M2 PRESSWIRE-31 March 2005-Lucent Technologies: Enterasys Networks and Lucent Technologies announce security consulting and assessment services for enterprise customers(C)1994-2005 M2 COMMUNICATIONS LTD
RDATE:30032005
ANDOVER, Mass. and MURRAY HILL, N.J. - Enterasys Networks (NYSE: ETS), the Secure Networks Company, and Lucent Technologies (NYSE: LU) today announced the immediate availability of a family of joint professional services for delivering secure convergence solutions to enterprise customers.
The companies also announced that they have completed Secure Networks certification for Lucent's enterprise Voice over Internet Protocol (VoIP) solution. This solution, part of Lucent's Accelerate Next-Generation Communications portfolio, provides the same features and applications found in IP Centrex and IP PBX solutions, as well as applications such as unified communications, collaborative conferencing and location-based services.
Under this agreement, Enterasys will resell Lucent's suite of Bell Labs-developed security consulting and assessment solutions and Voice over Internet Protocol (VoIP) readiness assessment to provide a secure environment for enterprise networks migrating or adding VoIP services.
"These new offerings are a significant addition to Enterasys' portfolio of Secure Networks services. By jointly delivering them with Lucent, we bring our combined expertise in infrastructure security and highly available VoIP capabilities to enterprise customers," said Cynthia Gallant, executive vice president of the Secure Networks Group for Enterasys. "Lucent delivers industry-leading solutions in next-generation communications networks, and Enterasys is the leader in Secure Networks products, services and solutions that optimize and protect the IP infrastructure to maximize service availability, quality and security. Combined, our two companies bring unmatched expertise in secure data and voice networking to our joint customers."
The primary security services Enterasys and Lucent are jointly offering include:
* Security ROI Framework Service-Quantifies return on investment for security investments so customers can assess and understand the financial benefits associated with implementing their enterprise-wide security programs.
* Network Security Assessment & Security Policy Development Services-Provides a snapshot of how security policies are being implemented, while identifying potential security exposures and recommends mitigations. Also defines and documents security positions, using industry standards as benchmarks, thus enabling customers to establish or strengthen policies as needed. This service, which includes the Bell Labs Security Framework (now the ITU-T X.805 security standard), helps customers better understand their current network security posture, enabling a more rapid transition and adoption of comprehensive network security solutions.
* Security Penetration Testing Service-Tests the ability of the network to withstand attempts to gain unauthorized access and exploit any vulnerabilities, which enables customers to validate changes to their networks and understand the potential ramifications.
* Security Incident Response Service-Establishes an incident management system that provides an overview on techniques, procedures and operational plans for handling security incidents. Bell Labs experts and consultants work with customers to assure their staff has superior response processes and incident preparedness to accompany Secure Networks solutions.
The companies are also offering VoIP Consulting Services, which will include:
* VoIP Readiness Assessment Service-Determines the ability of an enterprise's existing data network to support voice traffic, and provides specific recommendations and analysis for network modifications.
* VoIP Technology Evolution Service-Analyzes different VoIP solutions from a number of perspectives-architectural, feature, functionality and financial-and provides critical inputs for project planning.
"Offering enterprise customers a variety of VoIP and security products and services is a significant step in our alliance with Enterasys," said Ashok Shah, vice president of Professional Services, Lucent Worldwide Services. "Lucent's professional services expertise in VoIP and security coupled with Enterasys' industry-leading security and enterprise VoIP platforms, enables us to offer enterprise customers a complete and secure voice and data solution for their networks."
Application of Bell Labs Expertise
These security and VoIP services leverage Lucent's Bell Labs expertise in developing highly reliable and secure network solutions. Bell Labs has also worked with the industry to understand network failures and to develop industry-endorsed best practices, and has taken the lead role in developing security and reliability standards for wireline and wireless networks.
"Bell Labs' approach to planning, managing and maintaining secure computer and telecom networks is the basis of the new ITU-T network standard-Recommendation X.805," said Jeff Jaffe, president, Bell Labs Research and Advanced Technologies. "Bell Labs continues to conduct meaningful research in areas supporting security and our experts are intensely focused on the best practices and standards needed to identify and correct potential security vulnerabilities before they can be exploited."
Secure Networks Certification
Certification of Lucent's enterprise Voice over Internet Protocol (VoIP) solution signifies that the companies have completed a battery of interoperability tests between Lucent's enterprise Voice over Internet Protocol (VoIP) solution, Lucent VPN Brick firewall and Radius server, which are now certified as interoperable with Enterasys' Secure Networks devices and applications such as the award-winning Dragon IDS and NetSight Policy Manager. Specifically, Lucent's enterprise Voice over Internet Protocol (VoIP) solution has passed rigid, industry-standard security testing, including more than 40,000 security attack scenarios during which Enterasys' unique granular policy capabilities fully protected voice traffic traversing the Lucent solution. The attack scenarios cover known vulnerabilities including DDoS, Host DoS attacks, prevention systems for switches and firewalls, access control lists, rate limiting, flow set throttling, authentication methods, acceptable use policy, dynamic intrusion responses and virtual LANs.
