Nakina to Enhance its Cybersecurity Portfolio
OTTAWA, ONTAIRO: In a major announcement made, Nakina publicized new enhancements to its cybersecurity solution, NI-DEFENDER. The award winning cybersecurity solution combines configuration management, analytics, and identity access methodologies which allow service providers to neutralize threats associated to network security.
Nakina is a leader in identity access and configuration management solutions and will be showcasing NI-DEFENDER at the Mobile World Congress 2016 in Barcelona, Hall 7, 7J11, in a multi-technology demonstration. “NI-DEFENDER is a new class of security solution for physical, virtual and software defined networks. Insiders are behind 70% or more of all security breaches and 65% of all cyberattacks exploit network vulnerabilities from incorrect or outdated configurations. Complexity arising from IoT, small cells, NFV, and SDN will strain security and network operations teams. Security policy orchestration and advanced analytics proactively protect these complex and dynamic networks,” explained Patrick Rhude, CTO, Nakina.
The cybersecurity solution will be demonstrated in a multi-technology featuring Check Point virtual firewalls running on the Wind River® Titanium Server™ NFV infrastructure platform. “Orchestrated identity access and configuration management will be key to accelerate new services including virtual firewall security services. Check Point’s industry-leading next generation threat prevention solutions combined with Nakina’s platform help service providers overcome many of the operational challenges in managing and deploying virtualized, software-defined networks,” said Alon Kantor, VP of Business Development, Check Point.
Physical and virtual security policy orchestration, multi-vendor and multi-technology networks, enhanced analytics, trending and reporting are the new enhancements that would be included in NI-DEFENDER. Network security will be improved and compromised network assets will be pin-pointed by these new enhancements ad identity access and configuration management will be automated. Proactive audits will also be supported by these enhancements which will allow CISOs and network security operations teams to visualize, and assure the security integrity of network resources.