Victorian-based Validate Technologies has become the exclusive distributor for a new suite of products designed to secure the application layer of databases, groupware and enterprise resource planning (ERP) software.
Validate has signed a distribution agreement with US-based Application Security Incorporated (AppSecInc) for Australia and New Zealand.
AppSecInc's product suite includes tools for penetration testing, database encryption, intrusion detection and auditing analysis. Applications protected by AppSecInc include Oracle, Microsoft SQL Server, Lotus Notes/Domino, and Sybase. Beta versions for IBM DB2/UDB, MySQL, and Microsoft Exchange will be released shortly, according to AppSecInc officials.
Sold on a per-server basis, the technology identifies any potential security flaw in the application and provides patches and software upgrades accordingly over a 12-month period.
"Simplistically, we all know the operating system for a firewall and fileserver is the weak link in security and AppSecInc provides an answer to this problematic issue," said Darren Ash, director of Validate Technologies.
Ash said the technology is suited to basically any company with more than 200 seats with Validate keen to target large enterprises, government and defence customers.
The product line adds another dimension to Validate's security offerings, which is positioning itself as a distributor of secure messaging and data integrity products.
Ash expects significant adoption of the product with one customer in Western Australia reportedly already signed up.
"AppSecInc sought a distributor with a solid reseller base who is principally focused on the security of data and its distribution over the Internet, which is Validate Technologies' core objective," said Eric Gonzales, co-founder and managing director of AppSecInc. "Validate also has everything that AppSecInc looks for in a partner: in-depth technical expertise, application-level security experience, and a complete understanding of the inherent vulnerabilities associated with protecting data from both internal and external threats."