TriGeo Network Security
Encyclopedia
TriGeo Network Security is a United States
United States
The United States of America is a federal constitutional republic comprising fifty states and a federal district...

-based provider of security information and event management (SIEM) technology. The company helps midmarket organizations proactively protect networks and data from internal and external threats, with a SIEM appliance that provides real-time log management
Log management and intelligence
Log management comprises an approach to dealing with large volumes of computer-generated log messages...

 and automated network defense - from the perimeter to the endpoint.

TriGeo’s appliance-based solution combines security event management
Security Event Manager
A security event manager is a computerized tool used on enterprise data networks to centralize the storage and interpretation of logs, or events, generated by other software running on the network....

, security information management
Security Information Management
Security information management is the industry-specific term in computer security referring to the collection of data into a central repository for trend analysis...

 and log management and intelligence
Log management and intelligence
Log management comprises an approach to dealing with large volumes of computer-generated log messages...

 into a single device.

History

The company’s first major commercial product release, TriGeo Security Information Manager (SIM), debuted in January 2002 to help users automatically identify, notify and respond to suspicious behavior, policy violations, and network attacks. TriGeo’s SIM solution has evolved since its debut, introducing its 64bit SIM appliance and provides real-time analysis for network infrastructure devices such as deep packet inspection
Deep packet inspection
Deep Packet Inspection is a form of computer network packet filtering that examines the data part of a packet as it passes an inspection point, searching for protocol non-compliance, viruses, spam, intrusions or predefined criteria to decide if the packet can...

 firewalls
Firewall (computing)
A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass....

, intrusion detection
Intrusion detection
In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. When Intrusion detection takes a preventive measure without direct human intervention, then it becomes an Intrusion-prevention...

 and intrusion prevention data.

In July 2011, the company was acquired by SolarWinds
SolarWinds
SolarWinds is a developer and marketer of network, applications, virtualization and storage management software.The company sells downloadable software products that maintain, monitor and troubleshoot IT networks...

, a developer and marketer of network, applications and storage management software.

Focus

TriGeo SIM is sold exclusively to midmarket organizations and targets a variety of businesses including bank
Bank
A bank is a financial institution that serves as a financial intermediary. The term "bank" may refer to one of several related types of entities:...

s, credit unions, retailers, government agencies, utilities, education, media and entertainment companies, and healthcare providers. The company also offers several add-on features including its nDepth, nSight and USB-Defender products, which support additional functionality and security.

Security Information Manager (SIM) addresses industry-specific remediation requirements by monitoring firewalls
Firewall (computing)
A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass....

, intrusion detection
Intrusion detection
In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. When Intrusion detection takes a preventive measure without direct human intervention, then it becomes an Intrusion-prevention...

 systems, intrusion prevention systems, routers, switches, VPNs, servers
Server (computing)
In the context of client-server architecture, a server is a computer program running to serve the requests of other programs, the "clients". Thus, the "server" performs some computational task on behalf of "clients"...

, anti-virus software, and workstation activity. By providing broad device coverage and multiple device event correlation, SIM can accurately detect anomalous behavior with a low false positive rate. Once an unauthorized or suspicious activity is identified, SIM instantly notifies and transmits security alerts via e-mail
E-mail
Electronic mail, commonly known as email or e-mail, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the...

, cell phones, pagers, and handheld devices. Also, the technology can be configured to automatically respond by blocking an IP address, routing traffic, quarantining a workstation from the rest of the network or controlling applications and access control services based on user-defined rules and active defense policies. TriGeo SIM also has reporting capabilities for emerging compliance mandates like Sarbanes-Oxley, the Health Insurance Portability and Accountability Act
Health Insurance Portability and Accountability Act
The Health Insurance Portability and Accountability Act of 1996 was enacted by the U.S. Congress and signed by President Bill Clinton in 1996. It was originally sponsored by Sen. Edward Kennedy and Sen. Nancy Kassebaum . Title I of HIPAA protects health insurance coverage for workers and their...

 (HIPAA), Gramm-Leach-Bliley Act
Gramm-Leach-Bliley Act
The Gramm–Leach–Bliley Act , also known as the Financial Services Modernization Act of 1999, is an act of the 106th United States Congress...

 (GLBA) and the Payment Card Industry Data Security Standards
PCI DSS
The Payment Card Industry Data Security Standard is an information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards....

 (PCI DSS).

TriGeo nDepth, which combines log aggregation and archiving with real-time event correlation and proactive response, gives businesses the ability to forensically search through log data from multiple devices for specific information and events.

