Home

Company

About Us

Company News
Management Team
Employment
Contact Us
Privacy Statement
 

 
 
 
 


 

 

 

 

   

About Sygate Technologies

Sygate Technologies, Inc., founded in 1995, has a proven reputation for creating innovative networking and security technologies. Sygate Technologies currently serves more than two million networks worldwide with high-performance Internet access management and security products designed to meet the unique networking needs of the mobile enterprise.

Sygate provides enterprise-class software solutions that protect network assets by securing Internet devices, mobile computers and corporate desktops from intrusion and misuse. Utilizing Sygate solutions, organizations can turn written security policy into operational reality by extending it to their weakest link, the distributed workforce. Armed with the Sygate solution, organizations can enforce consistent enterprise-wide security policy, defend corporate assets against intruders, and assess and control enterprise-wide security posture.

By proactively reducing an organization's exposure to attack, Sygate protects the most precious corporate asset, information. Understanding the dynamic nature of distributed computing, Sygate recognizes roaming profiles and automatically adjusts to secure mobile users. Ensuring only trusted use of network resources complements existing security frameworks and makes the Sygate solution an excellent return on investment.

The Market

Enterprise IT departments have traditionally deployed corporate firewall solutions to protect their networks. Such corporate firewalls are traditionally thought to protect the network's PCs and servers inside the corporate network from known intruders. However, increased use of the Internet and subsequent growth of the mobile workforce have brought about an entirely new set of security issues.

The explosive growth of the "Internet as the corporate network" has lead to an increase of mobile and wireless users, telecommuters, and branch office workers who use Internet appliances, laptops and desktop computers to access the corporate network via the Internet. This mobile workforce is further enabled with broadband connections and VPN solutions to provide reliable Internet access. This distributed workforce jeopardizes the fortified corporate network and represents today's greatest security risk, as the protection of the corporate firewall does not extend to those users. It is therefore increasingly easier for hackers to penetrate those laptops and PCs over the Internet, take over the identity of the user and then gain access to corporate resources via the corporate VPN. From there they can steal files, access databases or launch attacks on other enterprises such as the recent well publicized Denial-of-Service (DOS) attacks.

As a result, IT managers are looking for new security solutions to adequately extend and enforce their corporate security policies to all mobile users. They are determined to take back control of the security for those devices through solutions that can be managed from a central site, as they are increasingly made responsible for any network security problems that the company might face.

At the same time, IT managers are now also starting to realize that hackers can just as easily penetrate corporate firewalls within trusted traffic, such as email and web traffic, in order to insert small programs on corporate PCs; programs that are then used to capture passwords and monitor network traffic in order to gain access to corporate servers. So far, such security breaches behind the firewall have gone mostly undetected, or kept fairly confidential until the highly publicized Microsoft case in October 2000.

The Sygate Solution

Sygate's client-server solution complements existing security frameworks with a centralized IT control station and a customizable distributed security agent, giving IT the power to:

  • Enforce consistent enterprise-wide security policy, for the best possible prevention against hacker attacks

  • Defend corporate assets against intruders, with real-time, bi-directional detection and response to new security threats.

  • Assess security posture, with rapid and accurate visibility into and justification of enterprise-wide security measures.

  • Control security for the distributed workforce, with powerful, centrally managed tools that fine-tune security policy and allow rapid response to security emergencies.

Enforcing Security Policy

By implementing the Sygate solution, organizations can turn written security policy into operational reality and eliminate security blunders caused by the human factor. Our centrally managed solution gives IT the control they need to ensure enterprise-wide implementation of corporate security measures, even as mobile users roam among different computing environments. Sygate's additional layers of security, throughout the distributed workforce, complement existing security frameworks and provide an excellent return on investment by ensuring only trusted use of network resources, which closes the network "back door" and frustrates would-be intruders.

Defending Corporate Assets

While prevention reduces the chance of becoming a target, defense deals with an attack, or worse yet, an intrusion. Sygate allows organizations to proactively defend networked devices from inevitable attacks with multiple layers of security. Our host/application-based profiling capabilities bring security policy to the network layer by only allowing trusted application usage in conjunction with trusted users. By noticing any deviation from trusted application or user behavior patterns, Sygate detects, blocks and responds to the previously undiscovered threats in real-time. Our integrated firewall technology bi-directionally monitors and blocks unauthorized communication by any application, using any port, protocol, or IP address on any device. By protecting corporate data and resources from attack, Sygate minimizes recovery costs and corporate liability.

Assessing Security Posture

By providing visibility over enterprise-wide security posture, Sygate allows organizations to understand, justify and maximize the effectiveness of their ongoing security efforts. Advanced logging and reporting on the number, nature, and severity of system security risks and attacks help IT fine-tune security policies while justifying security measures to upper management. Integrated vulnerability assessment capabilities allow IT to be proactive in securing their systems by finding and closing security holes before would-be attackers can use them. Additionally, Sygate's forensic capabilities help IT trace the source of attempted intrusions and enable organizational response to attack.

Controlling Security Posture

Visibility allows organizations to assess security posture; however, without the ability to implement security measures, security policy is nothing more than a piece of paper. The Sygate solution provides powerful, centrally managed tools that fine-tune security policy and allow rapid response to security emergencies. Armed with the Sygate solution, organizations can determine and adjust security status on any system at any particular time, audit and maximize the effectiveness of their entire security policy, and maximize return on investment for enterprise-wide security measures in an ongoing cycle of intrusion defense.

 


| Home | Company | Products | News | Downloads | Buy | Support | Partners | Contact Us |
1997-2001 Sygate Technologies, Inc.

All content, brands, and products referenced herein are the trademarks or registered trademarks of their respective holders. SygateŽ is a registered trademark of Sygate Technologies, Inc. No part of this document may be reproduced or transmitted in any form or by any means, electronic, mechanical, or otherwise, without prior written permission of Sygate Technologies, Inc. Please be advised that Sygate Technologies, Inc. actively and aggressively enforces its intellectual property rights to the fullest extent of the law.