World Library  
Flag as Inappropriate
Email this Article

Stonesoft

Article Id: WHEBN0020305633
Reproduction Date:

Title: Stonesoft  
Author: World Heritage Encyclopedia
Language: English
Subject: McAfee, Helsinki Stock Exchange, Trusted Information Systems
Collection:
Publisher: World Heritage Encyclopedia
Publication
Date:
 

Stonesoft

Stonesoft Corporation
SFT1V
Industry Network Security
Founded Helsinki, Finland (1990 (1990))
Founder(s) Ilkka Hiidenheimo
Hannu Turunen
Headquarters Helsinki, Finland
Area served Worldwide
Key people Ilkka Hiidenheimo
(Chairman & CEO)
Juha Kivikoski
(COO)
Mikael Nyberg
(CFO)[1]
Jarno Limnéll
(Cyber Security Director[2])
Products Network security
Firewall
IPS
VPN
Security appliances
Virtual appliances
Employees 222 (Dec 2011)[3]
Website

Stonesoft Corporation is a publicly owned vendor of network security solutions based in Helsinki, Finland. Its product portfolio includes firewall/VPN devices, IPS (intrusion detection and prevention systems), and SSL VPN systems,[4] each available as hardware appliances, software, and VMware-certified virtual appliances.[5] Each of the components, as well as third-party devices, can be managed from the Stonesoft Management Center.[6] The product portfolio differentiates through unique clustering and load balancing technologies based on the company's older StoneBeat technology, originally developed for Check Point FireWall-1.

Stonesoft does business globally, with a regional headquarters in Atlanta, Georgia, United States, and sales offices throughout Europe, the Middle East, and China.

History

Stonesoft started as a systems integrator in the Nordic regions of Europe. In 1994 it introduced StoneBeat, a technology for creating a high availability pair of firewalls in an active-passive configuration. In 1999, the company extended StoneBeat with a patented load balancing clustering technology,[7] launching StoneBeat FullCluster. It was one of the first technologies certified in Check Point's OPSEC program.[8]

In 2001, Stonesoft expanded its product set into the firewall/VPN space, becoming a direct competitor to Check Point. The StoneGate Firewall/VPN was launched on March 19, 2001. In January 2003, the company introduced the first virtual firewall/VPN solution, for IBM mainframes.[9]

In 2010, the company released information via CERT-FI[10] on Advanced Evasion technique (AETs) that met with skepticism in the community. Further AETs were released in 2011, and eventually verified by independent labs and researchers.[11][12][13]

In 2012 “Stonesoft” replaced the “StoneGate” product name. From now on, Stonesoft is used both as the company and product name.

Stonesoft Corporation’s product sales for Q3 2012 were circa 5.6 million euros. The product sales grew by approximately 18%. The Q3 net sales were approximately 9.2–9.3 million euros, which equals a growth by14-16%. The growth was lower than expected.[14]

Products

Stonesoft's current product portfolio can be divided into five major categories[4]:

  • Stonesoft Firewall/VPN
  • Stonesoft IDS/IPS
  • Stonesoft SSL VPN
  • Stonesoft Management Center (SMC)
  • Stonesoft Virtualization Solutions

The Stonesoft Firewall/VPN has placed in Gartner's Magic Quadrant for Enterprise Network Firewalls for several years, and is currently placed in the niche quadrant.[15] Gartner notes that Stonesoft "serves a set of placements well – usually, high availability is key or when the leaders are otherwise not welcome".[15] The Stonesoft firewall/VPN is regarded for its "robust performance and feature set relative to company resources, and it has a loyal customer base".[15]

The Stonesoft IPS has also placed in Gartner's Magic Quadrant for Network Intrusion Prevention, currently in the “visionaries” quadrant.[16] It is also certified by ICSA Labs Network Intrusion Prevention and Detection category, and is one of only four vendors in the consortium to achieve that certification.[17] Stonesoft has also received favorable reviews from NSS Labs for both the next generation firewall capability (2012) and the intrusion detection and prevention system.[18][19]

Controversy

In 2008, the Helsinki Court of Appeal issued a decision in a case brought against Stonesoft and several members of its management team. The court "held that two members of the company's board of directors and a former CEO through gross negligence had failed to give a profit warning in due time".[20] The issue at hand was discrepancies between the profitability forecasted in the company's year 2000 interim reports and the actual state of the company at that time. The reports indicated the company was sound and profitable, yet "a profit warning should in fact have been issued".[20] The District Court of Helsinki had originally dismissed the claims in a decision on November 15, 2006.[21]

Advanced Evasion Techniques

In 2010 Stonesoft informed the public about a new evasion technique that can bypass security defences. Stonesoft defines the Advanced Evasion Techniques (AETs) as ”virtually limitless in quantity and unrecognizable by conventional detection methods. They can work on all levels of the TCP/IP stack and work across many protocols or protocol combinations.” [13]

According to Max Nyman, Stonesoft Corporation’s Senior Marketing Manager, AETs can deliver malicious code without detection and without leaving trace.[22]

On July 23, 2012 Stonesoft released a free tool that enables organisations to test their network security.[23]

Cyber Security

Cyber Security can be defined as the security of the digital world. Stonesoft has continued to invest strongly in its cyber security competence.[24] In May 2012, Stonesoft Corporation appointed Mr. Jarno Limnéll as Director, Cyber Security. His main responsibilities include creating and promoting Stonesoft’s cyber security strategy and facilitating partnerships in the area.[2]

According to Jarno Limnéll, the world will experience a growing number of intentionally executed and demonstrated cyber-attacks in the coming years. He says that defence, resilience and offence are all required for a country or a company to protect themselves.[25]

References

External links

  • Semi-official community Web site
  • Advanced Evasion Techniques
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and USA.gov, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for USA.gov and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
 
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
 
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.
 



Copyright © World Library Foundation. All rights reserved. eBooks from Hawaii eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.