We could not find any results for:
Make sure your spelling is correct or try broadening your search.
Share Name | Share Symbol | Market | Type |
---|---|---|---|
Secure Computing (MM) | NASDAQ:SCUR | NASDAQ | Common Stock |
Price Change | % Change | Share Price | Bid Price | Offer Price | High Price | Low Price | Open Price | Shares Traded | Last Trade | |
---|---|---|---|---|---|---|---|---|---|---|
0.00 | 0.00% | 5.75 | 0 | 01:00:00 |
Secure Computing's Cyber Security Initiative:
Timed in conjunction with the fifth annual National Cyber Security Awareness (NCSA) Month in October, Secure Computing's Cyber Security Initiative kicks-off an intensive effort to provide corporations with informative research, tools, technologies, solutions and best practices vital for companies and federal agencies evaluating -- or re-evaluating -- their approach to critical infrastructure protection. Information related to this initiative can be found on the Secure Computing Cyber Security website at: http://www.securecomputing.com/cybersecurity/
Critical infrastructure comprises all computer systems that can be targets of criminal threats, industrial espionage and/or politically motivated sabotage such as the power grid, water supply, railways, nuclear energy plants and more. Attacks on such networks can cause loss of life, threaten public safety, impact national security, or create economic upheaval or environmental disaster. It is estimated that the destruction from a single wave of cyber attacks on U.S. critical infrastructures can exceed $700 billion USD -- the equivalent of 50 major hurricanes hitting U.S. soil at once.
"Even though businesses and government agencies know they need to secure their networks, many don't have the in-house expertise or time it takes to fully secure systems," explained Scott Montgomery, vice president of Global Technical Strategy for Secure Computing. "We want to elevate awareness so that they understand how to change behavior to make security a high priority."
"Our customers are concerned about how the security issues they read about in the media -- malware, phishing, pharming, unauthorized access to servers, etc. -- can affect their critical control networks," said Elan Winkler, director of Critical Infrastructure Solutions for Secure Computing. "Cyber security wasn't originally designed into these types of networks. Add to that the new government regulations like NERC CIP, and we end up with a lot of unknowns and uncertainty."
Key Recommendations:
1) Security isn't an Option. In the industries where security is paramount and network-to-network interconnection is the norm, security is not an option... it is a necessity. 2) Security can't jeopardize critical network functionality. With a unique combination of high-speed application layer defenses, reputation scores, geo-location control, and long history of no patches or hacks, Secure Computing can defend critical networks without jeopardizing their core functionality and availability requirements. 3) Security must protect assets, access and information. Security is needed to protect key aspects of the network: the control system assets themselves and information about critical assets. Secure Computing's extensive security portfolio enables us to provide in-depth security for both areas.
Additionally, Montgomery recommends that current and prospective customers should start with discovery. "Often, they don't know exactly what they have, so a thorough audit by Secure Computing helps determine what their landscape looks like. They also need to be educated about where their security vulnerabilities are, and where they need to look for holes. Once we have done that, we look at how Secure Computing solutions will work with the systems they have."
A major urban utility company servicing over 10 million customers purchased Secure Computing's Secure Firewall (previously known as Sidewinder) 14 years ago to protect their control network. Secure Firewall performs excellently for this highly regulated company. They have never had to issue a security patch and they don't worry about bringing down the firewalls for maintenance more than once or twice a year. An IT specialist at the company said, "Just knowing that I have Secure Firewalls in place is what allows me to sleep at night."
Secure Computing has been protecting critical infrastructure networks for over 14 years in power, government, transportation, water, energy, gas, petroleum, and chemical companies in more than half of the U.S. states and 31 countries worldwide.
Access to Information and Resources (Available Now & Coming Soon):
The Cyber Security and Critical Infrastructure Web site can be found at http://www.securecomputing.com/cybersecurity/. It features easy, one-stop access to Secure Computing's research in this area, and other information and educational materials. It also provides a directory of additional resources and expert opinions, including white papers, case studies, CIP standards documentation, events and more.
Additionally, Secure Computing will be releasing results of a cyber security survey later in the month. The data and resulting analysis will be published on the website mid-October.
About Secure Computing
Secure Computing Corporation (NASDAQ: SCUR), a leading provider of enterprise gateway security, delivers a comprehensive set of solutions that help customers protect their critical Web, email and network assets. Over half the Fortune 50 and Fortune 500 are part of our more than 22,000 global customers, supported by a worldwide network of more than 2,000 partners. The company is headquartered in San Jose, Calif., and has offices worldwide. For more information, see http://www.securecomputing.com.
All product names and trademarks are the property of their respective firms.
This press release may contain forward-looking statements which are made pursuant to the safe harbor provisions of the Private Securities Litigation Reform Act of 1995. Investors are cautioned that these forward-looking statements involve risks and uncertainties that could cause actual results to differ materially from current expectations. For example, there can be no assurance that demand for the company's products will continue at current or greater levels, or that the company will continue to grow revenues, or be profitable, or that the company will be able to motivate and retain key employees, staff current and future projects in a cost-effective manner, or effectively control its marketing, research, development and administrative costs. There are also risks that the company's pursuit of providing network security technology might not be successful, or that if successful, it will not materially enhance the company's financial performance; that changes in customer requirements and other general economic and political uncertainties and weaknesses in geographic regions of the world could impact the company's relationship with its customers, partners and alliances; and that delays in product development, competitive pressures or technical difficulties could impact timely delivery of next-generation products; and other risks and uncertainties that are described from time to time in our periodic reports filed with the Securities and Exchange Commission. The company specifically disclaims any responsibility for updating these forward-looking statements.
CONTACTS: Ally Zwahlen Secure Computing Corporation 925-288-4175 Email Contact Paula Dunne Contos Dunne Communications LLC 408-776-1400 408-893-8750 cell Email Contact
1 Year Secure Computing (MM) Chart |
1 Month Secure Computing (MM) Chart |
It looks like you are not logged in. Click the button below to log in and keep track of your recent history.
Support: +44 (0) 203 8794 460 | support@advfn.com
By accessing the services available at ADVFN you are agreeing to be bound by ADVFN's Terms & Conditions