Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

10/4/2012
02:05 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

NSS Labs Asks, Are Current IPS Products Worth The Money?

Almost 50 percent of products proved to be overpriced once security effectiveness and tested

AUSTIN, Texas – October 4, 2012 - NSS Labs today released the final results and analysis from its 2012 Group Test for IPS, which evaluated 10 leading IPS vendors and 15 products. While testing shows that IPS is a competitive market with several vendors obtaining high marks for security effectiveness, it is apparent from this latest report that enterprise customers could end up paying hundreds of thousands of dollars more than they need to in larger deployments.

View the NSS Labs 2012 Security Value Map, Comparative Analysis and Product Analysis Reports.

Once Security Effectiveness and Performance are Factored In, the Actual Value of an IPS Can Change Dramatically

In order to capture the relative value of devices and facilitate comparisons, NSS Labs has developed unique metrics that enable enterprises to perform value-based comparisons and negotiate more favorable pricing.

· Almost 50% of products proved to be overpriced once security effectiveness & tested (vs. vendor claimed) performance were factored into pricing.

· 33% of products tested proved to be better value for the money being asked by the vendor, with tested performance far exceeding the vendor-rated specifications.

· Vendor throughput claims are often exaggerated, with over 50% testing below their claimed performance (from -9% to as much as -71%)

Management Console Licensing & Architectural Structure Lead to Huge Cost Differences

Management considerations should not be overlooked when making an IPS purchase as architecture and licensing structures can vary greatly by vendor, creating significant cost differences even for the same size deployment.

· For a 10 sensor deployment, first-year management costs ranged from $7k to $40k

· For a 100 sensor deployment, the range was $26k to $110k

· For a 250 sensor deployment, the range was even wider, varying from $31k to $300k

Vendors also vary greatly in licensing structures and the number of devices managed per license package. Therefore, understanding the number of devices needed and how a vendor's management architecture works is critical for customers.

Commentary: NSS Labs Chief Research Officer Bob Walder

"While our 2012 Security Value Map shows that IPS is definitely a mature market, a deeper dive into the Comparative Analysis Reports&trade shows that the market is not as commoditized as it might seem," said Bob Walder, Chief Research Officer at NSS Labs. "There is still significant differentiation - no two products deliver the same security effectiveness or throughput, and with management consoles there are some real pitfalls and traps of which companies need to beware in order to create an effective management infrastructure. Understanding and navigating the hidden costs and trade-offs relative to each IPS has become far more important than comparing speed versus protection in years past and creates more homework for the customer."

The 2012 IPS Security Value Map&trade, Comparative Analysis Reports&trade, and Product Analysis Reports&trade for each vendor are currently available to NSS Labs' subscribers at www.nsslabs.com.

The products covered in the 2012 SVM for IPS are:

· CheckPoint 12600

· Fortinet Fortigate 3240C

· HP TippingPoint 6100N

· IBM GX7800

· Juniper IDP 8200

· Juniper SRX 3600

· McAfee M8000

· McAfee XC Cluster

· Palo Alto PA-5020

· SonicWALL SuperMassive

· Sourcefire 3D8120

· Sourcefire 3D8250

· Sourcefire 3D8260

· Sourcefire Virtual IPS

· Stonesoft 1302

NSS Labs did not receive any compensation in return for vendor participation; All testing and research was conducted free of charge.

About NSS Labs, Inc.

NSS Labs, Inc. is the only completely independent research and analyst organization with world-class in-house testing capabilities. Through our subscription-based security intelligence services, we provide the information enterprises need to be secure. Founded in 1991, the company is located in Austin, Texas. For more information, visit www.nsslabs.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31458
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...