Analytics
2/19/2009
03:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Net Optics Rolls Out New Secure Network Monitoring System

Net Optics iBypass Switch is a passive, inline bypass switch that maintains seamless network flow when deploying an intrusion prevention system

SANTA CLARA, Calif., February 17, 2009 " Net Optics, Inc., a leading provider of network access devices, today reinforced the company's ongoing commitment to address top-of-mind network security issues such as intrusions, cybercrime, and hacking. The Net Optics iBypass Switch, a passive, in-line bypass switch that maintains seamless network flow, is particularly critical when deploying an intrusion prevention system (IPS). The iBypass Switch provides both a fail-open network path in the event of power loss, and the ability to automatically initiate and enable bypass mode should the appliance fail, or require maintenance, repair, or removal. The Net Optics iBypass Switch provides peace-of-mind on all IPS deployments by ensuring the customer maximum network uptime without the risk of an outage. By including the iBypass Switch when deploying an IPS, enterprises gain a secure network monitoring solution and can be assured their network has zero downtime.

According to FBI and GAO surveys, cybercrime is a $67.2-bilion-dollar industry. As security threats continue to mount in both quantity and sophistication, a single firewall or even an IPS on an organization's Internet connection no longer provides sufficient security. Threats often emerge from inside the organization, originating from zombie computers or malicious attacks by employees or unauthorized visitors. As a result, security monitoring is required on all of the critical links on the network as a preventative measure. However, while deploying dozens of intrusion detection devices throughout the network ensures security, it risks increasing costly network downtime when an IPS loses power or needs maintenance.

Net Optics has more than a dozen years of proven experience in keeping corporate networks operating efficiently 24 x 7. The company's iBypass Switches provide IT managers with a solution to quickly deploy intrusion detection across multiple network links without interruption. Compared to traditional direct in-line deployment of an IPS, adding the iBypass Switch provides more security and fail-over capabilities. In addition, among the bypass devices available in the market, the Net Optics iBypass Switch is the only solution that includes remote management capabilities, and that supports IPSs with different copper and fiber interfaces than the links they protect. These advanced features give customers more granular control of their networks and greater flexibility in their deployment options.

According to Bob Shaw, the company's CEO, "Net Optics is committed to offering enterprises network solutions addressing today's critical security problems. Our iBypass Switches enable enterprises to deploy in-line devices without degrading the reliability of their networks. As a result, most IPS suppliers and IT architects consider a bypass switch to be an indispensable element in any IPS installation. In many cases, the unique remote management capabilities of the Net Optics iBypass Switch made it the only bypass choice for a complete best-of-class solution."

Key Features and Benefits Recently, the Tolly Group awarded the iBypass Switch an "Up to Spec" certification validating the claim that the Net Optics iBypass Switch delivers fail-safe connectivity for in-line protection tools such as IPSs and WAN optimization devices. The solution provides the following benefits:

High Availability-Continuous network protection Increased security-Utilizes IPS security appliances more efficiently Broad connectivity-Models available for 10Mbps copper to 10Gbps fiber Flexible-Supports media conversion for in-line devices with differences interfaces Manageable-Provides remote link diagnostics and SNMP capability Compatible-Integrates with all major manufactures' intrusion prevention systems Affordable-Eliminates expensive network downtime for a small incremental cost

"The Net Optics iBypass Switch provided us with the visibility and control needed to manage viral threats to our customer systems, which are directly connected into our exchange floor infrastructure, "said Leo Rodriguez, former Director of Network Operations at Philadelphia Stock Exchange. "By including the Net Optics iBypass Switch in our IPS solution, we added the flexibility of allowing instantaneous bypass of the inline tool " either automatically or manually " should the tool itself impede or delay real-time production trading in any way."

IT Managers can save thousands of dollars by not having to take down network links when devices require upgrades and maintenance, because the iBypass Switch enables them to keep network traffic flowing without any interruptions. IT Managers can be at ease knowing they can maximize their security infrastructure without facing the risks involved with network downtimes.

Net Optics iBypass Switches are currently available. Pricing starts at $2,000.

About Net Optics Net Optics is the leader in innovative passive in-line devices for network security, traffic analysis, and IT monitoring. Its products are deployed in enterprises, service providers, and government organizations worldwide. Leading vendors of protocol analyzers, RMON probes, and IPS appliances have selected Net Optics for their customers' monitoring solutions—from T1 WANs to 10 Gigabit links.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7421
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

CVE-2014-8160
Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

CVE-2014-9644
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

CVE-2015-0239
Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.