More often than not, innovation is fueled by real-world needs. Security, compliance, and the need to leverage data more efficiently are just a few of the daily challenges facing IT. From wireless roaming to SOAs to keeping the feds happy, the following technologists are hard at work anticipating the next wave of enterprise demands. They are already delivering forward-thinking, practical solutions to pressing challenges, so it’s likely you’ll be hearing more about them in the year ahead.
End-to-end control over corporate data is fast becoming synonymous with competitive advantage. To help businesses make the most of their information assets, DataFlux CTO Scott Gidley revitalized the company’s Data Quality Integration Solution and placed the tenets of an SOA model at its core. “Many companies today struggle with finding a single ‘truth’ from applications and data siloed within the organization,” Gidley says. “Our goal has always been to break down the walls among information sources.” Designed to discover, integrate, and manage business-critical data stored in myriad sources, Version 7.0 extends the product’s reach across the enterprise, allowing users to design workflows and to establish rules to ensure that data meets established business requirements. Flexible and scalable, Gidley’s upgrade provides the kind of on-demand SOA and real-time processing on which businesses will increasingly rely.
To ward against the security dangers of providing roaming access to always-on networks, Ken Hardwick, chief scientist at Blue Ridge Networks, invented a cryptographic authentication process for the company’s BorderGuard Secure Wireless VPN. Avoiding the trade-offs inherent in SSL VPN and IPSec solutions, Hardwick’s process leverages the key material from the VPN tunnel prior to connectivity disruption, thereby preventing session hijacking and man-in-the-middle attacks. Ideal for VoIP, videoconferencing, and Pocket PC apps, Hardwick’s solution provides security without sacrificing convenience.
For CipherTrust CTO Paul Judge, combatting spam is all about reputation. Having determined that unknown senders are likely to be zombie machines hijacked by hackers to send spam, viruses, and phishing scams, Judge and his research team set about creating an improved approach to assessing sender reputation. The resultant TrustedSource service employs a policy of “guilty until proven innocent,” forcing a new IP address to demonstrate good behavior before its reputation as a legitimate sender is assured. Another Judge innovation, Connection Control, increases the cost of delivering unsolicited e-mail by rejecting connection attempts from senders that TrustedSource deems deserving of bad reps.
As intrusion prevention systems increasingly make headway against security breaches, Andre Yee, president and CEO of NFR Security, is on the front lines of a shift toward self-aware networks. “We must have security technology that is proactive and predictive,” Yee says. NFR’s Sentivist Real-Time Threat Protection line taps the company’s Confidence Indexing and Sentivist Dynamic Shielding Architecture technologies to predict and protect threat points on the network. By intelligently adapting to any alterations within the network environment, Yee’s solution provides around-the-clock vigilance.