Third Brigade Software Launches Deep Security Virtual ApplianceThird Brigade Software Launches Deep Security Virtual Appliance
VMsafe API-based security software coordinates security applied at the hypervisor with additional protection on virtual machines
April 21, 2009
SAN FRANCISCO, April 20 /PRNewswire/ -- RSA Conference, Booth #538 -- On the eve of the anticipated launch of VMware vSphere 4, Third Brigade (www.thirdbrigade.com), experts in server and application protection, today announced the newest component of the Third Brigade Deep Security software solution. Showcased this week at RSA Conference 2009 in San Francisco, the Third Brigade Deep Security Virtual Appliance is the world's first VMsafe API-based security software that coordinates security applied at the hypervisor with additional protection on virtual machines to create the most comprehensive protection solution available for VMware environments.
Third Brigade's unique combination of network and host-based security techniques helps better ensure the protection of confidential data and assets held in virtualized and cloud computing environments, including electronic health records, payment cardholder data, and national security information.
Increasing security, improving performance and creating deployment convenience and choice for organizations and service providers, Deep Security is the first VMsafe and cloud computing security solution to enable comprehensive protection, including application control, firewall, integrity monitoring, intrusion detection and prevention (IDS/IPS), log inspection, and Web application protection, to be deployed in cloud computing environments and centrally managed alongside virtualized and physical server resources.
"Compliance and business continuity requirements demand server security," said Bill McGee, co-founder and vice president, products and technology at Third Brigade. "Next-generation datacenters are targeting 100 percent virtualization, and server protection strategies must keep pace. The new Deep Security Virtual Appliance leverages VMsafe APIs to ensure a baseline of security can be applied to all virtual machines and is coordinated with and enhanced by VM-centric security to deliver unprecedented protection to dynamic datacenters."
VMsafe is facilitating network security mechanisms, like firewall and intrusion detection and prevention systems (IDS/IPS), to be integrated to protect virtual environments. In addition to these capabilities, Deep Security Agent software delivers critical virtual machine guest-level protection including integrity monitoring and log inspection. Enabling an "inspect once, act immediately" approach to virtual machine protection, Third Brigade Deep Security Manager coordinates security processing between the Deep Security Virtual Appliance and Deep Security Agents to enable the most efficient and effective adherence to security policy. For example, the Deep Security Virtual Appliance is aware of Deep Security Agents and when present, creates a faster path of access for authorized traffic to protected systems. When Agents are not present, the Virtual Appliance will enable a baseline of security for all virtual machines. This coordination, centrally managed by the Deep Security Manager software, ensures the highest levels of security using multiple enhanced protection mechanisms for more critical assets.
"The steady transition to a dynamic, service-oriented data center is causing IT architects to re-evaluate traditional operations and management methods. Server virtualization technologies are increasingly leveraged to cut IT capital and operational expenses while improving service delivery," said Burton Group senior analyst and virtualization expert Chris Wolf. "Security is a top concern in many virtualization projects because resources that once ran on dedicated physical hardware will use shared physical resources once virtualized."
Ideal for next-generation enterprise datacenter projects which are spanning virtualization and cloud computing, and equally well suited for cloud computing service providers hosting multi-tenant virtual environments, Deep Security software enables virtual machines of different sensitivities to be hosted together, with the appropriate mechanisms to ensure protection and meet compliance requirements. This results in higher consolidation rates and allows organizations to more fully leverage virtualization investments to further reduce operating costs.
From Fortune 100 organizations to governments, universities and HMOs, Third Brigade customers require comprehensive protection that simplifies and eases the burden of security configuration and management. Third Brigade Deep Security incorporates template-based security profiles, automated remediation and Web-services integration for the broadest selection of applications and server-types. The modular Deep Security solution integrates with existing IT infrastructure (VMware vCenter, Active Directory and SIEM) to allow customers to be quickly and continuously safeguarded with comprehensive protection that is centralized, intelligent, and manageable.
The Third Brigade Deep Security Virtual Appliance will be available later this year and is included in the cost of Third Brigade's unlimited virtual machine software license for VMware ESX servers of $3,000 for comprehensive protection capabilities (socket and core restrictions apply).
For more information visit: http://www.thirdbrigade.com.
About Third Brigade
Third Brigade (www.thirdbrigade.com) specializes in server and application protection for dynamic datacenters. Our advanced software and vulnerability response service allows virtual machines and physical servers to become self-defending; safe from the latest online threats. This comprehensive, proven protection helps customers prevent data breaches and business disruptions. It enables compliance, supports operational cost reductions and addresses the dynamic nature of datacenters, including virtualization and consolidation, new service delivery models, or cloud computing. Third Brigade also owns and maintains OSSEC, the Open Source Host Intrusion Detection Project actively used in 50 countries around the world. Third Brigade. That's control.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023