TriGeo nSight, powered by Qliktech
Qliktech
QlikTech is a business intelligence software company based in Radnor, Pennsylvania. QlikTech is the provider of QlikView, a business intelligence solution that delivers enterprise-class analytics and search. Its in-memory associative search technology makes calculations in real-time, enabling...

, is a business intelligence
Business intelligence
Business intelligence mainly refers to computer-based techniques used in identifying, extracting, and analyzing business data, such as sales revenue by products and/or departments, or by associated costs and incomes....

 solution that gives companies the ability to drill down into and correlate log data to discover new threats and improve network visibility.

TriGeo’s USB-Defender blocks unauthorized USB drive and device use and alerts administrators to USB violations, helping prevent the theft of corporate data and the introduction of external viruses onto the network.

Achievements

TriGeo has received several industry awards including:

2010
  • SC Magazine Best Buy Award
  • CRN Magazine April 2010: Top Midmarket Security Product
  • Midsize Enterprise Summit April 2010: Best Execution of a Midmarket IT Solution
  • Midsize Enterprise Summit April 2010: Best Presentation
  • IT Business Edge Midmarket CIO Forum March 2010: Best Midmarket Solution


2009
  • SC Magazine Excellence Award: Best Small to Medium Sized Enterprise (SME) Security Solution
  • Midsize Enterprise Summit May 2009: Best of Show
  • Midsize Enterprise Summit May 2009: Best Midmarket Hardware Solution
  • Midsize Enterprise Summit September 2009: Best of Show
  • Midsize Enterprise Summit September 2009: Best Execution of a Midmarket IT Solution
  • SC Magazine Reader Trust Award Finalist: Best Security Information/Event Management
  • EverythingChannel Hot Product that Midmarket CIO’s Want Right Now


2008
  • Campus Technology 2008 Innovator Award
  • Gartner Midsize Enterprise Summit September 2008: Best of Show
  • Gartner Midsize Enterprise Summit September 2008: Best Execution of a Midmarket IT Solution
  • Bank Technology News FutureNow List #1 Ranking
  • Gartner Midsize Enterprise Summit May 2008: Best of Show
  • Gartner Midsize Enterprise Summit May 2008: Best Midmarket Hardware Solution
  • Red Herring 100 Finalist
  • SC Magazine Reader Trust Award: Best Event Management


2007
  • Frost & Sullivan 2007 North American Technology Innovation of the Year Award
  • Gartner Midsize Enterprise Summit: Best Execution of a Midmarket IT Solution
  • Gartner Midsize Enterprise Summit: Best Midmarket Solution Hardware
  • Network Computing: Best of Interop Finalist (Security)
  • SC Magazine Reader Trust Award: Best Event Management


2006
  • Info Security Product’s Guide: Global Excellence in Security Information Management Award
  • Gartner Midsize Enterprise Summit: Best Execution of a Midmarket IT Solution
  • Gartner Midsize Enterprise Summit: Best Midmarket Software Solution
  • Gartner Midsize Enterprise Summit: Best of Show
  • SC Magazine Best of 2006: Event Management
  • SC Magazine Best Buy Award
  • SC Magazine Reader Trust Award Finalist: Best Event Management
  • SC Magazine Reader Trust Award Finalist: Best Security Management Tool
  • SC Magazine Reader Trust Award: Best Event Management
  • Security Week Editor’s Choice Award


2005
  • SC Magazine Best of 2005: SIM
  • SC Magazine Best Buy Award

Partners

Check Point
Check Point
Check Point Software Technologies Ltd. is a global provider of IT security solutions. Best known for its firewall and VPN products, Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology...

, COMPUTERLINKS, Dell
Dell
Dell, Inc. is an American multinational information technology corporation based in 1 Dell Way, Round Rock, Texas, United States, that develops, sells and supports computers and related products and services. Bearing the name of its founder, Michael Dell, the company is one of the largest...

, Hewlett-Packard
Hewlett-Packard
Hewlett-Packard Company or HP is an American multinational information technology corporation headquartered in Palo Alto, California, USA that provides products, technologies, softwares, solutions and services to consumers, small- and medium-sized businesses and large enterprises, including...

, IBM
IBM
International Business Machines Corporation or IBM is an American multinational technology and consulting corporation headquartered in Armonk, New York, United States. IBM manufactures and sells computer hardware and software, and it offers infrastructure, hosting and consulting services in areas...

