OTTAWA and RESTON, Va. -- Third Brigade (www.thirdbrigade.com
"With attackers now exploiting newly discovered software vulnerabilities long before patches are made available or deployed, time-to-protection is a primary concern for organizations," said Brian O'Higgins, CTO of Third Brigade. "But with first generation, behavior-based IPS, time-to-protection is simply too long. The costs and administrative overhead required to move these systems into production are significant. As a result, host-based IPS has too-often been stuck in a test environment, leaving critical systems unnecessarily exposed and vulnerable."
Third Brigade dramatically shortens the time-to-protection for host-based IPS in three important ways:
1. Faster deployment: Third Brigade Deep Security can be deployed to all hosts quickly and inexpensively. Organizations that purchase Third Brigade Deep Security Manager can deploy Deep Security Agent software in IPS-ready mode, on as many hosts as they choose, at no extra cost. Then with one-click, the Agent can be switched from detection to prevention mode, to provide proactive protection of the hosts. IPS-ready mode helps ensure enterprises can more rapidly respond to the risks posed by a new critical vulnerability, and allows a more efficient, effective and intelligent roll-out of host-based IPS.
2. Broader protection: Third Brigade Deep Security protects the platforms and applications upon which businesses rely. It includes powerful, preconfigured security profiles for over 80 different critical software applications, on three different platforms (Windows, Linux and Solaris), from dozens of vendors. The applications protected include databases, email servers, and web server infrastructure from vendors such as Microsoft, Oracle, IBM, Novell, HP, Apache and SendMail. Additional out-of-the-box rules provide immediate protection for custom-built software applications.
3. Faster updates: Third Brigade's rapid response team of security experts monitor the latest threats, and develop new filters that protect against these critical vulnerabilities. Updates are delivered to customers within hours of the announcement of new software vulnerabilities. These updates can then be applied to thousands of hosts in minutes.