California County Ramps Up IT Security

Secure Computing Corp., an enterprise gateway security company, recently announced that Orange County, Calif., has protected its IT network with a unified set of Secure Computing products, including Secure Firewall, Secure Mail and Secure Web.

Addressing multiple threat vectors, the complete Secure Computing solution incorporated anti-spam, anti-virus, anti-malware, e-mail filtering and encryption, data protection, Web filtering, intrusion prevention and protection from blended attacks.

In addition, thanks to Secure Computing's Unified Threat Management (UTM) approach, the county government has been able to achieve enterprise-class security while keeping management overhead to a minimum.

Orange County IT executives report that the new security has significantly improved productivity.

“Secure Computing’s line of fully integrated solutions protects the County of Orange from both internal and external dangers, allowing my staff to focus on managing security instead of constantly reacting to threats,” said Tony Lucich, CISO for the Orange County Office of Information Technology.

Like many government organizations, the Orange County network houses a large amount of sensitive data that requires the high levels of protection.

According to Lucich, the county selected Secure Computing because it combines multiple best-of-breed security protections into "all-in-one" appliances.

“We didn’t want to have to deal with managing multiple boxes strung together,” Lucich said. “We needed a big picture solution to deal with the large increase we’ve seen in threats like spam and viruses.”

Spam accounts for 97 percent of all e-mail threatening to enter Orange County’s network. In order to block that unwanted email, the county relies on Secure Computing's TrustedSource reputation-based security system, which gathers historical and real-time global intelligence in order to provide pro-active threat blocking.

“Based on our own first-hand experience, companies that integrate the TrustedSource module into their existing load balancers, firewalls or other technologies are going to see a vast improvement in their spam filtering,” Lucich said. “This technology, along with Secure Mail, allows us to save thousands of dollars every day in lower email administration costs, dramatically reduces the need to buy additional servers to process increased mail volumes and, perhaps most importantly, saves us an estimated $42,000 a day in employee productivity that would otherwise be lost to dealing with spam.”

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Protecting Data is Critical

    To say that the Internet of Things (IoT) has become a part of everyday life would be a dramatic understatement. At this point, you would be hard-pressed to find an electronic device that is not connected to the internet. Read Now

  • Mobile Access Adoption

    Smartphones and other mobile devices have had a profound impact on how the world securely accesses the workplace and its services. The growing adoption of mobile wallets and the new generation of users is compounding this effect. Read Now

  • Changing Mindsets

    We have come a long way from the early days of fuzzy analog CCTV systems. During that time, we have had to migrate from analog to digital signals. When IP-based network cameras arrived, they opened a new world of quality and connectivity but also introduced plenty of challenges. Thankfully, network devices today have become smart enough to discover themselves and even self-configure to some degree. While some IT expertise is certainly required, things are much smoother these days. The biggest change is in how fast security cameras and supporting infrastructure are evolving. Read Now

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3