition features and tools, a fully customizable sophisticated multi-tier workflow, Web 2.0 application monitoring and analysis, and virtualization capabilities so our customers can integrate our solution for MSSP and SaaS deployments.'
As a major upgrade to the Compliance Enforcer platform, Compliance Enforcer 3.0 is equipped with advanced features and tools for Domain Specific Ontology definition through its rich graphical user interface. The new features and tools allow the chief information security officer's (CISO) staff to create, modify and enhance the out-of-the-box ontology so it can be tailored according to their enterprise's specific needs. This powerful feature further enables automation of Real-Time Data Classification that eliminates the need for pre-tagging and dramatically reduces the total cost of ownership (TCO) by eliminating the cumbersome manual classification and tagging of data. For example, the built-in Ontologies (for HIPAA, PCI, PII, the Financial Industry, and the Legal Industry) that Compliance Enforcer 3.0 ships with can be further upgraded and customized for the specific enterprise (such as one hospital chain versus another one, or one financial institution versus another).
Compliance Enforcer 3.0 is also outfitted with a sophisticated Multi-tier Workflow that can be customized to include various DLP authorities within the enterprise for a real-time forensics and decision-making process for DLP enforcement.
With virtualization becoming increasingly important to businesses of all sizes, the latest version of Compliance Enforcer is also packaged as Virtual DLP Servers for easy MSSP and SaaS based deployment. Also included as part of the solution is a packaged DLP Agent for end-host monitoring.
New capabilities around Web. 2.0 applications monitoring gives enterprises tighter control over the web-based channels that may cause data leak problems. Compliance Enforcer 3.0 does monitoring and analysis of Web 2.0 applications that use both HTTP and HTTPS protocols. Additional protocols, messaging servers and improved support for encryption have also been added to the solution.
Other enhancements that will benefit end-customers include additional support for more file types and formats, support for multiple browsers and clients using MIME file formats, file attachment and secure TLS support for instant messaging, and enhancements to the solution's advanced security features (including NTLM and TSL enhancements for SMTP, and SSL enhancements for XMPP).
In its continued commitment to the value-added reseller (VAR) channel, nexTier Networks is adding Xbridge Systems of Mountain View, Calif. to its growing list of channel partners selling Compliance Enforcer. Xbridge, a leader in IBM 390 Database access technology, has signed a VAR relationship agreement to resell nexTier's Compliance Enforcer DLP solution. Under an OEM arrangement, nexTier's Compliance Enforcer product will be integrated with Xbridge Systems' IBM 390 Database access API to provide DLP capabilities for mission-critical data stored in legacy databases.
'By partnering with nexTier Networks, we now offer to our customers the ability to gain the benefits of DLP for critical data they have stored in their legacy databases,' said Raymond A. Williams Jr., President and CEO of Xbridge Systems, a leading provider of world-class data access, data query, data delivery, data discovery and data loss prevention solutions. 'Many of our customers have information vital to the operation of their businesses stored in legacy databases, and the integration of Compliance Enforcer Ver-3.0 with our IBM 390 Database access API will provide them with DLP capabilities for that mission-critical data.'
'Xbridge Systems is a leader in the database access technology market, and we're pleased that Compliance Enforcer is now available to Xbridge's customers,' Mustafa said. 'nexTier Networks remains committed to the VAR channel go-to-market model, and our new partnership with Xbridge Systems only further establishes that commitment.'
Pricing & Availability
nexTier Networks' Compliance Enforcer products are now shipping as pre-built and pre-configured appliances. Compliance Enforcer is easily customizable and starts at US $30,000 for 100 users. With its Compliance Enforcer product, nexTier offers the most affordable DLP with unprecedented accuracy and real-time analysis, providing best return on investment to meet compliance and security needs. For more information contact: email@example.com.