Beyond-IP to Speak at SATO Conference on Security in the ERA of Regulations

Northbrook, IL – April 19, 2005 – Beyond-IP, a leader in network vulnerability scanning, today announced that Michael Kiefer will be a featured keynote speaker at the SATO Conference on April 28, 2005. Kiefer will be interviewed as part of an interactive discussion titled: "The Unintended Consequences of Sarbanes Oxley – Improving Network Security (and shareholder value) in an Era of Regulations" on April 28, 2005 at 11:30AM EST.

This interactive session will introduce the concept of ongoing network scanning as a critical piece of risk management for officers in publicly held companies. Without ongoing assurance that all financial systems are secure, executives have no way to attest to the strength of current controls.
With the addition of other government legislation such as HIPAA and GLBA it is clear that proper security measures play an ever-increasingly critical role in the executive suite. For non-technical executives, many important questions will be answered such as; how to strike a healthy balance between government regulations and business prerogatives, how to ensure that government doesn’t “regulate business out of business,” and how to balance budget with overall security needs.

The SATO Conference brings together top minds from the Security and Technology industries to explore practical solutions for improving security postures across the enterprise. For more information, visit To schedule a meeting with Beyond-IP executives, contact Ben Bradley at 630-221-9844.

About Beyond-IP, LLC

For organizations concerned about regulatory compliance or dissatisfied with the network security audit services provided by their consulting firms, Beyond-IP provides an Automated Vulnerability Management Appliance that provides a higher quality, lower cost network vulnerability assessment and management than any other alternative. The Automated Vulnerability Management Appliances performs a security mapping of your network and simulates attacks originating from either the internal or the external network. Once the security scanning is complete, the software generates a detailed vulnerability report specifying the security breaches, along with practical solutions to fix those vulnerabilities. Beyond-IP’s solutions allow simplified measurement, monitoring and management of vulnerabilities over time. Beyond-IP is the US arm of Beyond Security LTD. To learn more, visit

Contact for Beyond-IP, LLC

Ben Bradley