Phoenix Technologies Partners with Secure Computing in Enterprise Security Marketplace

SAN JOSE, Calif.–(BUSINESS WIRE)–July 12, 2001–

Alliance Accelerates IT & Business Adoption of Breakthrough

StrongROM(TM) “Trusted Device” Security Model

Phoenix Technologies Ltd. (Nasdaq:PTEC), the global leader in system software products for connected digital devices, today announced that the company has entered into a long term co-development, co-branding and co-marketing partnership with Secure Computing Corporation (Nasdaq:SCUR), a leading provider of user authentication and access control technology. This partnership will accelerate the adoption of the Phoenix FirstAuthority Trusted Device Infrastructure(TM), a new security model that relies on Phoenix Technologies’ 20 plus years at the core of the PC industry to create next generation “trusted devices” and “device-aware” applications.

Under the terms of the partnership, Phoenix Technologies and Secure Computing will work together to develop, brand and market an integrated package that includes the innovative Phoenix DeviceConnect(TM) “device authentication” application and the Secure Computing SafeWord Plus(TM) “user authentication” family of products. This new offering will provide a breakthrough level of network security incorporating the best aspects of both “user access control” and “device access control” and assist IT organizations around the world in meeting the growing challenge of hostile attacks to mission-critical networks. In addition, the new offering will support the adoption of Phoenix FirstWare StrongROM and StrongClient(TM) by PC OEMs and IT organizations who want to embed “security@thecore” of their desktop and notebook PCs and other connected devices.

“We are excited to be partnering with Secure Computing on this pioneering effort to integrate our ‘device authentication’ security model with their ‘user authentication’ technology. The combined package will provide an entirely new level of security to IT managers who are charged with maintaining the ‘trust fabric’ of their enterprise resources. With the escalation of hostile attacks, IT organizations will soon be on the fast track to incorporate new ways to protect and defend valuable IT assets and corporate intelligence, and to guarantee the security of their B2C and B2B e-commerce initiatives,” said Kendall S. Larsen, senior vice-president and general manager of PhoenixNet, the security division of Phoenix.

“Secure Computing is excited to be working with Phoenix Technologies to enable new levels of device-centric security,” said Carr Biggerstaff, senior vice president, Marketing, Planning & Business Development, Secure Computing Corporation. “As a market innovator in platformware for connected digital devices, Phoenix is in an excellent position to integrate our powerful user authentication technologies with their FirstAuthority Trusted Device security model.”

Phoenix’s FirstAuthority solution builds on 4 components:

— Cryptographic engines built into devices by OEM Manufacturers

that provide “Security@theCore” to uniquely secure the device

through Phoenix FirstWare StrongROM and StrongClient.

— Applications such as eMail, data bases, network access (login,

VPN, RAS) and electronic wallets can be further secured by

software developers utilizing Phoenix’s FirstAuthority SDK

(Software Developer Kit). Phoenix’s DeviceConnect is the first

application that is being offered and strongly authenticates

Checkpoint’s VPN-1 product.

— A Global Service Network of “Trusted Device Authorities” based

in Internet Data Centers that manage the secured devices in

much the same way as the infrastructure that manages Digital


— A Global Channel of Certified Partners including Distributors,

Managed Service Providers, and Security Resellers will bring

FirstAuthority solutions directly to our worldwide customers.

Phoenix FirstAuthority Trusted Device Infrastructure and POST 2.0 Initiative are enabling the next-generation security management capabilities that add significant value to today’s existing e-business security strategies.

About Secure Computing

Headquartered in San Jose, Calif., Secure Computing Corporation (Nasdaq:SCUR) is the leading provider of enterprise access control software and services. Secure Computing software products and services control access to applications and networks based on user authentication and authorization to market-leading VPNs, firewalls, Web servers and embedded devices. Secure Computing’s worldwide partners and customer base are counted among the Fortune 50 in financial services, healthcare, telecom, communications, manufacturing, technology and Internet service providers, as well as some of the largest agencies of the United States government. For more information, visit the Secure Computing Web site at

About Phoenix

Phoenix is the global leader in “platformware,” system-enabling software products for PCs and connected digital devices in the Age of Digital Convergence. The company’s BIOS and BIOSplus(TM) platformware is used by more than 800 customers worldwide and is designed into millions of industry standard desktop, notebook and server PCs sold annually. Phoenix Technologies’ FirstWare(TM) family of products provides an innovative new way to reduce manufacturing and support costs for OEMs and Resellers while providing value for the end-user through “instant-on” applications. In the Information Appliance market segment, Phoenix Technologies’ FirstView(TM) family delivers an easy-to-implement, low cost/high value architecture that enables “instant-on” internet access and browsing capability for devices such as Internet TV, interactive screen phones, and handheld appliances. In the area of device security, Phoenix Technologies’ FirstAuthority(TM) Trusted Device Infrastructure enables next generation ‘device authority’ security products and services designed from the ground up to deliver a higher level of trust to both devices and device-aware e-business applications. Our customers and partners have come to rely on Phoenix@theCore for their new product and digital initiatives based on our proven track record.

For more information about Phoenix Technologies, visit our website at

Don't miss