Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Microsoft Forefront Plug-In Provides Visibility to True Geographical Location of a Server

A new Plug-in for Microsoft Forefront Threat Management Gateway (TMG) helps protect corporate networks by providing visibility into the true origin and destination of data and only allowing data to travel within the trusted realm of a company’s geographical business interest.

A new Plug-in for Microsoft Forefront Threat Management Gateway (TMG) helps protect corporate networks by providing visibility into the true origin and destination of data and only allowing data to travel within the trusted realm of a company’s geographical business interest.

Microdasys, an Internet security software company, recently unveiled its latest product, GeoShield, a data origin security software system that adds a new layer of security to Microsoft Forefront TMG by providing visibility into the actual geographic location of a server.

Microdasys

“The development of GeoShield was intended to provide enterprises with better visibility into their data streams. As GeoShield allows the definition of a trusted realm, a geographic representation of a company’s business interests, it greatly reduces threat exposure and risk of attack,” said Matthew Schroeder, CTO at Microdasys. “The recent spike in malicious iFrame attacks through hacked web sites and poisoned banner ads that silently download malware from offshore hosts, confirm the need for security policies that take geo-location into consideration.”

Designed to thwart data theft, phishing and online fraud, the software is a native 64 bit plug-in into Forefront TMG and ISA Server 2006. GeoShield is generally available now and works in concert with all security features that Forefront TMG provides without the need for extra hardware.

Administrators can set security policies that confine users and devices to certain geographic regions, thus greatly limiting exposure to attack and data loss without impeding business processes.

Key benefits of GeoShield:

• Blocks access to servers that are located in untrusted geographical regions.

• Allows security policies based on actual server location.

Advertisement. Scroll to continue reading.

• Intercepts embedded email and web links and blocks or allows connections based on the Geo Policy.

• Stops Phone-Home Trojans and data exfiltration to untrusted countries, regardless of protocol or port.

• Increased productivity and security by allowing only connections to countries that organizations normally do business with.

For more information, visit www.microdasys.com

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...