WatchGuard updates email and web security appliance
Posted on 30 August 2013.
Bookmark and Share
WatchGuard Technologies introduced the WatchGuard XCS 880, which is designed to meet the email and web-based content security needs of large enterprises.


Delivering 20 percent more processing power, twice the email throughput per dollar, and consuming less than half the energy of previous models, the XCS 880 protects against inbound threats such as virus, blended threats and network attacks, while helping control outbound information to prevent data loss. The XCS 880 will replace the XCS 770R and the XCS 970.

"Today's enterprises deploy advanced messaging networks that move massive amounts of data through email and across the Internet into the corporate network. To keep suspect information out and sensitive information in requires a sophisticated content security strategy," said Roger Klorese, director of product management at WatchGuard. "The XCS 880 is designed to simplify this core capability – by giving organizations an email security, privacy and compliance solution with best-in-class technology – while delivering enhanced performance, dramatic power reduction, and redundant power supplies."

By reducing the watt-hours used by more than half, the XCS 880 provides businesses with an efficient content security platform that delivers savings not only in power costs but in cooling as well. And thanks to improvements in the processor and data storage, the device is smaller and lighter (with a weight reduction of 18 lbs.), allowing businesses to reduce their expenditures in costly rack space.

WatchGuard has improved reliability over the XCS 770R by adding a redundant power supply that eliminates a potential source of failure and ensures data remains secure in the event of a power interruption. Like the models it replaces, the XCS 880 uses RAID technology to protect data in the event of disk failure.

The WatchGuard XCS 880 is available now for purchase and trade-up, and includes customizable reporting features to help IT with audit requests and compliance requirements, as well as WatchGuard's LiveSecurity PLUS customer support and software update services.





Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //