SOURCE: Secure Computing

October 03, 2007 12:16 ET

Secure Computing Unveils S.W.A.T.: (Secure Web 2.0 Anti-Threat) Initiative

Comprehensive Research, Protection and Architecture for a Secure Next-Generation Web Environment

SAN JOSE, CA--(Marketwire - October 3, 2007) - Secure Computing Corporation (NASDAQ: SCUR), the leading enterprise gateway security provider, today unveiled the company's new "SWAT" Initiative for protecting organizations from Web 2.0-related threats carried in Web and messaging protocols. The "Secure Web 2.0 Anti-Threat" initiative is an intensive effort to provide corporations with informative research, tools, solutions and best practices vital for companies evaluating -- or re-evaluating -- their approach to Web and messaging security. At its core, the initiative is aimed at identifying and highlighting the essential components required to provide the best possible protection for businesses operating in a Web 2.0 environment and beyond. Research, resource and solution information related to SWAT can be found on the SWAT website at

Secure Computing S.W.A.T. Initiative

Based on in-depth analysis of typical network policies and security architectures, a commissioned study from Forrester Consulting focused on determining how companies are responding to employee Web and messaging use, and global threat data from, Secure Computing has identified the core security components and architecture necessary to effectively combat Web 2.0 threats. The company's objective is to leverage its security expertise and ongoing research to help businesses implement a proactive security architecture that can protect their environments as existing Web and messaging threats increase and new threats arise.

"Today's Web environment provides a vastly improved user experience and access to information due to the rapid adoption of Web 2.0 technologies like AJAX, XML and RDF," said Atri Chatterjee, senior vice president at Secure Computing. "However, as in other technological innovations before it, Web 2.0 technologies have also led to new vulnerabilities and new techniques for compromising corporate networks and data. Unfortunately, our research bears out that company's simply aren't doing enough today. Most organizations are not adequately protected; their users are insufficiently trained on using these technologies; and they are spending large sums of money recovering from attacks. Our initiative aims to provide information and resources that help organizations understand the evolving threat environment and take steps to proactively protect themselves."

Security Requirements for a Web 2.0 World

Through research, analysis, and years of experience as the leader in security for the Internet gateway, Secure Computing has identified the key requirements for addressing enterprise Web security. The following capabilities are absolutely essential for protecting against existing and future threats when conducting business in the evolving Web environment:

1. Proactive real-time reputation-based Web and messaging filtering for all
   domains -- even those not yet categorized
2. Anti-malware protection utilizing real-time, local "intent-based"
   analysis of code to protect against unknown threats, as well as
   signature-based, anti-malware protection for known threats
3. Bi-directional filtering and application control at the gateway for all
   Web traffic including Web protocols from HTTP to IM, including encrypted
4. Data leakage protection on all key Web and messaging protocols
5. Security aware proxies and caches
6. Design for layering of defenses with minimal number of proven and
   secured devices
7. Robust management and audit reporting tools for all Web and messaging
   protocols, services and solutions including filtering, malware, caching,

Security Solutions for Web 2.0 and Beyond

The SWAT initiative is driving Secure Computing's next-generation Web and messaging gateway appliance development. The recently announced Webwasher® Web gateway security solution includes the following key features:

--  Proactive intent-based anti-malware protection that has
    been repeatedly rated number one in numerous tests by independent lab AV- as documented in eWeek and PC Magazine
--  Reputation-based filtering using Secure Computing's unique
    TrustedSource™ technology
--  SSL scanning of all Web traffic to ensure that neither malicious
    content enters the corporate network nor sensitive data leaves the
    corporate network by being encrypted
--  High-performance secure caching that ensures that the appliance
    provides consistently high throughput of Web traffic without compromising
    its ability to stop zero-day malware threats

As part of its commitment to continue to evolve its Web and messaging products to better thwart Web 2.0 attacks and beyond, Secure Computing is also providing its customers and partners with a roadmap that includes support for additional protocols, unified policy and management across multiple remote appliances and integration with external systems in the enterprise. Secure Computing will be sharing this roadmap information through a multi-city North American tour, beginning in New York City on October 15, 2008. To register, visit the SWAT Web site.

Access to Information and Resources

The SWAT Web site can be found at In addition to access to the Forrester Research and Secure Computing's research, the site features a directory of other resources and expert opinions and current news on topics of interest.

About Secure Computing

Secure Computing (NASDAQ: SCUR), a leading provider of enterprise gateway security, delivers a comprehensive set of solutions that help customers protect their critical Web, email and network assets. Over half the Fortune 50 and Fortune 500 are part of our more than 20,000 global customers in 106 countries, supported by a worldwide network of more than 2,300 partners. The company is headquartered in San Jose, Calif., and has offices worldwide. For more information, see

This press release contains forward-looking statements relating to the anticipated Secure Computing SWAT initiative and the expected benefits of such initiative and use of Secure Computing's security solutions, and such statements involve a number of risks and uncertainties. Among the important factors that could cause actual results to differ materially from those indicated by such forward-looking statements are delays in product development, undetected software errors or bugs, competitive pressures, technical difficulties, changes in customer requirements, general economic conditions and the risk factors detailed from time to time in Secure Computing's periodic reports and registration statements filed with the Securities and Exchange Commission.

Contact Information

  • Ally Zwahlen
    Secure Computing Corporation
    Email Contact

    Paula Dunne
    Contos Dunne Communications LLC
    408-893-8750 cell
    Email Contact