Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:23 PM
Dark Reading
Dark Reading
Products and Releases

Barrier1 Introduces Barrier1 2.0 Virtualized Network Security Solution

Barrier1 2.0 draws information from 723 different device types from more than 400 different manufacturers

MINNEAPOLIS, June 16, 2011 /PRNewswire/ -- Barrier1 announces a virtualized security solution. Virtualization continues it growth in data centers for a variety of reasons. However, the next generation of network IT Security has to provide the same level of protection in the virtualized world as well. A revolutionary new product category has been created, Virtualized Intelligent Threat Management.

The breakthrough is the company's patent pending software version 2.0 which gathers information from all existing components of the network infrastructure using them as security sensors. Barrier1 2.0 then logs critical information gathered from the network, analyzes, makes decisions and acts upon those decisions virtually instantaneously. By utilizing existing info structure devices as sensors and information points, Barrier1 blocks and reports on anomalous traffic regardless of entrance point. The end result is that Barrier1 2.0 is able to turn an existing network into a virtualized security solution addressing all external and internal security threats. The product is currently protecting city and county governments, school systems, banks, businesses and hospitals.

Barrier1 2.0 draws information from 723 different device types from over 400 different manufacturers so the customer doesn't have to purchase special network products to insert the Barrier1 appliance. It takes minutes to install the Barrier1 2.0 appliance at the customer site and the company monitors and updates the software 24 x 7.

Barrier1 includes extensive easy to use on board reporting capabilities. Compliancy is an important issue in IT Security. Barrier1 has the extensive reporting tools that deliver the capability to drill down and address all compliancy regulations found in HIPPA, Sarbanes Oxley, and GLB.

"In addition to unmatched levels of network security and reporting, our price points allow comprehensive security for the price of most competitors basic anti virus products. Barrier1 2.0 is simply the first and only virtualized network security solution on the market today."

The Barrier1 security appliance is available directly through Barrier1. For more information, contact Barrier1 at 763.422.3776, or email [email protected]

About Barrier1:

Founded in 2004 The Barrier Group is the first company to provide a virtualized security appliance. The company's flagship product, Barrier1(TM) comes in hardware configurations to meet the needs of the smallest to the largest organization. Headquartered in Minneapolis, The Barrier Group is privately held. Visitwww.thebarriergroup.comfor more information.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.