ion-ip to offer Beyond Security's VA solutions in the Netherlands

ion-ip to offer Beyond Security's VA solutions in the Netherlands

Veenendaal, September 1, 2008

ion-ip's customers now have access to the Vulnerability Assessment and Protection solutions of Beyond Security. ion-ip's solutions enable organizations to continuously monitor IP infrastructures of any size for known and unknown security holes in servers, expose vulnerabilities in the corporate network, check computer systems for the possibility of hostile external attacks and audit vendor products for security holes.

Willem-Jan Bruin, CEO, ion-ip commented: "the partnership with Beyond Security, the leader in proactive and automatic tools for Vulnerability Assessment and Management is another step to complete our Application Delivery Networking portfolio. We are very pleased with the combined expertise of both companies to maximize the service we can deliver to our customers"

With this partnership ion-ip offers an extra service towards the increasingly importance of security of systems and applications. "Many of our customers operate in the financial sector and telecom business", says Fred van de Heuvel Sales Manager of ion-ip. "In these industries security of its infrastructure is a mission critical element in their organization. We feel it is our job to inform our customers about the risks and provide them effective solutions."

"Automated and Active Vulnerability Scanning and Management has become an absolute priority for companies, because it is the only way to know how safe your network really is", says Zvi Magnes, Sales Director at Beyond Security. "More than ever, companies are requiring both best of breed security technologies and superior expertise to address increasingly sophisticated challenges, which is why our partnership with ion-ip is so important for our customers. ion-ip, gives us the opportunity to work with a trusted leader in the networking and security market".

Inadequate Security Recent research of MarketCap shows that one out of every three companies is not aware of a cyber attack, or they find out months after the attack has taken place. Almost 40 percent of the organizations, that have experienced an attack, indicate that they have lost data and information. In 28 percent this concerns mission critical information. With a regular vulnerability scan, these organizations would have been aware of any security risks and take action to prevent these type of attacks.

Extensive reports In order to keep the network safe on a continuous basis, Beyond Security's flagship Automated Scanning appliance was developed for ease of use and simplicity. Once security mapping and scanning is complete a detailed vulnerability report is generated specifying the security vulnerabilities with practical and easy-to-apply fixes for those vulnerabilities. ion-ip offers a single scan of your network or you can get a subscription for regular scanning. For customers who want to monitor their network continuously, ion-ip can deliver an fully managed automated scanning solution.

About Beyond Security
Beyond Security, a privately-held company, develops leading vulnerability assessment and self-management solutions that facilitate preemptive, real-time and continuous network, server, database and application security. The company was founded in 1999 by the founders of SecuriTeam portal (, a leading source for vulnerability alerts and solutions serving 1.5 million monthly page views to IT security professionals. Beyond Security's founders are great believers in automation, which is why the company sells tools instead of using them to provide services. Beyond Security's goal is to decrease the number of security holes in products to manageable levels and empower software vendors to release secure products. For more information, visit

Mehr Informationen

Beyond Security

ist ein zugelassener Scanning-Anbieter für die Payment Card Industry (PCI).

Testen von Webanwendungen

Entdecken Sie Sicherheitsprobleme im Zusammenhang mit Webanwendungen, Websites und den zugehörigen Anlagen und Datenbanken.