Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

5/22/2007
03:00 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Big IPSes Hit Vegas

IBM-ISS, McAfee breathe new life into intrusion prevention

LAS VEGAS -- Interop -- Here come the hulking, mega-IPSes: IBM-ISS and McAfee today each rolled out high-end intrusion prevention systems at the Interop conference.

Despite frequent criticism about the limitations of IPS technology, big-name vendors continue pumping out new products. (See IPS: Still Playing Catch Up and IDS/IPS: Too Many Holes?) Both IBM-ISS and McAfee are pulling out all the stops for their new multi-gigabit IPS boxes, aimed at large enterprises, and in IBM-ISS's case, at carriers as well.

IPSes today are basically islands, but they will get more cooperative and "correlative in nature," says Gene Schultz, author of Intrusion Detection and Prevention and CISO and CTO of Hightower Software.

"IPS' promise has been plagued with some bad implementations [in the first generation] -- some that locked up entire IT infrastructures within seconds," says Schultz, who will give a presentation on the future of intrusion detection here today at Interop. "Some people got stung by the weaknesses in the first round of IPS products." (See IDS in Mid-Morph.)

IBM-ISS rolled out Proventia Network Intrusion Prevention System GX6116. It's geared for carrier and large enterprise networks, handling up to 15 Gbit/s with protection for up to 6 Gbit/s of network traffic. "That's about three times of what's been offered before today," says Greg Adams, business line executive for IBM-ISS's network IPS line.

Adams says the new GX6116 is a direct response to requests from IBM-ISS's carrier customers, who wanted an IPS platform they could use to deliver secure, value-added services to their customers. "Secured data transmission is in huge demand." IBM-ISS also has a managed security services offering that carriers can brand as their own, he says.

IBM-ISS prides itself in de-emphasizing signatures in its IPS boxes, instead using a protocol analysis approach. "We don't use signatures as our main security mechanism," Adams says. The company plans to add a 10-Gbit/s Ethernet interface to its Proventia line as well, he says. "Our IPSes are already IPv6-aware."

The GX6116 is priced at $188,995 and will ship on June 8.

McAfee, meanwhile, rolled out one of the first network IPSes for 10-Gigabit Ethernet networks. "10-Gigabit Ethernet is exploding," says John Vecchi, director of product marketing for network security solutions at McAfee. The IntruShield M-Series is aimed at both the network core and data centers for high speed as well as IPv6 networks.

Among other risk management and integration announcements here, McAfee also announced IntruShield 4.1, new software for the IPS family that integrates network and systems security collaboration and risk management functions, including its Foundstone line of products.

"This is going to provide the network teams with the same visibility that systems teams get on all that happens. This will integrate with our EPO platform" as well, Vecchi says. "They can ask to see in real-time all the host details... what's the MAC address, the user name, what the last version update was."

IntruShield 10-Gigabit Ethernet IPS will ship in the second half of the year, and IntruShield 4.1 will be available this month.

In related IPS news here, Reflex Security unveiled a Gigabit IPS here today that uses Intel Multi-Core chips for multi-Gigabit throughput. The Interceptor 1000 is available now and priced at $35,000 list, with an average street price of $28,000.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • IBM Corp. (NYSE: IBM)
  • McAfee Inc. (NYSE: MFE)
  • Reflex Security Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
     

    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 7/6/2020
    Ripple20 Threatens Increasingly Connected Medical Devices
    Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
    DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
    Dark Reading Staff 6/30/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    How Cybersecurity Incident Response Programs Work (and Why Some Don't)
    This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
    Flash Poll
    The Threat from the Internetand What Your Organization Can Do About It
    The Threat from the Internetand What Your Organization Can Do About It
    This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-15505
    PUBLISHED: 2020-07-07
    MobileIron Core and Connector before 10.3.0.4, 10.4.x before 10.4.0.4, 10.5.x before 10.5.1.1, 10.5.2.x before 10.5.2.1, and 10.6.x before 10.6.0.1, and Sentry before 9.7.3 and 9.8.x before 9.8.1, allow remote attackers to execute arbitrary code via unspecified vectors.
    CVE-2020-15506
    PUBLISHED: 2020-07-07
    MobileIron Core and Connector before 10.3.0.4, 10.4.x before 10.4.0.4, 10.5.x before 10.5.1.1, 10.5.2.x before 10.5.2.1, and 10.6.x before 10.6.0.1 allow remote attackers to bypass authentication mechanisms via unspecified vectors.
    CVE-2020-15507
    PUBLISHED: 2020-07-07
    MobileIron Core and Connector before 10.3.0.4, 10.4.x before 10.4.0.4, 10.5.x before 10.5.1.1, 10.5.2.x before 10.5.2.1, and 10.6.x before 10.6.0.1 allow remote attackers to read files on the system via unspecified vectors.
    CVE-2020-15096
    PUBLISHED: 2020-07-07
    In Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using "contextIsolation" are affecte...
    CVE-2020-4075
    PUBLISHED: 2020-07-07
    In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, arbitrary local file read is possible by defining unsafe window options on a child window opened via window.open. As a workaround, ensure you are calling `event.preventDefault()` on all new-window events where the `url` or `options` is not ...