Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Third Brigade Enhances IPS

Third Brigade unveiled Deep Security 4.5, the newest release of its advanced intrusion prevention system (IPS)

OTTAWA and RESTON, Va. -- Third Brigade (www.thirdbrigade.com ) today unveiled Deep Security 4.5, the newest release of its advanced intrusion prevention system (IPS) that protects mission-critical hosts, applications and data from malicious attacks. Product enhancements have been driven by key customers that use Third Brigade Deep Security to protect critical web applications, internet-facing servers, high-availability systems such as VoIP (Voice over Internet Protocol) servers, as well as enterprise desktops and laptops.

"With attackers now exploiting newly discovered software vulnerabilities long before patches are made available or deployed, time-to-protection is a primary concern for organizations," said Brian O'Higgins, CTO of Third Brigade. "But with first generation, behavior-based IPS, time-to-protection is simply too long. The costs and administrative overhead required to move these systems into production are significant. As a result, host-based IPS has too-often been stuck in a test environment, leaving critical systems unnecessarily exposed and vulnerable."

Shorter time-to-protection

Third Brigade dramatically shortens the time-to-protection for host-based IPS in three important ways:

1. Faster deployment: Third Brigade Deep Security can be deployed to all hosts quickly and inexpensively. Organizations that purchase Third Brigade Deep Security Manager can deploy Deep Security Agent software in IPS-ready mode, on as many hosts as they choose, at no extra cost. Then with one-click, the Agent can be switched from detection to prevention mode, to provide proactive protection of the hosts. IPS-ready mode helps ensure enterprises can more rapidly respond to the risks posed by a new critical vulnerability, and allows a more efficient, effective and intelligent roll-out of host-based IPS.

2. Broader protection: Third Brigade Deep Security protects the platforms and applications upon which businesses rely. It includes powerful, preconfigured security profiles for over 80 different critical software applications, on three different platforms (Windows, Linux and Solaris), from dozens of vendors. The applications protected include databases, email servers, and web server infrastructure from vendors such as Microsoft, Oracle, IBM, Novell, HP, Apache and SendMail. Additional out-of-the-box rules provide immediate protection for custom-built software applications.

3. Faster updates: Third Brigade's rapid response team of security experts monitor the latest threats, and develop new filters that protect against these critical vulnerabilities. Updates are delivered to customers within hours of the announcement of new software vulnerabilities. These updates can then be applied to thousands of hosts in minutes.

Third Brigade Inc.

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-12-04
An Ubuntu-specific patch in PulseAudio created a race condition where the snap policy module would fail to identify a client connection from a snap as coming from a snap if SCM_CREDENTIALS were missing, allowing the snap to connect to PulseAudio without proper confinement. This could be exploited by...
PUBLISHED: 2020-12-03
Versions less than 0.0.6 of the Node.js stringstream module are vulnerable to an out-of-bounds read because of allocation of uninitialized buffers when a number is passed in the input stream (when using Node.js 4.x).
PUBLISHED: 2020-12-03
In the PrestaShop module "productcomments" before version 4.2.1, an attacker can use a Blind SQL injection to retrieve data or stop the MySQL service. The problem is fixed in 4.2.1 of the module.
PUBLISHED: 2020-12-03
HashiCorp go-slug before 0.5.0 does not address attempts at directory traversal involving ../ and symlinks.
PUBLISHED: 2020-12-03
An issue was discovered in the Linux kernel before 5.9.3. io_uring takes a non-refcounted reference to the files_struct of the process that submitted a request, causing execve() to incorrectly optimize unshare_fd(), aka CID-0f2122045b94.