Data security rules offer boost to Waltham’s Fidelis Media Coverage The latest media coverage from various outlets Fidelis Security Systems Inc. is glad that the government is finally seeing things its way. Fidelis has for years been supplying a combined hardware-software appliance that does one thing — stops data leakage from a network. “Data leakage” is the industry term that covers a wide area of undesirable activity, including those data breaches experienced by TJX Cos. Inc. in late 2006. Now, with Massachusetts slowly approaching a March 2010 deadline for the new company data security regulations that were enacted last fall, and a new partnership that will add to the ways Fidelis can keep data safe, the company is poised for growth that will bring it into the black, according to Kurt Bertone, vice president of strategic alliances at Fidelis, which is based in Waltham. “The company is well-funded by top-tier venture capital companies, but we are still a small company,” he said. “Our plan is to reach cash-flow break-even with our existing funding.” Those venture capital companies include Ascent Venture Partners and Tudor Ventures of Boston, Point Judith Capital of Rhode Island, and Inflection Point Ventures of Delaware, all of which were in Fidelis’ $22 million round in April 2008. “The company has been around since 2002, but it was really bootstrapped by a couple of guys for several years,” Bertone said. Now at 50 employees, Fidelis has linked up with a Palo Alto, Calif.-based company to keep file transfers secure. The new partnership is with Accellion Inc., which makes its own appliance — one that pulls attachments out of an e-mail before it leaves a network and creates a path to it through a secure HTTP link, helping reduce the likelihood that confidential or valuable information gets sent across the unsecure Internet via e-mail. With the Fidelis XPS product’s ability to do a “deep-session inspection” — essentially find out everything there is to know about any data passing through a network — applied to Accellion’s secure file transfers, the companies can now show network administrators the nature of such a file before it leaves the network or before it gets into its endpoint network. “According to Accellion, a very large percentage of data transfer is file transfer,” Bertone said. “This brings that into compliance.” Compliance is the name of the game for companies like Fidelis, said Nick Selby, co-founder of Cambridge Infosec Associates Inc., a New York-based risk-management consultancy. But that is quickly expanding. “The wider marketplace now is anyone who deals with customer information and is concerned with customer information and the impact of breaches of data,” he said. While Fidelis’ traditional verticals have been those companies that had to deal with data security compliance, such as financial services firms or health-care companies, Bertone is anticipating an uptick from all sectors of the business world that hold customer data in any form, as new laws like the Bay State’s get enacted. “The more regulations there are, the better it is, but compliance regs are not the only drivers,” Bertone said. “There is a need to protect the image and the brand of a company.” http://www.masshightech.com/stories/2009/09/21/daily46-Data-security-rules-offer-boost-to-Walthams-Fidelis.html Predefined Rules Brief descriptions on predefined network security rules are provided in this section. Internet Group Management Protocol The IGMP used for subscription or unsubscription to/from groups of multicast users. This protocol can be misused easily and that is why it is disabled by default. We recommend you not to enable this protocol unless you run applications which use multicast technologies (typically for transmission of audio or video data through the Internet). Ping and Tracert in, Ping and Tracert out Programs Ping and Tracert (Traceroute) are used to trace route in a network (to detect response of a remote computer). This is achieved through messages of ICMP (Internet Control Message Protocol). First, a possible attacker tests whether as elected IP address responds to control messages. Blocking these messages will make your computer “invisible” and reduces chance of possible intrusions. All incoming Ping and Tracert messages (from the Internet) are blocked by default. These messages are allowed from the trusted area (administrator can for example test availability of a computer by the Ping command). Outgoing Ping and Tracert messages are permitted for both areas. These methods are usually used to verify network connection functionality or availability of a remote computer. Other ICMP packets Rule for other ICMP messages (i.e. redirections, destination is not available, etc.) Dynamic Host Configuration Protocol DHCP is used for automatic definition of TCP/IP parameters (IP address, network mask, default gateway, etc.). Warning: DHCP denial might cause that network connection of your computer will not work if TCP/IP parameters are defined through this protocol. Domain Name System DNS is used for translation of computer names to IP addresses. At least one connection to a DNS server must be permitted to enable definition through DNS names. Virtual Private Network Virtual private network (VPN) is a secure connection of two local networks (or connection of a remote client to a local network) via the Internet using an encrypted channel (so called tunnel). The Virtual Private Network rule allows/denies VPN establishment through the PPTP protocol (Microsofts proprietary protocol). Broadcasts Rules for packets with general address. In the Internet, this rule is also applied on packets with multicast addresses. Some observers are concerned that new rules governing the transfer of Internet domains between domain registrars that went into effect on Nov. 12 will facilitate theft of those domains and slamming by registrars. The new rules, originally announced by ICANN (the Internet Corporation for Assigned Names and Numbers) on July 12, were approved unanimously by both ICANNs Generic Names Supporting Organization [GNSO] and its Board of Directors. About a year ago I wrote about problems with domain registration transfers that made it all too easy to steal someone elses domain. I got a shocking amount of mail from victims of domain theft at the time and developed a low opinion of registrars. It was clear they all wanted to just bury the matter, and they dont get the benefit of the doubt from me anymore. (Register.coms Web site is scrupulously lacking in any information for press to use for contacts. There was a time when they had a contact and just moved slow on it, but they lack even this now.) So I was ready to assume the worst when I read about the new rules. They streamline certain procedures so as to facilitate transfers in cases where the registrar previously holding the domain—the registrar of record—drags its feet. It seems the real problem, as ICANN puts it, was not registrars being too easy with transfers, but those not proceeding with a timely transfer when a legitimate request came in. And more specifically, Network Solutions has a lousy reputation in this regard. (Am I now accusing them of conflicting offenses, being too lax with transfer security and not willing enough to proceed with the transfer? Let them call me up and explain it to me.) It seems that the sorts of problems I was observing have less to do with the transfers between registrars than with other security policies of the registrar, specifically changing the administrative contact information. The new ICANN policies shouldnt make the problems any worse because they still require that the registrar of record contact the owner. If the owner information is incorrect, its really a separate issue. And if there is a real dispute over a domain transfer, there is a set and orderly policy for dispute resolution.

