Feeds

Forum Systems aims At XML security space

Intel appliance

  • alert
  • submit to reddit

High performance access to file storage

ComputerWire: IT Industry Intelligence

One-year-old Utah startup Forum Systems Inc this week becomes one of the first entrants into the emerging XML security space, when it launches its Forum Sentry appliance. The company is taking aim at government, financial services and healthcare, the traditional early adopters of security products.

The Sentry appliance provides encryption, signing, auditing and routing of XML messages, based on user-set policies. The device will be available in July for $34,495, although a more powerful 2U $50,000 version will be released in the fall, according to CEO Wes Swenson.

Swenson said the Sentry is designed to provide a more secure alternative to SSL for sensitive application-to-application XML messages. "Where SSL is point-to-point, this is end-to-end," he said. By digitally signing the data at the tag and content level, the security lasts until it reaches its destination.

The appliance is usually deployed next to the firewall or application server, "eavesdropping" on outgoing traffic. When it recognizes XML data, it parses it to see if its contents match those in preset policies. These policies can be set to encrypt or sign data if it meets certain parameters, or to route it to a chosen destination.

For example, a stockbroker company could set the machine to only encrypt all trades, but to only sign those with a value over $100,000, or those requested by preferred clients. Similarly, preferred clients could have their data routed to a higher-speed server. The Sentry logs all traffic that passes through it.

The device itself uses Intel Corp's Tualatin processors, and comes equipped with Broadcom digital signature processors that run over 600 sigs per second, and NCipher SSL processors that allow the box to also act as an SSL terminator/accelerator.

Salt Lake City-based Forum faces competition from other young companies including Sarvega Inc and DataPower Technology Inc, which provide XML switching, security and accelerations appliance. But Swenson says the company Forum has gone up against the most so far is Ireland-based Vordel Ltd.

He also expects to face competition from more established network kit vendors, such as Cisco, Nortel and F5. "We do expect them to enter this space," he said. "But we would prefer they come and OEM our software from us, which we are open to doing."

© Computerwire.com.

High performance access to file storage

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.