Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

2/24/2010
09:26 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

3Com Delivers On Secure Network Fabric Strategy With New Solutions For Next-Generation Data Centers

Four new solutions for large enterprises broadens the Secure Network Fabric in the virtualized data center

February 23, 2010 " 3Com Corporation (NASDAQ: COMS) today announced four new products and solutions from its H3C and TippingPoint portfolios to extend the Secure Network Fabric to next-generation data centers and virtual networks. The Secure Network Fabric integrates 3Com's industry-leading H3C' enterprise network and security solutions and TippingPoint' intrusion prevention system (IPS) technology to reduce network security risks, management complexity and infrastructure costs in modern data centers. With centralized policy management across security and networking operations, 3Com's Secure Network Fabric now reaches into virtualized data centers to ensure comprehensive security and help drive down the cost of application deployment for both physical and virtual environments while delivering a low total cost of ownership.

Virtual environments must meet the same stringent network and security requirements as their physical counterparts, and 3Com's range of networking and security solutions support and secure the migration to a virtualized data center. As key components of the 3Com Secure Network Fabric, the H3C and TippingPoint solutions help organizations mitigate risks to business continuity by protecting network-connected devices and by defending critical points against ever-evolving global security threats.

To support and broaden the Secure Network Fabric in the virtualized data center, 3Com introduces four new solutions for large enterprises, including:

  • H3C S9500E " A new data center and enterprise core switching platform, the H3C S9500E rounds out the industry's broadest and most scalable network infrastructure portfolio. The S9500E has the high performance, flexibility and capacity to meet the most rigorous core and data center applications in an energy-efficient platform, and enables virtualized services on the network while helping to reduce operational expense. [H3C S9500E Product Announcement]

  • TippingPoint Secure Virtualization Framework Solution " This new virtualization solution will enable organizations to pass virtual machine (VM) traffic " including host-to-host traffic " through a TippingPoint Intrusion Prevention System Platform. The TippingPoint Secure Virtualization Framework extends TippingPoint's industry-leading threat research capabilities, breadth of protection, ease-of-use and security automation capabilities into the virtual infrastructure. [TippingPoint Virtualization Product Announcement]

  • TippingPoint 1500S " A new purpose-built Secure Sockets Layer (SSL) appliance, the TippingPoint' 1500S effectively and safely decrypts and inspects secure Web traffic without impacting network or application performance. It prevents encrypted attacks from compromising virtual and physical Web servers and Web applications. [TippingPoint 1500S Product Announcement]

  • TippingPoint ThreatLinQ 2.0 " Enhancements to the ThreatLinQ global security intelligence portal deliver new functionality to enable customers to create filter profiles customized for their network environment, correlate emerging threats with the latest Digital Vaccine' filters, and implement policy changes based on real-time threat information quickly to their TippingPoint IPS Platforms. [ThreatLinQ 2.0 Announcement]

    "Although the deployment of virtual networks provides organizations with the ability to design an efficient data center that is easier to manage and more cost effective, the business benefits could be negated by increased security exposure and the new complexities of today's evolving threat landscape," said Ron Sege, president and COO of 3Com. "Our new virtual networking and security solutions address this exposure and help customers drive towards uncompromised security, operational efficiency and regulatory compliance."

    About 3Com Corporation

    3Com Corporation (3Com) is a global enterprise networking solutions provider. 3Com has three global product and solutions brands: H3C, 3Com, and TippingPoint that offer networking and security solutions to enterprises large and small. The H3C enterprise networking portfolio includes products that span from the data center to the edge of the network and is targeted at large enterprises. TippingPoint features network-based intrusion prevention systems (IPS) that deliver application, infrastructure and performance protection. Its portfolio of products and solutions enable customers to manage business-critical voice, data, video and other networking technologies in a secure network environment. 3Com's portfolio of products and services enable customers to deploy and manage data, voice, video and other advanced networking technologies in a secure network environment.

    Copyright 2010 3Com Corporation. 3Com, 3Com logo, H3C, H3C logo, Digital Vaccine and TippingPoint are registered trademarks of 3Com Corporation or its wholly owned subsidiaries in various countries throughout the world. All other company and product names may be trademarks of their respective holders.

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    News
    Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
    Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
    Edge-DRsplash-10-edge-articles
    Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
    Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
    News
    Cybercrime Groups More Prolific, Focus on Healthcare in 2020
    Robert Lemos, Contributing Writer,  2/22/2021
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win an Amazon Gift Card! Click Here
    Latest Comment: This comment is waiting for review by our moderators.
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    Building the SOC of the Future
    Building the SOC of the Future
    Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2021-25284
    PUBLISHED: 2021-02-27
    An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
    CVE-2021-3144
    PUBLISHED: 2021-02-27
    In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
    CVE-2021-3148
    PUBLISHED: 2021-02-27
    An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
    CVE-2021-3151
    PUBLISHED: 2021-02-27
    i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...
    CVE-2021-3197
    PUBLISHED: 2021-02-27
    An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.