08:12 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

iboss Launches Threat And Event Console

Solution provides visual insight into possible cyberthreats, mobile device malware breaches, and network attacks from social media sites

San Diego, CA – December 11, 2013 - iboss today announced its new Threat and Event console, a core component of the company's Secure Web Gateway platform. A provider of network security solutions, iboss is releasing new functionality that gives enterprises unparalleled access to possible cybersecurity threats, malware breaches on mobile devices and attacks entering the network from social media sites. This system increases insight, shortens mitigation response and reduces the total cost of ownership (TCO) by up to 30%.

The iboss platform provides visibility of everything going in and out of a network, across every single network port, identifying the known and the unknown. As an example, there are 65,535 ports on a network and legacy Web security vendors, if port focused, typically monitor only ports 80 and 443. Advanced threats, applications and even SaaS services are increasingly utilizing non-standard ports outside of port 80 and 443. iboss provides the visibility to identify what is traversing your network regardless of the port utilized, providing administrators more content visibility and allowing them to establish more actionable policy.

Unlike legacy network security vendors that focus on log-based threat detection and reporting, iboss approaches the network in a completely different manner by addressing who, and from where, a person connects. iboss' cloud-based platform drills deep into a network, identifying odd behaviors and surfacing 'shadow IT'. This allows companies to create actionable policies that address the high-risk user behavior.

The new Threat and Event console utilizes exclusive features, such as threat GeoMapping and heat map technology, to provide an instant visual pinpoint of threats across a global map. A few examples of the advanced levels of visibility include:

Packet level visibility across all network activity to identify Shadow IT and high-risk user behavior

Advanced data collaboration that dynamically maps connections to the organization they represent and then correlates the information to the directory user creating the event

Ability to track data movement to high-risk countries and organizations based on data quantity, type and where the data is originating from (i.e. company database servers)

Live dashboards that provide information up-to-the second to identify high-risk activities, threats and data movement allowing for more effective mitigation

"Cybersecurity and privacy concerns are now front and center, thanks to the NSA revelations and advanced ways hackers can get into networks. These threats include mobile devices too, as malware is focusing on Android and iOS devices. These devices can be compromised when they are outside the network, infecting upon return," said Peter Martini, COO and co-founder of iboss. "Today's network security vendors and most enterprise environments are just not prepared to track, analyze and understand that type of traffic. Since we started shipping our iboss platform a year ago, we've replaced many legacy vendor installs at enterprises who need to have more insight and visibility into their networks. Many IT administers just don't realize what can actually be seen on the network, as outdated technology doesn't provide that option."

The Threat and Event console benefits include:

Live threat and bandwidth dashboards

Instant URL / ad-hoc reporting capabilities, including compliance reporting and automated backups

A dynamic drill-down interface that includes mobile device threats to allow IT to easily see the issues with the network

The iboss Secure Web Gateway combines:

Web Security (HTTP/S)

Scanning Inside SSL

Layer 7 Application Management DPI/Heuristics/Signatures

BYOD Management- Authentication, Bandwidth, High Risk Quarantine

Mobile Security - On/Off Premise Security

Bandwidth Throttling and QoS

Integrated Threat & Event Console

Other comments related to the news:

1. According to a January 2013 Forrester report by John Kindervag and Heidi Shey, "Data defense is the fundamental purpose of information security...Too often, organizations create data policies without a clear understanding of feasibility and purpose within their business because they themselves are in the dark about their data -- from what data they have to where it resides...In today's evolving data economy, data identity is the missing link that security and risk (S&R) leaders must define in order to create actionable data security and control policy."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-15
Untrusted search path vulnerability in a certain Red Hat build script for the ibmssh executable in ibutils packages before ibutils-1.5.7-2.el6 in Red Hat Enterprise Linux (RHEL) 6 and ibutils-1.2-11.2.el5 in Red Hat Enterprise Linux (RHEL) 5 allows local users to gain privileges via a Trojan Horse p...

Published: 2014-04-15
The monitoring probe display in spacewalk-java before 2.1.148-1 and Red Hat Network (RHN) Satellite 4.0.0 through 4.2.0 and 5.1.0 through 5.3.0, and Proxy 5.3.0, allows remote authenticated users with permissions to administer monitoring probes to execute arbitrary code via unspecified vectors, rela...

Published: 2014-04-15
Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules before 1.1.3-2ubuntu2.1 on Ubuntu 11.10, before 1.1.2-2ubuntu8.4 on Ubuntu 11.04, before 1.1.1-4ubuntu2.4 on Ubuntu 10.10, before 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and before on Ubuntu 8.0...

Published: 2014-04-15
The pkgAcqMetaClearSig::Failed method in apt-pkg/ in Advanced Package Tool (APT) 0.8.11 through and 0.8.16 before 0.8.16~exp13, when updating from repositories that use InRelease files, allows man-in-the-middle attackers to install arbitrary packages by preventing a user fro...

Published: 2014-04-15
The web services APIs in Eucalyptus 2.0 through 3.4.1 allow remote attackers to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMware Broker (VB).

Best of the Web