Market Sectors

block 10


Blue Ridge Networks to Demo BorderGuard Suite of Products and AppGuard at the Capital Cybersecurity Summit

CHANTILLY, Va., Nov. 13, 2017 -- Blue Ridge Networks announced today that it will be exhibiting and providing demonstrations of its BorderGuard and AppGuard cybersecurity solutions at the second annual Capital Cybersecurity Summit on November 14-15, 2017, at Booth #36.

The Capital Cybersecurity Summit will take place at The Ritz-Carlton, Tysons Corner and will feature distinguished keynote speakers and panels offering insights on emerging cybersecurity technologies, digital solutions, operations and enforcement from the private sector and government perspectives. FBI Cyber Division Deputy Assistant Director Howard Marshall will keynote the Summit's opening reception on November 14.

Blue Ridge will offer hands-on demonstrations of both its BorderGuard and AppGuard solutions.

Blue Ridge's BorderGuard suite of products isolate and contain operational technology (OT) and Industrial IoT (IIoT) systems and networks from larger enterprise network vulnerabilities by virtually overlaying existing networking environments, creating trusted enclaves that prevent unauthorized access and contain all communications within trusted environments. OT and IIoT devices within the BorderGuard-enabled enclave are not discoverable or addressable from other networks. By using an overlay approach, BorderGuard deployments do not require changes to network infrastructure. The products allow authorized remote access to devices, while maintaining multi-layer isolation from IT networks and even the endpoint PC used for access. This provides extensive protection against insider threats as well as malicious end-users, while allowing secure remote access.

AppGuard prevents malware from detonating without requiring scanning, updates, or signature-based detection, which can be easily defeated by new emerging undetectable malware attacks. It delivers valuable Indicators of Attack (IOA) well in advance of conventional detection, response, and containment products which typically rely on detecting and identifying Indicators of Compromise (IOC) after a compromise has already occurred.

For more information, visit: or contact us at [email protected]

Based in Northern Virginia, Blue Ridge Networks is a visionary cybersecurity pioneer providing proven network breach prevention, secure remote access, and endpoint security solutions. Its BorderGuard suite of products isolate, contain, and protect operational technology and information technology systems by creating trusted enclaves that prevent unauthorized access and contain network sessions for remote sites, users, and Industrial IoT devices.  Blue Ridge also provides AppGuard, an award-winning endpoint breach prevention solution that stops malware from detonating without requiring detection, scanning, or updates, thus preventing breaches from occurring that are undetectable and unstoppable by other methods. Blue Ridge solutions have protected critical operations for some of the largest US government, financial, infrastructure, and healthcare customers for more than twenty years with no reported breaches.


Recent Videos

IntraLogic's official release of the "One Button" Lockdown system on CBS 2 News.
HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...