, McAfee, Microsoft
Microsoft
Microsoft Corporation is an American public multinational corporation headquartered in Redmond, Washington, USA that develops, manufactures, licenses, and supports a wide range of products and services predominantly related to computing through its various product divisions...

, PhoenixDatacom, Qliktech
Qliktech
QlikTech is a business intelligence software company based in Radnor, Pennsylvania. QlikTech is the provider of QlikView, a business intelligence solution that delivers enterprise-class analytics and search. Its in-memory associative search technology makes calculations in real-time, enabling...

, Sun Microsystems
Sun Microsystems
Sun Microsystems, Inc. was a company that sold :computers, computer components, :computer software, and :information technology services. Sun was founded on February 24, 1982...

, Symantec
Symantec
Symantec Corporation is the largest maker of security software for computers. The company is headquartered in Mountain View, California, and is a Fortune 500 company and a member of the S&P 500 stock market index.-History:...

, TippingPoint
Tippingpoint
TippingPoint was an American software company with roots back to 1999 focused on network security products, particularly intrusion prevention systems for networks. TippingPoint was acquired by 3Com Corporation in 2005, and was run as an autonomous security-focused division from 2005 to 2010. On...

, VMWare and Websense
Websense
Websense is a San Diego-based company specializing in Web security gateway software. It enables clients to block access to chosen categories of websites.-History:Websense was founded by Phil Trubey in 1994...

.

Selected Customers

Alliant Credit Union, American Bank and Trust Company, Bakers Footwear, Bank of McKenney, Chicago Stock Exchange
Chicago Stock Exchange
The Chicago Stock Exchange is a stock exchange in Chicago, Illinois, USA. The exchange is a national securities exchange and self-regulated organization, which operates under the oversight of the U.S. Securities and Exchange Commission . The Chicago Stock Exchange is the third most active stock...

, DirecTV
DirecTV
DirecTV is an American direct broadcast satellite service provider and broadcaster based in El Segundo, California. Its satellite service, launched on June 17, 1994, transmits digital satellite television and audio to households in the United States, Latin America, and the Anglophone Caribbean. ...

, Castle Rock Broadcast Center, Fairwinds Credit Union, Farmers & Merchants Bank, First Arkansas Bank, First National Bank – Cortez, First Savings Bank of Renton, Fort Sill Federal Credit Union, Georgia’s Own Credit Union, Hitachi
Hitachi
Hitachi is a multinational corporation specializing in high-technology.Hitachi may also refer to:*Hitachi, Ibaraki, Japan*Hitachi province, former province of Japan*Prince Hitachi and Princess Hitachi, members of the Japanese imperial family...

 Medical Systems America (HMSA), Maverik Inc., MyBank - Bank of Belen, National Research Corporation, NexBank, O'Bannon Bank, Pasadena Federal Credit Union, San Diego County Credit Union
San Diego County Credit Union
San Diego County Credit Union is a credit union based in San Diego, California. SDCCU was founded in 1938 as San Diego County Employees Credit Union and was formed to provide for the financial needs of local county government employees...

, Santa Fe Bank, Fiserv, Inc., Stillwater National Bank, National Aquarium in Baltimore
National Aquarium in Baltimore
The National Aquarium, Baltimore is a public aquarium located at 501 E Pratt St. in the Inner Harbor area of Baltimore, Maryland, USA. It was constructed during Baltimore's urban renewal period and opened on August 8, 1981. The aquarium has an annual attendance of 1.5 million and a collection of...

, TruMark Financial Credit Union
TruMark Financial Credit Union
TruMark Financial Credit Union, headquartered in Bensalem Township, Pennsylvania, is the fifth largest credit union in Pennsylvania. The credit union currently has 13 branch locations within Southeastern Pennsylvania, including Bucks, Chester, Delaware, Montgomery, and Philadelphia Counties...

, United Community Bank, United States Postal Service Federal Credit Union, Upper Chesapeake Health, Wilsons Leather, Windsor Management Group

Industry Acronyms

LMI – Log Management and Intelligence
Log management and intelligence
Log management comprises an approach to dealing with large volumes of computer-generated log messages...



SEM – Security Event Management
Security Event Manager
A security event manager is a computerized tool used on enterprise data networks to centralize the storage and interpretation of logs, or events, generated by other software running on the network....



SIM – Security Information Management
Security Information Management
Security information management is the industry-specific term in computer security referring to the collection of data into a central repository for trend analysis...



External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK