SOURCE: TriGeo Network Security

October 03, 2005 09:13 ET

TriGeo Ships First 64-Bit SIM Appliance and Adds USB Defense

New 64-Bit System Delivers Breakthrough Performance, Reliability and Scalability and USB-Defender™ Monitors, Logs and Blocks Unauthorized Removable Storage Media Access

POST FALLS, ID -- (MARKET WIRE) -- October 3, 2005 -- TriGeo Network Security (www.trigeo.com), the pioneer and leader of Automated Remediation through Intelligent Correlation™, today announced the 64-bit version of TriGeo Security Information Manager (SIM). Version 3.2 is the first completely 64-bit security information management appliance on the market and was designed specifically to leverage the power of today's high-performance processors. This version combines 64-bit versions of the operating system, embedded database, real-time log analysis and event correlation.

"TriGeo made the strategic decision over a year ago to start shipping 64-bit appliances," said Michael Maloof, CTO of TriGeo Network Security. "Our correlation engine was built for complex real-time event analysis, and is uniquely positioned to leverage this new architecture. With the move to 64-bit, we've positioned TriGeo to take the lead with a SIM appliance that's faster and smarter than competing 32-bit systems."

Using this first-to-market technology, TriGeo customers are able to take full advantage of TriGeo's all-in-one, Linux-based appliance and 64-bit performance, without the implementation and compatibility challenges facing software-only or Windows-based products.

The popularity, capacity and virtual invisibility of USB storage devices has sparked serious concern in the IT community. With the introduction of USB-Defender™ TriGeo expands its role as an endpoint security solution and addresses this emerging threat.

USB-Defender is bundled with TriGeo's Windows agent and provides event traceability for USB mass storage devices. It's now possible to log USB device insertion and capture device details such as manufacturer, serial number and device capacity. It's also possible to log every file copied to or from the device and any applications executed, and no group policy changes are required.

"When combined with TriGeo's event correlation, IT personnel have a powerful new weapon against the insider threat," said Michelle Dickman, CEO of TriGeo Network Security. "It's now possible to track all USB activity and construct rules to detect unauthorized use, notify IT personnel or even disable the device."

TriGeo's flexible rule builder makes it simple to build multiple event correlations and pair them with a variety of notification and active response options. The USB rules, for example, could include additional network defenses such as disabling the user account, or even quarantining the workstation to prevent information leakage or worm propagation.

With the release of version 3.2, TriGeo implements its vision of 64-bit technology, delivering breakthrough performance and scalability, and continues its mission to provide a powerful security information management solution and network defense technology.

About TriGeo Network Security

Formed in 2001 as the pioneer and leader of Automated Remediation through Intelligent Correlation™, TriGeo protects your entire network -- from perimeter to endpoint. TriGeo Security Information Manager is the only network security appliance that automatically identifies, notifies and responds to network attacks, suspicious behavior and policy violations. With its patent-pending technology, real-time log analysis, event correlation, automatic alerts and policy-based active response, TriGeo provides a unique network defense technology and a complete security information management solution.

TriGeo is a privately held company headquartered in Post Falls, Idaho. For more information, visit the company's website at www.trigeo.com or call (208) 664-7000.

Contact Information

  • For More Information:
    Shelli Ryan, APR
    Ad Hoc Communication Resources (for TriGeo)
    (402) 572-6510