WESTBOROUGH, Mass. -- Top Layer Networks, a global leader for high performance intrusion prevention solutions, today announced immediate availability of the latest version of its flagship IPS 5500 intrusion prevention solution the E-Series. In addition, Top Layers new IPS Controller management software provides real-time Command and Control functionality to configure and manage multiple IPS 5500 units throughout the network.
The continued discovery of vulnerabilities in commercially-deployed software puts servers and client workstations at risk for becoming compromised by Spyware, viruses, botnet programs and other malicious code. In 2006 and 2007, the prevalence of vulnerabilities in file-handling software, such as various components of Microsoft operating platforms, is increasing. Top Layer has created and added TopInspect File Validation to its new E-Series IPS solution to address this important trend in the evolving threat landscape.
The IPS 5500 E-Series uses TopInspect Deep Packet Inspection to analyze network traffic as two distinct parts: Protocol Validation Modules (PVMs) inspect the network protocols that are used to initiate communication and carry payload data from one computer to another; Data Validation Modules (DVMs) inspect the actual files that are carried as payloads by the network protocols.
Unlike most IPS solutions that use regular expressions or compound signatures to inspect network traffic, the IPS 5500 E-Series uses file-format-awareness to identify the type of payload being carried, and then uses a Data Validation Module that was specifically created for that file format to complete the inspection. This leads to fewer signature updates, better coverage of multi-vector vulnerabilities, and fewer false positive indications.
Compromised computers are the vehicle by which a significant portion of 2007 cyber attacks are delivered, said Peter Rendall, president and CEO of Top Layer Networks. It is crucial that enterprise organizations protect their computing infrastructure from the threats which can lead to compromised systems, including remote exploits, Spyware, P2P applications and other malware.