Attacks/Breaches
2/3/2014
11:56 AM
Connect Directly
RSS
E-Mail
50%
50%

Corero Unveils New Threat Defense System For Service Providers

Corero SmartWall TDS family of network security appliances protects again DDoS attacks and cyberthreats

HUDSON, MA – February 3, 2014 – Corero Network Security (LSE:CNS), a leading provider of First Line of Defense® security protection for the enterprise, today announced the introduction of the Corero SmartWall&trade Threat Defense System (TDS) for service providers. The SmartWall family of products enables service providers to deliver First Line of Defense security services, protecting their customers from DDoS attacks and cyber threats.

Service providers and their customers are both impacted by the challenges of DDoS attacks and cyber threats. These attacks have grown in size, frequency and sophistication in recent years. Not surprisingly, customer expectations for improved service availability and security have risen in unison. Enterprises are increasingly calling on their service providers to assist them in the detection, analysis and mitigation of DDoS attacks and other cyber threats before they have an impact on their operations and ultimately, their business. In the recent report to the President of the United States "Immediate Opportunities for Strengthening the Nation's Cybersecurity" by the President's Council of Advisors on Science and Technology, Internet service providers were identified as a group that is well positioned to contribute to rapid improvements in cybersecurity through real-time action.

The Corero SmartWall TDS addresses this challenge by providing the opportunity for service providers to deliver First Line of Defense, always on, threat protection and visibility to their customers. It is a purpose-built family of network security appliances that is configurable to meet the needs of service providers. These appliances deliver comprehensive threat defense services in rapidly scalable deployments for higher performance, greater connectivity and broader functionality than previously possible. This unique, slim line appliance delivers 10Gbps full-duplex performance in a ¼ wide, 1 RU form factor. Service providers can deploy a combination of SmartWall TDS appliances to deliver the performance, connectivity and security required. Customers benefit from progressive inspection, threat detection and policy-based protection with always on visibility at any throughput - 1 RU delivers 40Gbps, and 4 RU delivers 160Gbps.

The Corero SmartWall TDS functionality is delivered by the following family of appliances:

· Network Threat Defense – A majority of DDoS attacks occur at Layers 3 and 4, therefore the Corero SmartWall TDS was built to protect against these attacks using IP address blocking, SYN flood protection, TCP/UDP rate control and Client-Server connection limiting.

· Application Threat Defense – Many applications, including those that rely on encrypted communications using Secure Sockets Layer (SSL), are vulnerable to application layer DDoS attacks that utilize Layer 7 attack vectors. The Corero SmartWall TDS defends against these attacks using Deep Packet Inspection (DPI) of Layer 7 protocols and payloads in combination with behavioral anomaly detection.

· Network Forensics – As sophisticated threats continue to evolve, effective security analysis requires continuous visibility into the traffic flowing between the protected network and the Internet. The Corero SmartWall TDS supports 10Gbps line rate packet capture to enable network forensics of security incidents.

· Network Bypass – Network availability is essential to maintaining always on Internet services. The Corero SmartWall TDS utilizes intelligent zero power network bypass technology to eliminate service downtime in the event of power or equipment failure, or during routine maintenance and configuration upgrades.

"We are excited to introduce this new portfolio of First Line of Defense solutions for service providers," said Ashley Stephenson, CEO of Corero Network Security. "Building upon our years of experience supporting enterprise customers with on-premises DDoS protection, we have now enabled service providers to similarly assist their customers in the escalating battle against cyber threats. With the addition of the SmartWall TDS, Corero is well positioned to keep pace with the evolution of the DDoS defense market and customer demands for improved levels of cybersecurity protection, both on-premises and in the cloud."

SmartWall TDS will be demonstrated live at Booth # 2407 during RSA 2014 in San Francisco. SmartWall TDS solutions are priced from $250K for a 40Gbps configuration with availability for trials in Q1, 2014 and deployments beginning in Q2, 2014.

About Corero Network Security

Corero Network Security, an organization's First Line of Defense against DDoS attacks and cyber threats, is a pioneer in global network security. Corero products and services provide online enterprises, service providers, hosting providers and Managed Security Service Providers with an additional layer of security capable of inspecting Internet traffic and enforcing real-time access and monitoring policies designed to match the needs of the protected business. Corero technology enhances any defense-in-depth security architecture with a scalable, flexible and responsive defense against DDoS attacks and cyber threats before they reach the targeted IT infrastructure allowing online services to perform as intended. For more information, visit www.corero.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3409
Published: 2014-10-25
The Ethernet Connectivity Fault Management (CFM) handling feature in Cisco IOS 12.2(33)SRE9a and earlier and IOS XE 3.13S and earlier allows remote attackers to cause a denial of service (device reload) via malformed CFM packets, aka Bug ID CSCuq93406.

CVE-2014-4620
Published: 2014-10-25
The EMC NetWorker Module for MEDITECH (aka NMMEDI) 3.0 build 87 through 90, when EMC RecoverPoint and Plink are used, stores cleartext RecoverPoint Appliance credentials in nsrmedisv.raw log files, which allows local users to obtain sensitive information by reading these files.

CVE-2014-4623
Published: 2014-10-25
EMC Avamar 6.0.x, 6.1.x, and 7.0.x in Avamar Data Store (ADS) GEN4(S) and Avamar Virtual Edition (AVE), when Password Hardening before 2.0.0.4 is enabled, uses UNIX DES crypt for password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force a...

CVE-2014-4624
Published: 2014-10-25
EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) 6.x and 7.0.x through 7.0.2-43 do not require authentication for Java API calls, which allows remote attackers to discover grid MCUser and GSAN passwords via a crafted call.

CVE-2014-6151
Published: 2014-10-25
CRLF injection vulnerability in IBM Tivoli Integrated Portal (TIP) 2.2.x allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.