Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Mi5's Not-So-Secret Weapon

New Web gateway promises to control botnet infections as well as Web-borne malware

First, there were email gateways, those multifunction devices that help screen out messaging-borne malware. Then there were unified threat management (UTM) tools, designed to bring multiple security capabilities to small offices in a single piece of hardware. Now, according to Mi5 Networks, there's Webgate.

"You could call us a hybrid between an [intrusion prevention system] and a proxy," says Doug Camplejohn, founder and CEO of Mi5, a new company that introduced its first products last year. "Our goal is to provide deep inspection of traffic, protecting the enterprise from multiple threats via a single platform."

Although it offers antivirus and anti-spyware capabilities, Webgate is not a UTM device, Camplejohn says: "UTMs tend to focus on small offices and small businesses, but we're going after medium and large businesses. We're building a gateway that can really make a difference in how secure your organization is from Web-based threats."

One of the things that makes Webgate different is its ability to spot botnet threats, Camplejohn explains. Using a combination of signatures and heuristics, the hardware can identify likely botnet activity in the network, even if the involved devices are not interacting with a known botnet "command and control" device, he claims.

Webgate can do a type of "confidence scoring" on the traffic it sees, giving administrators a warning when botnet activity is suspected. It can also identify the source of the activity -- such as spyware or a keylogger -- and it can block malicious traffic or URLs.

Camplejohn recognizes that the new product's capabilities overlap with those offered by many currently available appliances, including popular products offered by Websense and Blue Coat. "Larger enterprises are probably going to make a gradual transition to the type of multifunction product that we offer, but we think there are some customers who will say, 'Let's do it all at once,' " he says.

Webgate is available now in a broad range of models, starting at $3,495. The hardware carries a one-time price; software updates are available on an annual subscription basis.

— Tim Wilson, Site Editor, Dark Reading

  • Blue Coat Systems Inc. (Nasdaq: BCSI)
  • Mi5 Networks Inc.
  • Websense Inc. (Nasdaq: WBSN)

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Oldest First  |  Newest First  |  Threaded View
    7 Tips for Choosing Security Metrics That Matter
    Ericka Chickowski, Contributing Writer,  10/19/2020
    IoT Vulnerability Disclosure Platform Launched
    Dark Reading Staff 10/19/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    Special Report: Computing's New Normal
    This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
    Flash Poll
    How IT Security Organizations are Attacking the Cybersecurity Problem
    How IT Security Organizations are Attacking the Cybersecurity Problem
    The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-27673
    PUBLISHED: 2020-10-22
    An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.
    CVE-2020-27674
    PUBLISHED: 2020-10-22
    An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.
    CVE-2020-27675
    PUBLISHED: 2020-10-22
    An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference, as demonstrated by a dom0 crash vi...
    CVE-2020-3996
    PUBLISHED: 2020-10-22
    Velero (prior to 1.4.3 and 1.5.2) in some instances doesn’t properly manage volume identifiers which may result in information leakage to unauthorized users.
    CVE-2020-15680
    PUBLISHED: 2020-10-22
    If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size of a non-existent protocol handler. This allowed an attacker to successfully probe whether an external protocol handler was registered. This vulnerabil...