Cymphonix Upgrades Network Composer

Cymphonix has announced the release of the next version of its Cymphonix Network Composer device, a secure Web gateway appliance that sits between an organization's firewall and network switches to protect users from the growing myriad of threats posed by viruses, worms, and other insidious Web content that often "sneaks in" to networks with inadequate Internet security.

The latest version introduces enhanced reporting capabilities for increased visibility and control when users on a large network, such as a corporation or school district, are logged on to the Internet. Threats to a network often come via seemingly innocuous Internet activities, such as reading e-mail attachments or visiting Web sites that have been infected with spyware or other malware that even a site's operators cannot detect.

Additional new features include:

  • Scalable reporting engine for increased visibility in large network environments;
  • Enhanced database architecture to support specific reporting needs;
  • Support for industry standard tools, such as Crystal Reports, Excel, Access, and PERL programs;
  • Expanded content identification system with larger URL database, more than 90 content categories and support for 21 languages;
  • Expanded spyware/malware recognition through participation in an international code-sharing anti-malware consortium.

The new version, available in a variety of configurations for up to 50,000 Internet users on a single network, is available now. Free upgrades are available to existing users with annual maintenance contract. More information can be found here.

About the Author

Scott Aronowitz is a freelance writer based in Las Vegas. He has covered the technology, advertising, and entertainment sectors for seven years. He can be reached here.

Featured

  • DreamBox Math

    Discovery Education Announces Updates to Experience, DreamBox Math

    K-12 learning solution provider Discovery Education has announced enhancements to its Discovery Education Experience and DreamBox Math products, designed to create a more personalized, engaging learning experience for students.

  • abstract pattern of cybersecurity, ai and cloud imagery

    Report Identifies Malicious Use of AI in Cloud-Based Cyber Threats

    A recent report from OpenAI identifies the misuse of artificial intelligence in cybercrime, social engineering, and influence operations, particularly those targeting or operating through cloud infrastructure. In "Disrupting Malicious Uses of AI: June 2025," the company outlines how threat actors are weaponizing large language models for malicious ends — and how OpenAI is pushing back.

  • digital dashboard featuring a shield icon, graphs, a world map, and network nodes

    IBM Launches Agentic AI Governance and Security Platform

    IBM has introduced a new software stack for enterprise IT teams tasked with managing the complex governance and security challenges posed by autonomous AI systems.

  • laptop and fish hook

    Security Researchers Identify Generative AI 'Vishing' Attack

    A new report from researchers at Ontinue's Cyber Defense Center has identified a complex, multi-stage cyber attack that leveraged social engineering, remote access tools, and signed binaries to infiltrate and persist within a target network.