The Enterasys Secure Networks Advantage
Enterasys' industry-leading Secure Networks technology and solutions provide the highest level of infrastructure security available today. Secure Networks delivers the most granular level of security, providing visibility and control down to the network device, individual user and application level.
This enables enterprises to quickly and easily detect, assess, locate and protect against attacks. This unmatched security comes from the integrated policy-based management software architecture that works with the embedded security capabilities Enterasys designs into its entire product line.
This unique approach offers significant operational and business benefits, unmatched by vendor offerings that add hardware or software to multiple network access points in an attempt to increase security. In fact, Secure Networks technology can even make networks with competitors' equipment more secure.
About Enterasys Networks
Enterasys Networks is the Secure Networks Company, providing enterprise customers with innovative network infrastructure products, services and solutions that deliver the security, productivity and adaptability benefits required by Global 2000 organizations. For more information on Enterasys Secure Networks and the company's products, including multilayer switches, core routers, WAN routers, wireless LANs, network management, and intrusion defense systems, visit www.enterasys.com.
About Lucent Technologies
Lucent Technologies designs and delivers the systems, services and software that drive next-generation communications networks. Backed by Bell Labs research and development, Lucent uses its strengths in mobility, optical, software, data and voice networking technologies, as well as services, to create new revenue-generating opportunities for its customers, while enabling them to quickly deploy and better manage their networks. Lucent's customer base includes communications service providers, governments and enterprises worldwide. For more information on Lucent Technologies, which has headquarters in Murray Hill, N.J., USA, visit www.lucent.com.
This news release contains forward-looking statements regarding future events, activities and financial performance, such as management's expectations regarding future revenue and cash flow; strategic relationships and market opportunities; product development; and other business strategies and objectives. These statements may be identified with such words as "we expect," "we believe," "we anticipate," or similar indications of future expectations. These statements are neither promises nor guarantees, and actual future financial performance, events and activities may differ materially.
Readers are cautioned not to place undue reliance on these statements, which speak only as of the date hereof. We expressly disclaim any obligation to update such statements publicly to reflect changes in the expectations, assumptions, events or circumstances on which such statements may be based or that may affect the likelihood that actual results will differ materially.
Some risks and uncertainties that may cause actual results to differ materially from these forward-looking statements include, but are not limited to: worldwide and regional economic uncertainty and recent political and social turmoil may continue to negatively affect our business and revenue; we have a history of losses in recent years and may not operate profitably in the future; our quarterly operating results may fluctuate, which could cause us to fail to meet quarterly operating targets and result in a decline in our stock price; we earn a substantial portion of our revenue for each quarter in the last month of each quarter, which reduces our ability to accurately forecast our quarterly results and increases the risk that we will be unable to achieve previously forecasted results; we continue to introduce new products, and if our customers delay product purchases or choose alternative solutions, or if sales of new products are not sufficient to offset declines in sales of older products, our revenue could decline, we may incur excess and obsolete inventory charges, and our financial condition could be harmed; we may be unable to upgrade our indirect distribution channels or otherwise enhance our selling capabilities, which may hinder our ability to grow our customer base and increase our revenue; we have experienced significant changes in senior management and our current management team has been together for only a limited time, which could limit our ability to achieve our objectives and effectively operate our business; there is intense competition in the market for enterprise network equipment, which could prevent us from increasing our revenue and achieving profitability; a portion of the enterprises we sell to rely in whole or in part on public funding and often face significant budgetary pressure, and if these customers must delay, reduce or forego purchasing from us, our revenues could be harmed; we depend upon a limited number of contract manufacturers for substantially all of our manufacturing requirements, and the loss of any of our primary contract manufacturers would impair our ability to meet the demands of our customers; and those additional risks and uncertainties discussed in our most recent filings with the Securities and Exchange Commission, including our annual report on Form 10-K for the fiscal year ended January 1, 2005.
CONTACT: Kevin Flanagan, Enterasys NetworksTel: +1 978 684 1473e-mail: kflanaga@enterasys.comKevin Kosh, CHEN PR Inc.Tel: +1 781 466 8282 x 11e-mail: kkosh@chenpr.comStephen Loudermilk, Lucent TechnologiesTel: +1 908 582 5725e-mail: sloudermilk@lucent.com
((M2 Communications Ltd disclaims all liability for information provided within M2 PressWIRE. Data prepared by named party/parties. Further information on M2 PressWIRE can be obtained at http://www.presswire.net on the world wide web. Inquiries to info@m2.com)).
No comments:
Post a Comment