Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

2/1/2007
06:40 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Microsoft Debuts VPN Appliance

SSL-based Intelligent Application Gateway is latest offering in its Forefront security product line

Microsoft rolled out today its long-awaited SSL VPN appliance, the Intelligent Application Gateway (IAG) 2007, a new endpoint product under its Forefront security umbrella. IAG is a combination SSL VPN/Web application firewall from its Whale Communications acquisition, plus Microsoft's Internet Security and Acceleration Server (ISA Server).

IAG simplified the original architecture of the Whale device, which was comprised of two servers. "It was two Intel servers glued together with a SCSI server -- one server pointed to the external network, and one server pointed to the internal network," Joel Sloss, senior product manager for Microsoft's edge security and access products said in an interview with Dark Reading. "As good as that was for network separation, it does drive up the complexity of the solution and fundamental cost of the hardware."

Microsoft's new SSL VPN appliance uses a single motherboard solution, he says.

In a separate announcement, Microsoft says over 100 partners plan to support and integrate with its Network Access Protection (NAP) platform, which is built into Vista and Longhorn, the upcoming version of Windows Server. Over 40 of these NAP implementations will be shown at the RSA Conference next week in San Francisco.

Meanwhile, the company has handed off distribution of its new IAG product to key OEM partners: Celestix Networks Inc. and Network Engines Inc. are offering the pre-configured appliances and selling them via reseller partners. The goal is to make the appliances more affordable for all sizes of organizations, according to Sloss.

Sloss says the new appliance fits Microsoft's strategy for providing a policy-defined network for network access. Whale was ahead of the curve with its SSL VPN/Web application firewall combo, he notes, as well as its out-of-the-box custom security policies. "Other vendors are just now realizing the link between access and security," he says.

Available now, the IAG is priced from $6,000 to $13,000 from Celestix, and for around $15,000 from Network Engines.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • Microsoft Corp. (Nasdaq: MSFT) Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
     

    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 6/5/2020
    How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
    Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
    Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
    Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win a Starbucks Card! Click Here
    Latest Comment: What? IT said I needed virus protection!
    Current Issue
    How Cybersecurity Incident Response Programs Work (and Why Some Don't)
    This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
    Flash Poll
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-13897
    PUBLISHED: 2020-06-07
    HESK before 3.1.10 allows reflected XSS.
    CVE-2020-13894
    PUBLISHED: 2020-06-07
    handler/upload_handler.jsp in DEXT5 Editor through 3.5.1402961 allows an attacker to download arbitrary files via the savefilepath field.
    CVE-2020-13895
    PUBLISHED: 2020-06-07
    Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module before 0.32 for Perl fails to verify correct ECDSA signatures when r and s are small and when s = 1. This happens when using the curve secp256r1 (prime256v1). This could conceivably have a security-relevant impact if an attacker wishes...
    CVE-2020-13890
    PUBLISHED: 2020-06-06
    The Neon theme 2.0 before 2020-06-03 for Bootstrap allows XSS via an Add Task Input operation in a dashboard.
    CVE-2020-13889
    PUBLISHED: 2020-06-06
    showAlert() in the administration panel in Bludit 3.12.0 allows XSS.