transfer security 0,08 8100 - 8100 9900 8100 8100 8100 8100 6600 8100 8100 8100 6600 - - 3,81 ¤ - 8100 file transfer secure 0,59 12100 - 12100 12100 12100 14800 12100 12100 12100 12100 12100 14800 12100 - - 8,64 ¤ - 12100 secure file transfer 0,59 12100 - 12100 12100 12100 14800 12100 12100 12100 12100 12100 14800 12100 - - 0,00 ¤ - 12100 transfer secure file 0,59 12100 - 12100 12100 12100 14800 12100 12100 12100 12100 12100 14800 12100 - - 0,00 ¤ - 12100 file transfer security 0,26 480 - 880 480 480 480 720 480 390 480 480 590 390 - - 4,03 ¤ - 480 secure data transfer 0,57 1000 - 880 1000 1000 1000 720 1300 1000 880 1000 1000 880 - - 7,28 ¤ - 1000 secure transfer 0,5 18100 - 18100 18100 18100 18100 18100 18100 18100 18100 18100 22200 14800 - - 8,27 ¤ - 18100 hypertext transfer protocol secure 0,04 590 - 480 720 720 590 480 390 480 720 720 720 590 - - 0,08 ¤ - 590 security transfer 0,08 8100 - 8100 9900 8100 8100 8100 8100 6600 8100 8100 8100 6600 - - 0,00 ¤ - 8100 data transfer security 0,19 320 - 320 320 320 480 390 320 260 390 320 390 320 - - 8,80 ¤ - 320 file transfer 0,19 450000 - 450000 450000 450000 450000 450000 450000 450000 450000 450000 450000 368000 - - 3,70 ¤ - 450000 security seal 0,76 14800 - 14800 14800 14800 14800 14800 14800 14800 14800 14800 14800 12100 - - 5,28 ¤ - 14800 security labels 0,83 4400 - 2900 3600 3600 3600 4400 4400 4400 4400 4400 5400 4400 - - 5,41 ¤ - 4400 transfer file 0,2 450000 - 450000 450000 450000 450000 450000 450000 450000 450000 450000 450000 368000 - - 0,00 ¤ - 450000 secure file transfer service 0,87 260 - 260 320 260 260 210 320 480 260 260 260 210 - - 0,08 ¤ - 260 file transfer service 0,4 4400 - 4400 4400 4400 4400 4400 4400 5400 4400 4400 4400 3600 - - 4,61 ¤ - 4400 secure file transfer appliance 0,76 140 - 140 170 140 140 140 140 110 91 170 170 170 - - 9,01 ¤ - 140 secure ftp transfer 0,56 320 - 260 320 320 480 390 320 480 390 260 260 320 - - 6,44 ¤ - 320 secure file transfers 0,59 12100 - 12100 12100 14800 14800 12100 12100 14800 12100 12100 14800 12100 - - 7,90 ¤ - 12100 file transfer system 0,24 1600 - 1600 1300 1600 1600 1300 1300 1300 1600 1600 1600 1300 - - 4,10 ¤ - 1600 file transfer services 0,4 5400 - 5400 5400 5400 5400 5400 8100 6600 5400 5400 5400 4400 - - 5,42 ¤ - 5400 secure internet file transfer 0,7 210 - 260 170 210 210 210 260 260 260 260 210 170 - - 7,07 ¤ - 210 document transfer 0,2 8100 - 8100 8100 8100 8100 8100 8100 8100 8100 8100 8100 6600 - - 2,35 ¤ - 8100 secure managed file transfer 0,79 140 - 140 170 210 170 140 140 140 170 170 170 110 - - 0,08 ¤ - 140 secure file exchange 0,47 590 - 590 590 480 720 720 720 880 480 480 590 480 - - 4,61 ¤ - 590 transfer protocol secure 0,22 1600 - 1600 1900 1600 1600 1600 1300 1600 1600 1600 1900 1600 - - 0,08 ¤ - 1600 accellion secure file transfer 0,39 110 - 91 110 110 110 110 91 110 110 110 210 140 - - 0,08 ¤ - 110 secure electronic transfer 0,16 260 - 110 210 110 170 170 170 210 260 260 480 590 - - 0,08 ¤ - 260 secure large file transfer 0,85 170 - 140 140 170 260 170 260 390 110 140 170 140 - - 0,08 ¤ - 170 secure email