Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

12/13/2010
03:15 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Enterasys Delivers Comprehensive Solution For Addressing Network And Host-Based Threats

Enterasys Intrusion Prevention Solution extends its network protection to enterprises deploying the IPv6 standard

ANDOVER, Mass., Dec. 13, 2010 /PRNewswire/ -- Enterasys Networks, a Siemens Enterprise Communications Company, today announced the latest release of the Enterasys Intrusion Prevention Solution (IPS), a comprehensive solution featuring patented distributed intrusion prevention technology which simultaneously addresses the widest variety of network and host-based threats. The latest version of Enterasys IPS now extends its network protection to enterprises deploying the IPv6 standard.

"Malone University recognized the need to strengthen its network security and chose Enterasys IPS because of its advanced combination of threat protections, along with its flexibility to integrate with our multi-vendor infrastructure," said Clark Hoopes, director of information technologies at Malone University in Canton, Ohio. "We require the highest standards in network security, while still staying within our limited IT budget. We count on Enterasys security solutions to help us meet those standards."

The Enterasys IPS solution includes advanced threat detection technologies, such as VoIP traffic analysis, vulnerability signature matching, protocol analysis, and network behavioral analysis with total packet capture and complete session reconstruction. With this release, Enterasys IPS Host Sensors support an even wider range of platforms including VMware ESX server, Windows, AIX, HP-UX, Solaris and many others. Enterprises gain the ability to secure their mission critical servers and meet compliance requirements with one solution.

"Deploying a security solution requires extensive integration of various technologies in order to ensure the highest degree of protection," said Chris Crowell, president and CEO at Enterasys. "Enterasys security solutions provide a suite of standards-based products that can secure any network from any vendor. With the latest version of Enterasys IPS, we are extending the Enterasys Distributed Intrusion Prevention solution to IPv6 networks, while continuing to provide the automation, visibility and control required to meet today's security and compliance challenges."

The latest update to Enterasys IPS provides protection from both internal and external threats with several unique capabilities:

-- Rather than simply alerting customers to a threat, Enterasys makes it easy to immediately remove the threat from any multi-vendor network without impacting performance. -- Enterasys is the only IPS supplier to protect networks to the highest standard of best practices including automatically removing an attacker's access to the network and reconfiguring the network to prevent the attacker's penetration technique. -- Enterasys' patented(1) Distributed IPS is unique in its ability to identify a threat or security event, locate the exact physical source of the event and mitigate the threat through the use of enforceable bandwidth rate limiting policies, quarantine policies or other port level controls.

"Like many educational institutions, Bentley University faces ever-growing demands on the network as students, faculty and guests use all the latest mobile devices," said Todd Marsh, principal network engineer at Bentley University. "Our reputation as one of the leading business schools in the U.S. requires that we meet these demands while maintaining the highest levels of security and regulatory compliance. Enterasys IPS provides the automation, visibility and control to address these requirements."

The latest release of Enterasys IPS builds on Enterasys' complete suite of standards-based products that can secure any network from any vendor. Unlike vendors that supply only a single element of a solution, the Enterasys solution provides a complete suite of products designed to work together. The suite includes:

-- Network-Based Intrusion Prevention Systems (IPS/IDS) -- Host-Based Intrusion Detection (HIDS) -- Network Access Control (NAC) -- Security Information and Event Manager (SIEM) with Network Based Anomaly Detection (NBAD) -- Security-enabled switching infrastructure

(1)US Patent 7581249

About Enterasys Networks and Siemens Enterprise Communications

Siemens Enterprise Communications is a premier provider of end-to-end enterprise communications, including voice, network infrastructure and security solutions that use open, standards-based unified communications and business applications for a seamless collaboration experience. This award-winning "Open Communications" approach enables organizations to improve productivity and reduce costs through easy-to-deploy solutions that work within existing IT environments, delivering operational efficiencies. It is the foundation for the company's OpenPath commitment that enables customers to mitigate risk and cost-effectively adopt unified communications. Jointly owned by The Gores Group and Siemens AG, Siemens Enterprise Communications includes Cycos and Enterasys Networks. For more information about Siemens Enterprise Communications or Enterasys please visit www.siemens-enterprise.com or www.enterasys.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4682
PUBLISHED: 2021-01-28
IBM MQ 7.5, 8.0, 9.0, 9.1, 9.2 LTS, and 9.2 CD could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization of trusted data. An attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 186509.
CVE-2020-4888
PUBLISHED: 2021-01-28
IBM QRadar SIEM 7.4.0 to 7.4.2 Patch 1 and 7.3.0 to 7.3.3 Patch 7 could allow a remote attacker to execute arbitrary commands on the system, caused by insecure deserialization of user-supplied content by the Java deserialization function. By sending a malicious serialized Java object, an attacker co...
CVE-2020-13569
PUBLISHED: 2021-01-28
A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can...
CVE-2021-20620
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2021-20621
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.