Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

1/18/2011
04:27 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Fidelis Releases IP-To-ID Network Security Mapping

Latest version of Fidelis XPS integrated with A10 Networks ID Series network identity management appliances

WALTHAM, MA & SAN JOSE, CA– January 11, 2011 – Fidelis Security Systems, the market leader in network security solutions for the prevention of cyber attacks and data breaches, today announced that the latest version of the award-winning network security solution, Fidelis XPS™, now has the ability to associate any network activity to a specific user identity in real-time using dynamic IP address to user identity (IP-to-ID) mapping technology.

Working with A10 Networks ID Series network identity management appliances, Fidelis XPS customers can now leverage IP-to-ID technology to automatically identify the activities of individual users or directory-based groups, enabling an organization to visualize a user’s network activities, implement user or group-based security policies, and link network security events with particular users for user-aware forensic analysis.

"Knowledge of user identity enables more intelligent security decisions within the network infrastructure, especially in restricting access to services and applying content filtering," said Phil Schacter, managing vice president at Gartner, Inc. "Historically, identity awareness occurred in networks only on the remote edges of the WAN but we expect that over time, awareness of user information will be ubiquitous throughout the network."

With Fidelis XPS’s integration with A10 Networks’ ID Series appliances, customers can now extend the unparalleled visibility they already have into protocols, applications, content, and threats to the identity of the user on the network, with the ability to tie specific network events with actual user identities. Working in conjunction with A10 Networks’ ID Series products, Fidelis XPS can consume dynamic IP-to-ID information from multiple user directories, operating systems, and networking devices using a modular, agent-less approach, and apply that information to all network traffic in real-time.

Fidelis XPS user awareness allows an organization to:

Implement user and group-based monitoring policies; Gain user-level visibility over previously “anonymous” network activities, such as the use of business and consumer “cloud” applications, thereby eliminating a blind spot that is growing larger and more important every day;

* Track the activities of an advanced persistent threat, producing lists of specific users affected by an attack; * Aid in incident response and investigations with alerts mapped to users.

“The Fidelis XPS core architecture, Deep Session Inspection, has always allowed our customers the real-time network visibility to determine the ‘what’ and ‘where’ by being able to see deep into content and applications, over any port and protocol,” said Peter George, CEO of Fidelis Security System. “With our integration with the A10 Networks ID Series products, we can now offer our customers the answer to ‘who’. Providing the user identity brings an entirely new level of context to the forefront to enable more efficient and timely policy enforcement and remediation actions.”

Through the integration of the Fidelis XPS and A10 Networks ID Series IP-to-ID solution, Fidelis Security Systems is certified as a partner for A10’s IP-to-ID Enabled Program. The Fidelis XPS/A10 Networks ID solution has been tested and certified by both companies and is available to customers immediately.

Upcoming Webinar

Learn more about how the combination of content and user-awareness can give you comprehensive visibility and control by attending the upcoming webinar, “Get the Full Picture: Bring Real-time User Identity Into View” Webinar at 1:00 p.m. EST on February 10, 2011. Please visit www.fidelissecurity.com/webinars to register.

###

About Fidelis Security Systems Since 2002, Fidelis Security Systems has been providing organizations with the power to protect their sensitive information from data breaches and cyber attacks. Built on a patented Deep Session Inspection™, platform, the Fidelis Extrusion Prevention System' is the industry's only next-generation network security solution with the visibility and control necessary to stop data breaches by uniquely working at the session-level where today’s threats occur. Fidelis enables their government, military, and commercial enterprise customers around the globe to see, study, and stop advanced threats with a single engine for real-time proactive situational awareness.

About A10 Networks A10 Networks was founded in Q4 2004 with a mission to provide innovative networking and security solutions. A10 Networks makes high-performance products that help organizations accelerate, optimize and secure their applications. A10 Networks is headquartered in Silicon Valley with offices in the United States, United Kingdom,

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5230
PUBLISHED: 2019-11-13
P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform...
CVE-2019-5231
PUBLISHED: 2019-11-13
P30 smartphones with versions earlier than ELLE-AL00B 9.1.0.186(C00E180R2P1) have an improper authorization vulnerability. The software incorrectly performs an authorization check when a user attempts to perform certain action. Successful exploit could allow the attacker to update a crafted package.
CVE-2019-5233
PUBLISHED: 2019-11-13
Huawei smartphones with versions earlier than Taurus-AL00B 10.0.0.41(SP2C00E41R3P2) have an improper authentication vulnerability. Successful exploitation may cause the attacker to access specific components.
CVE-2019-5246
PUBLISHED: 2019-11-13
Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain par...
CVE-2010-4177
PUBLISHED: 2019-11-12
mysql-gui-tools (mysql-query-browser and mysql-admin) before 5.0r14+openSUSE-2.3 exposes the password of a user connected to the MySQL server in clear text form via the list of running processes.