Features

Review: IPS 5500 Attack Mitigator

Review: IPS 5500 Attack Mitigator

This is a 2U chassis designed to block attacks before they cause damage. It sits between the WAN and firewall, rather than inside the firewall as with other products.

Christopher Moody Jun 30 2005 12:00AM Security
Review: Proventia G400

Review: Proventia G400

The Proventia G400 might look like a standard rack-mount Intel-based server, but it's a lot more than that. The hardware was specifically chosen, drivers written for it and a network agent pre-installed. As a result, it can cope with up to 400Mbps of throughput and monitor up to four network segments using its four copper and four fiber Gigabit Ethernet ports.

Christopher Moody Jun 30 2005 12:00AM Security
Review: Sentivist IPS Sensor 500

Review: Sentivist IPS Sensor 500

NFR's Sentivist IPS uses a combination of hardware sensors, and software for managing. It ships with a Java-based management console, which is good for monitoring and configuring individual sensors.

Christopher Moody Jun 30 2005 12:00AM Security
Review: SonicWall Pro 5060

Review: SonicWall Pro 5060

This is part of SonicWall's security platform appliance range. It's the top-of-the-line model, featuring six Gigabit Ethernet ports and an Intel Xeon processor. Technically, it's not actually an IPS appliance, but more of a firewall with IPS abilities. That said, you can turn the main firewall off and operate it in-line with another firewall.

Christopher Moody Jun 30 2005 12:00AM Security
Review: Sourcefire 3D System

Review: Sourcefire 3D System

Sourcefire's Intrusion Sensor 2000 (IS2000) is an Intel-based appliance that runs a hardened version of Linux and the intrusion detection software. It uses two Fast Ethernet interfaces and has a throughput of 100Mbps.

Christopher Moody Jun 30 2005 12:00AM Security
Review: TippingPoint 50

Review: TippingPoint 50

This IPS (the renamed UnityOne-50) is the baby of TippingPoint's range, able to support throughput of up to 50Mbps – but the firm has a full range of products, able to cope with throughput up to five gigabits. The TippingPoint 50 has dual Fast Ethernet ports, so it can work inline with a connection and a dedicated management port.

Christopher Moody Jun 30 2005 12:00AM Security
Review: V-Secure V-100

Review: V-Secure V-100

This might not be the most attractive appliance, with a bright green front, but its flexible architecture is likely to win it support. It is designed to sit internally or between the firewall and router and can support up to 100Mbps of network traffic. It comes with two Fast Ethernet ports and operates in-line with a network connection. There is also a dedicated management port.

Christopher Moody Jun 30 2005 12:00AM Security
Review: XSGuard C-Series

Review: XSGuard C-Series

XSGuard's C-Series is the easiest product to install. Just plug the internal side of your network into the marked Fast Ethernet port and the external side in the other marked port. Turn the box on and it connects to the XSGuard servers and starts filtering traffic at 100Mbps.

Christopher Moody Jun 30 2005 12:00AM Security
Review: The German Enigma Cipher Machine

Review: The German Enigma Cipher Machine

AuthorB. Winkel, C. Deavours, D. Kahn, D. Kruh

Jon Tullett Jun 30 2005 12:00AM Security
Review: The Art of Intrusion

Review: The Art of Intrusion

Author Kevin Mitnick & William Simon

Jon Tullett Jun 30 2005 12:00AM Security
Four steps to business continuity

Four steps to business continuity

Complex business continuity plans just don’t work, warns Jonathan Gossels. So keep it simple
Jonathan Gossels, Jun 29 2005 5:01PM Security
Big phish to fry

Big phish to fry

Phishing is as lucrative as it is prolific. According to the latest official figures from UK payments body, APACS, phishing scams and Trojan keystroke loggers were behind UK online bank fraud totalling £12m in 2004; while BlackSpider Technologies estimates that nearly seven million phishing emails have been sent across the UK in the last month alone.
John Cheney, Jun 29 2005 10:31AM Security
Review: The Black Book on Corporate Security

Review: The Black Book on Corporate Security

Publisher Larstan

Jon Tullett Jun 29 2005 12:00AM Security
Keeping a vigil on viruses

Keeping a vigil on viruses

Last year a flaw in the way Microsoft applications process JPEG image files caused widespread alarm. The exploits could create a jpeg file formatted to trigger an overflow in a common Windows component and open a command shell on a vulnerable Windows system.
Michael Foreman Jun 27 2005 10:11AM Security
Best practices for implementing data security

Best practices for implementing data security

In recent years, enterprise security spending has focused primarily on firewalls, intrusion prevention, spam filtering and antivirus products, all designed to protect organizations’ IT boundaries.
Steve Crawford Jun 22 2005 2:19PM Security
It’s not just home users who are to blame

It’s not just home users who are to blame

Illena Armstrong Jun 21 2005 12:49PM Security
Never forget – it’s a people business

Never forget – it’s a people business

Ron Condon Jun 21 2005 12:44PM Security
Debate» IPS promises much in terms of extra security for networks, but the promise is a false one

Debate» IPS promises much in terms of extra security for networks, but the promise is a false one

Ron Smith Jun 21 2005 12:39PM Security
Debate» For remote access, IPsec’s time is up. In fact, it’s end should have come some time ago

Debate» For remote access, IPsec’s time is up. In fact, it’s end should have come some time ago

Gary Tomlinson Jun 21 2005 12:30PM Security
Firefox, browser-in-waiting

Firefox, browser-in-waiting

The Mozilla Foundation worked quickly to fix recent vulnerabilities in Firefox, but will the latest flaws dampen enthusiasm for the open source browser?
Marcia Savage Jun 21 2005 12:22PM Security

Log In

  |  Forgot your password?