Beyond Security Finalist for the "Red Herring 100 Global" Awards 2007

NORTHBROOK, IL, November 29, 2007 - Red Herring Magazine announced today that Beyond Security, represented and distributed in the United States by Beyond-IP LLC, has been short listed for the Red Herring 100 Global 2007 Awards.

Beyond-IP, which offers remote, deployed, distributed wireless and application level scanning, is the first company to provide a scanning solution that pinpoints vulnerabilities both in network level and web application level.

Red Herring 100 winners and finalists from North America, Europe and Asia of the last three years were eligible for this award. Of the 1800 eligible companies, The Red Herring editorial team used a very intensive process to grind the list down to the 200 finalists of this first-time award. Companies were evaluated on both quantitative and qualitative criteria including financial performance, innovation, management, global strategy, and ecosystem integration. The names of the 200 companies short-listed as finalists for the "Red Herring 100 Global 2007" can be found online at

"The 200 finalists we selected from around the world are all excellent contenders," said Joel Dreyfuss, Editor-in-Chief of Red Herring. "They are exceptional companies with smart and innovative platforms that attest to the importance of technology in today's global economy." Beyond Security has made the final group because of its outstanding achievements, and Red Herring Magazine is honored to announce it is one of the most promising technology firms in the world.

Red Herring Global is a prestigious event which celebrates the Global Top 100 privately held technology companies from around the world. The event brings together an elite roster of entrepreneurial and global venture investment firms to showcase excellence in innovation. It features keynote discussions, roundtable panels and networking events designed to foster participant networking and partnerships.

About Beyond-IP, LLC

For organizations concerned about regulatory compliance or dissatisfied with the network security audit services provided by their consulting firms, Beyond-IP provides an Automated Vulnerability Management Appliance that provides a higher quality, lower cost network vulnerability assessment and management than any other alternative. The Automated Vulnerability Management Appliances performs a security mapping of your network and simulates attacks originating from either the internal or the external network. Once the security scanning is complete, the software generates a detailed vulnerability report specifying the security breaches, along with practical solutions to fix those vulnerabilities. Beyond-IP’s solutions allow simplified measurement, monitoring and management of vulnerabilities over time. To learn more, visit

Contact for Beyond-IP, LLC
Ben Bradley

About Red Herring

Red Herring is a global media company uniting the worlds best high technology innovators, venture investors and business decision makers in a variety of forums: a leading innovation magazine; an online daily technology news service; technology research, and major events for technology leaders around the globe. Red Herring provides an insider's access to the global innovation economy, featuring unparalleled insights on the emerging technologies driving the economy. For more information, visit

Contact at Red Herring
Jordy Brazier
Senior Manager
Red Herring
Global Tel: 650 585 3524

About Beyond Security

Beyond Security develops leading vulnerability assessment and self-management solutions that facilitate preemptive, real-time and continuous network, server, database and application security. The company was founded in 1999 by the founders of SecuriTeam portal (, a leading source for vulnerability alerts and solutions serving 1.5 million monthly page views to IT security professionals. Beyond Security's founders are great believers in automation, which is why the company sells tools instead of using them to provide services. Beyond Security's goal is to decrease the number of security holes in products to manageable levels and empower software vendors to release secure products.