I have talked previously about the challenge of building a File Guard, and the approach we took to designing it.
Guards and gateways are full application layer proxies that connect to two or more networks. They accept data passed on an inbound network interface, ‘process it’, and then pass data to the outbound network interface. The difference between the two is in the ‘process it’ step.
Those nice people at RedHat have written a Case Study on the Nexor Sentinel Product…
Content scanning and filtering products are a crucial part of a security ecosystem, validating that files being moved in or out of a network conform to expectation. But how do you determine what is expected, if the file extension (for example file.PDF) is not reliable.
The Forrester report Strategy Deep Dive: Define Your Data (free download, registration required) has an in-depth look at the topic of data classification and defines a framework for data protection, but appears to lack in detail on the “defending the data” step.
Nexor has announced the Common Criteria Certification, to EAL4 of Nexor Sentinel – a high assurance, e-mail guard.
In the announcement I am quoted as saying: