Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Third Brigade Enhances IPS

Third Brigade unveiled Deep Security 4.5, the newest release of its advanced intrusion prevention system (IPS)

OTTAWA and RESTON, Va. -- Third Brigade (www.thirdbrigade.com ) today unveiled Deep Security 4.5, the newest release of its advanced intrusion prevention system (IPS) that protects mission-critical hosts, applications and data from malicious attacks. Product enhancements have been driven by key customers that use Third Brigade Deep Security to protect critical web applications, internet-facing servers, high-availability systems such as VoIP (Voice over Internet Protocol) servers, as well as enterprise desktops and laptops.

"With attackers now exploiting newly discovered software vulnerabilities long before patches are made available or deployed, time-to-protection is a primary concern for organizations," said Brian O'Higgins, CTO of Third Brigade. "But with first generation, behavior-based IPS, time-to-protection is simply too long. The costs and administrative overhead required to move these systems into production are significant. As a result, host-based IPS has too-often been stuck in a test environment, leaving critical systems unnecessarily exposed and vulnerable."

Shorter time-to-protection

Third Brigade dramatically shortens the time-to-protection for host-based IPS in three important ways:

1. Faster deployment: Third Brigade Deep Security can be deployed to all hosts quickly and inexpensively. Organizations that purchase Third Brigade Deep Security Manager can deploy Deep Security Agent software in IPS-ready mode, on as many hosts as they choose, at no extra cost. Then with one-click, the Agent can be switched from detection to prevention mode, to provide proactive protection of the hosts. IPS-ready mode helps ensure enterprises can more rapidly respond to the risks posed by a new critical vulnerability, and allows a more efficient, effective and intelligent roll-out of host-based IPS.

2. Broader protection: Third Brigade Deep Security protects the platforms and applications upon which businesses rely. It includes powerful, preconfigured security profiles for over 80 different critical software applications, on three different platforms (Windows, Linux and Solaris), from dozens of vendors. The applications protected include databases, email servers, and web server infrastructure from vendors such as Microsoft, Oracle, IBM, Novell, HP, Apache and SendMail. Additional out-of-the-box rules provide immediate protection for custom-built software applications.

3. Faster updates: Third Brigade's rapid response team of security experts monitor the latest threats, and develop new filters that protect against these critical vulnerabilities. Updates are delivered to customers within hours of the announcement of new software vulnerabilities. These updates can then be applied to thousands of hosts in minutes.

Third Brigade Inc.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
TPM-Fail: What It Means & What to Do About It
Ari Singer, CTO at TrustPhi,  11/19/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: -when I told you that our cyber-defense was from another age
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-20
VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain an out-of-bounds write vulnerability in the e1000e virtual network adapter. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-service...
PUBLISHED: 2019-11-20
VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain a denial-of-service vulnerability in the RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to create a denial-of-service condition on their own VM.
PUBLISHED: 2019-11-20
Unspecified vulnerability in statusnet through 2010 due to the way addslashes are used in SQL string escapes..
PUBLISHED: 2019-11-20
Weborf before 0.12.5 is affected by a Denial of Service (DOS) due to malformed fields in HTTP.
PUBLISHED: 2019-11-20
iobroker.admin before 3.6.12 allows attacker to include file contents from outside the `/log/file1/` directory.