Apple | Mobile |
---|---|
Business Dev & Design Entertainment | Social Media Tech Web Video |
Apple | Mobile |
---|---|
Business Dev & Design Entertainment | Social Media Tech Web Video |
Develops enterprise security software.
Year Established: | 2002 |
Funding: | 18.5 |
Address: | San Jose, CA 95134 |
Telephone: | |
Mobile: | |
Fax: | |
Mail: | info@packetmotion.com |
Company URL: | http://www.packetmotion.com |
CareersAre you ready? We are!Here at PacketMotion we thrive on energy talent and passion because we are developing technologies that will profoundly change how internal threat management has traditionally been accomplished. We are a well-funded startup that continues to evolve our next generation network security appliances for the enterprise. PacketMotion is an equal opportunity employer with development centers in Silicon Valley and Bangalore India. We offer competitive salary and benefit packages. See our open positions below. If you are ready to be challenged work with the best and brightest and be a part of the team building exceptional insider threat solutions - please submit your resume for immediate consideration to resumes@packetmotion.com You may also mail your resume to: PacketMotion Inc. Phone: +1-408-449-4300 -or- PacketMotion India Development Center Pvt Ltd IDC phone: +91 80 26657303 |
SAN JOSE Calif. ââ¬â January 12 2010 ââ¬â PacketMotionâ⢠today announced the extension of its User Activity Management solution PacketSentryâ⢠to include deep analysis of Secure Sockets Layer (SSL)-encrypted traffic with the release of the Transparent SSL Inspector 2000 appliance.
"Originally developed for securing communications over the Internet SSL now constitutes a growing percentage of internal enterprise trafficââ¬Â said Paul Smith CEO of PacketMotion. ââ¬ÅHowever its privacy benefit creates a lack of visibility into employee activity inside the firewall creating a virtual ââ¬Ëblack holeââ¬â¢ that is unacceptable for meeting compliance and audit requirements. The PacketSentry Transparent SSL Inspector 2000 tracks user activity in detail supporting audit and compliance controls with no risk to application availability.ââ¬Â
As more Web-based business applications become in-scope for audits and compliance enterprise IT teams must increasingly track user activity in detail for reporting purposes. Typically these applications lack sufficient transaction-logging capabilities. Or IT administrators choose not to enable intrinsic detailed logging functionality because of the intolerable impact to these have on application performance. A network solution is generally preferable but the encryption of SSL and its successor Transport Layer Security (TLS) of the application web interface prevents extraction of the necessary transaction-level details.
When deployed with PacketSentry the Transparent SSL Inspector 2000 decodes encrypted traffic at LAN speeds (up to 1 Gbps) without being in-line enabling full user activity tracking and auditing without impacting application performance or adding availability risk. It is designed for high-performance intranet applications to provide full visibility to internal business-critical applications on physical or virtual platforms.
Priced at $23990 the Transparent SSL Inspector 2000 is available now and is sold directly by PacketMotion and its authorized resellers in the U.S. and internationally. For more product information visit www.packetmotion.com.
PacketMotionââ¬â¢s User Activity Management (UAM) solutions enable mid- to large-sized enterprises to simplify and lower the cost of meeting their compliance/audit requirements (PCI DSS SOX HIPAA etc.) while delivering security functionality such as the ability to immediately stop user behavior that violates internal policies. A Gartner ââ¬ÅCool Vendorââ¬Â company PacketMotion combines patent-pending software with massive computing power to monitor individual user activity at the application level. The PacketSentryâ⢠appliance operates out of band with no impact on network performance and it installs in less than one day typically reducing compliance-related capital and operating costs by as much as 80 percent compared to a suite of siloed tools. For more information visit www.packetmotion.com.
PacketMotion and PacketSentry are registered trademarks of PacketMotion. Copyright é PacketMotion 2010.
Market analytics
Studies have shown that in a sluggish economy companies of all sizes and industries face an increased level of potentially costly and damaging data breaches and compromises of sensitive data assets. At the same time management teams are required to focus on operational costs and are working within constrained security budgets. IT is seen as a cost center instead of a competitive factor and CIOs have to make tough decisions. Register Now
Included in the briefing are:
PacketMotionâs PacketSentry 3.1 wins Network Products Guide Reader Trust Award: Best in Mid-Size Enterprise Security!
PacketSentry provides a thorough level of detail about what each user is doing on the network and it presents that information in language business people can understand. Because the data is real-time itââ¬â¢s possible to identify improper actions and respond immediately.
The new features include support for Citrix XenApp presentation server to monitor all activity from people who access corporate resources using Citrix. The reporting capabilities have been expanded to include Active Directory and file permission changes identify dormant accounts provide concise activity summaries and offer exception reporting that is triggered only when unexpected activity takes place.
âIn this white paper Enterprise Management Associates (EMA) explores these internal security gaps the business risks they pose and the resulting impact to IT organizations. IT executives will gain a realistic appreciation of their exposure to these internal security blindspots as well as technologies that have been applied to alleviate the problem and the business benefits of the PacketMotion approach.â
Â
Download archived webinar presentation (FREE registration required).
Todays IT organizations face a nearly impossible task: how to protect sensitive data while not hindering business processes in a dynamic environment. In addition finance departments are faced with the challenge of making sure their reporting systems are compliant with regulations such as SOX PCI or HIPAA. Data disclosure laws create additional exposure. Join Raj Padmanabhan Frank Rimerman Consulting and Jonathan Gohstand Packetmotion for a look at how IT and Finance are working together to meet these seemingly disparate requirements.
The traditional methods of risk mitigation such as firewalls or vulnerability scans will not detect nor mitigate insider threats.
This presentation examines the scope of the threat from this class of intruders explores the vulnerabilities and access policy blindspots describes monitoring and audit methods to detect internal access and sensitive data abuse exposure covers the case of the disgruntled IT worker and consultant reviews the legalalities of AUPs (Acceptable Use Policies) and proposes new technologies and processes for mitigating the risk from insiders.
Listen to this podcast (registration required).
Market analytics
Intel Capital,Mohr Davidow Ventures,ONSET Ventures,Reservoir Venture Partners