Analytics
12/12/2013
08:12 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

iboss Launches Threat And Event Console

Solution provides visual insight into possible cyberthreats, mobile device malware breaches, and network attacks from social media sites

San Diego, CA – December 11, 2013 - iboss today announced its new Threat and Event console, a core component of the company's Secure Web Gateway platform. A provider of network security solutions, iboss is releasing new functionality that gives enterprises unparalleled access to possible cybersecurity threats, malware breaches on mobile devices and attacks entering the network from social media sites. This system increases insight, shortens mitigation response and reduces the total cost of ownership (TCO) by up to 30%.

The iboss platform provides visibility of everything going in and out of a network, across every single network port, identifying the known and the unknown. As an example, there are 65,535 ports on a network and legacy Web security vendors, if port focused, typically monitor only ports 80 and 443. Advanced threats, applications and even SaaS services are increasingly utilizing non-standard ports outside of port 80 and 443. iboss provides the visibility to identify what is traversing your network regardless of the port utilized, providing administrators more content visibility and allowing them to establish more actionable policy.

Unlike legacy network security vendors that focus on log-based threat detection and reporting, iboss approaches the network in a completely different manner by addressing who, and from where, a person connects. iboss' cloud-based platform drills deep into a network, identifying odd behaviors and surfacing 'shadow IT'. This allows companies to create actionable policies that address the high-risk user behavior.

The new Threat and Event console utilizes exclusive features, such as threat GeoMapping and heat map technology, to provide an instant visual pinpoint of threats across a global map. A few examples of the advanced levels of visibility include:

Packet level visibility across all network activity to identify Shadow IT and high-risk user behavior

Advanced data collaboration that dynamically maps connections to the organization they represent and then correlates the information to the directory user creating the event

Ability to track data movement to high-risk countries and organizations based on data quantity, type and where the data is originating from (i.e. company database servers)

Live dashboards that provide information up-to-the second to identify high-risk activities, threats and data movement allowing for more effective mitigation

"Cybersecurity and privacy concerns are now front and center, thanks to the NSA revelations and advanced ways hackers can get into networks. These threats include mobile devices too, as malware is focusing on Android and iOS devices. These devices can be compromised when they are outside the network, infecting upon return," said Peter Martini, COO and co-founder of iboss. "Today's network security vendors and most enterprise environments are just not prepared to track, analyze and understand that type of traffic. Since we started shipping our iboss platform a year ago, we've replaced many legacy vendor installs at enterprises who need to have more insight and visibility into their networks. Many IT administers just don't realize what can actually be seen on the network, as outdated technology doesn't provide that option."

The Threat and Event console benefits include:

Live threat and bandwidth dashboards

Instant URL / ad-hoc reporting capabilities, including compliance reporting and automated backups

A dynamic drill-down interface that includes mobile device threats to allow IT to easily see the issues with the network

The iboss Secure Web Gateway combines:

Web Security (HTTP/S)

Scanning Inside SSL

Layer 7 Application Management DPI/Heuristics/Signatures

BYOD Management- Authentication, Bandwidth, High Risk Quarantine

Mobile Security - On/Off Premise Security

Bandwidth Throttling and QoS

Integrated Threat & Event Console

Other comments related to the news:

1. According to a January 2013 Forrester report by John Kindervag and Heidi Shey, "Data defense is the fundamental purpose of information security...Too often, organizations create data policies without a clear understanding of feasibility and purpose within their business because they themselves are in the dark about their data -- from what data they have to where it resides...In today's evolving data economy, data identity is the missing link that security and risk (S&R) leaders must define in order to create actionable data security and control policy."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web