transfer 0,39 210 - 170 170 170 170 210 170 170 210 210 260 260 - - 9,38 ¤ - 210 secure hypertext transfer protocol 0,04 590 - 480 720 720 590 390 390 480 590 590 590 480 - - 0,08 ¤ - 590 security file transfer 0,26 480 - 880 480 480 480 720 480 390 480 480 590 390 - - 0,00 ¤ - 480 transfer secure 0,5 18100 - 18100 18100 18100 18100 18100 18100 18100 18100 18100 22200 14800 - - 0,00 ¤ - 18100 service file transfer 0,4 5400 - 5400 5400 5400 5400 5400 8100 6600 5400 5400 5400 4400 - - 0,00 ¤ - 5400 services file transfer 0,4 5400 - 5400 5400 5400 5400 5400 8100 6600 5400 5400 5400 4400 - - 0,00 ¤ - 5400 securities transfer 0,04 3600 - 3600 3600 3600 3600 3600 2900 3600 3600 3600 3600 3600 - - 2,44 ¤ - 3600 secure document transfer 0,73 140 - 91 58 91 170 140 110 210 210 210 170 58 - - 5,43 ¤ - 140 security transfer systems 0,12 140 - 110 170 110 91 73 170 110 170 170 170 170 - - 0,08 ¤ - 140 secure data transfer system 0,7 58 - 58 58 36 46 22 91 58 58 46 58 46 - - 0,08 ¤ - 58 secure file transfer solutions 0,81 91 - 73 140 110 91 91 110 140 91 73 58 58 - - 0,08 ¤ - 91 value secure file transfer 0,51 58 - - 0 0 480 91 58 58 0 0 0 0 - - 0,08 ¤ - 58 secure file transfer methods 0,62 58 - 36 46 46 28 58 73 58 58 73 110 58 - - 0,08 ¤ - 58 secure file transfer solution 0,81 91 - 73 140 110 91 91 110 140 91 73 58 58 - - 0,08 ¤ - 91 managed secure file transfer 0,79 140 - 140 170 210 170 140 140 140 170 170 170 110 - - 0,08 ¤ - 140 security transfers 0,12 590 - 480 720 590 590 590 480 480 590 590 590 590 - - 0,08 ¤ - 590 enterprise secure file transfer 0,88 36 - - - - - - - - - - - - - - 0,08 ¤ - 36 secure data transfer methods 0,54 46 - 36 73 36 36 36 36 36 46 28 46 36 - - 0,08 ¤ - 46 secure file delivery 0,57 91 - 91 91 91 91 91 91 73 110 73 91 73 - - 0,08 ¤ - 91 ssh secure transfer 0,36 3600 - 2900 3600 3600 3600 2900 2900 2900 3600 3600 4400 2900 - - 0,08 ¤ - 3600 secure transfer protocol 0,24 1300 - 1300 1600 1600 1300 1300 1000 1300 1600 1600 1600 1300 - - 0,08 ¤ - 1300 hosted secure file transfer 0,99 36 - - - - - - - - - - - - - - 0,08 ¤ - 36 secure file transfer services 0,87 260 - 260 320 260 260 210 320 480 260 260 260 210 - - 0,08 ¤ - 260 nhs secure file transfer 0,66 73 - 73 46 58 58 91 58 91 58 46 91 73 - - 0,08 ¤ - 73 ssh secure transfer client 0,31 1300 - 1300 1300 1300 1300 1000 1000 1000 1300 1300 1600 1300 - - 0,08 ¤ - 1300 secure file transfer system 0,64 46 - 46 28 46 58 36 46 58 36 36 58 28 - - 0,08 ¤ - 46 secure file transfer legal 0,31 16 - - - - - - - - - - - - - - 0,08 ¤ - 16 secure transfer of data 0,57 1000 - 880 1000 1000 1000 720 1300 1000 880 1000 1000 880 - - 0,08 ¤ - 1000 transfer a file 0,2 450000 - 450000 450000 450000 450000 450000 450000 450000 450000 450000 450000 368000 - - 0,08 ¤ - 450000 file transfer options 0,2 170 - 140 170 140 210 170 140 140 210 170 210 170 - - 0,08 ¤ - 170









































TASBO and CSF Publish Budget and Finance Resources  Texas Association of School Boards











































Online Services for businesses  Department of Taxation and Finance