Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

1/18/2011
04:27 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Fidelis Releases IP-To-ID Network Security Mapping

Latest version of Fidelis XPS integrated with A10 Networks ID Series network identity management appliances

WALTHAM, MA & SAN JOSE, CA– January 11, 2011 – Fidelis Security Systems, the market leader in network security solutions for the prevention of cyber attacks and data breaches, today announced that the latest version of the award-winning network security solution, Fidelis XPS™, now has the ability to associate any network activity to a specific user identity in real-time using dynamic IP address to user identity (IP-to-ID) mapping technology.

Working with A10 Networks ID Series network identity management appliances, Fidelis XPS customers can now leverage IP-to-ID technology to automatically identify the activities of individual users or directory-based groups, enabling an organization to visualize a user’s network activities, implement user or group-based security policies, and link network security events with particular users for user-aware forensic analysis.

"Knowledge of user identity enables more intelligent security decisions within the network infrastructure, especially in restricting access to services and applying content filtering," said Phil Schacter, managing vice president at Gartner, Inc. "Historically, identity awareness occurred in networks only on the remote edges of the WAN but we expect that over time, awareness of user information will be ubiquitous throughout the network."

With Fidelis XPS’s integration with A10 Networks’ ID Series appliances, customers can now extend the unparalleled visibility they already have into protocols, applications, content, and threats to the identity of the user on the network, with the ability to tie specific network events with actual user identities. Working in conjunction with A10 Networks’ ID Series products, Fidelis XPS can consume dynamic IP-to-ID information from multiple user directories, operating systems, and networking devices using a modular, agent-less approach, and apply that information to all network traffic in real-time.

Fidelis XPS user awareness allows an organization to:

Implement user and group-based monitoring policies; Gain user-level visibility over previously “anonymous” network activities, such as the use of business and consumer “cloud” applications, thereby eliminating a blind spot that is growing larger and more important every day;

* Track the activities of an advanced persistent threat, producing lists of specific users affected by an attack; * Aid in incident response and investigations with alerts mapped to users.

“The Fidelis XPS core architecture, Deep Session Inspection, has always allowed our customers the real-time network visibility to determine the ‘what’ and ‘where’ by being able to see deep into content and applications, over any port and protocol,” said Peter George, CEO of Fidelis Security System. “With our integration with the A10 Networks ID Series products, we can now offer our customers the answer to ‘who’. Providing the user identity brings an entirely new level of context to the forefront to enable more efficient and timely policy enforcement and remediation actions.”

Through the integration of the Fidelis XPS and A10 Networks ID Series IP-to-ID solution, Fidelis Security Systems is certified as a partner for A10’s IP-to-ID Enabled Program. The Fidelis XPS/A10 Networks ID solution has been tested and certified by both companies and is available to customers immediately.

Upcoming Webinar

Learn more about how the combination of content and user-awareness can give you comprehensive visibility and control by attending the upcoming webinar, “Get the Full Picture: Bring Real-time User Identity Into View” Webinar at 1:00 p.m. EST on February 10, 2011. Please visit www.fidelissecurity.com/webinars to register.

###

About Fidelis Security Systems Since 2002, Fidelis Security Systems has been providing organizations with the power to protect their sensitive information from data breaches and cyber attacks. Built on a patented Deep Session Inspection™, platform, the Fidelis Extrusion Prevention System' is the industry's only next-generation network security solution with the visibility and control necessary to stop data breaches by uniquely working at the session-level where today’s threats occur. Fidelis enables their government, military, and commercial enterprise customers around the globe to see, study, and stop advanced threats with a single engine for real-time proactive situational awareness.

About A10 Networks A10 Networks was founded in Q4 2004 with a mission to provide innovative networking and security solutions. A10 Networks makes high-performance products that help organizations accelerate, optimize and secure their applications. A10 Networks is headquartered in Silicon Valley with offices in the United States, United Kingdom,

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13864
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
CVE-2020-13865
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
CVE-2020-11696
PUBLISHED: 2020-06-05
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
CVE-2020-11697
PUBLISHED: 2020-06-05
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
CVE-2020-13646
PUBLISHED: 2020-06-05
In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed to cause a denial of service (BSOD) or other unknown impact due to failure to verify the value of a specific IOCTL.