Altor Networks announced today that Network Products Guide, industry’s leading publication on information technologies and solutions, has named Altor VF virtual firewall a winner of the
2009 Best Products and Services Award. This respected annual award honors products and services that represent the rapidly changing needs and interests of the end-users of technology worldwide. As part of the tech-industry’s leading global awards program, this year’s Best Products and Services were nominated from all over the world.
The first security solution of its kind and purpose-built for the virtualized environment, the Altor VF monitors and controls inter-VM traffic and enforces security policies at the individual VM level. Designed from scratch to secure the latest virtualization technologies, the Altor VF provides the thorough protection and ease-of-operation missing from traditional network security products that were not designed for the virtual environment.
“Increased end-user awareness and ongoing advances in technology are helping shape better products and services.” says Rake Narang, editor-n-chief, Network Products Guide. “Altor VF is the industry’s only complete virtual firewall solution, delivered as a virtual appliance, which secures VMotion and auto deploys for easy installation.”
“Network Products Guide’s recognition of the Altor VF is further validation that we are taking a leadership position in providing defense-in-depth security for virtualized environments,” said Catherine Edwards, communications director at Altor Networks. “The Altor VF goes beyond basic virtual firewall functionality to provide best-of-breed protection, and tight integration with existing security management systems, allowing security administrators to feel confident about expanding virtualization to their production environment.”
The Altor VF gives customers unprecedented visibility into and granular control over virtual network traffic with award-winning technology that dramatically improves the security of virtual servers in data centers. Data center administrators can now pinpoint virtual security compromises and easily create role-based security policies. Security policies can be continuously enforced on individual VMs, simplifying deployment and on-going security management of the virtual infrastructure while reducing the dangers of security breaches.