Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?
iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.
Astaro's Security Linux 5.1 takes the open source Linux software and hardens it, but also adds commercial software for a complete security package. It comes with six components: firewall, VPN, anti-virus (provided by Kaspersky), content filtering, anti-spam and intrusion prevention.
Symantec's Gateway Security 5460 is the largest, and one of the most powerful, appliances that we have had on test. It has eight Gigabit Ethernet ports, which can be configured to segregate a network or for high availability. The firewall can also be configured to load balance between a cluster, improving performance provided you have the correct license.
Red-M's Red-Alert Pro is a wireless intrusion detection probe that senses 802.11 a, b, g, and even Bluetooth activity simultaneously. It logs security threats and feeds the details to a Red Detect server if run in managed mode, or stores it if run standalone. Red-Alert Pro keeps track of connections between known and unknown devices, making an alert whenever a new unknown device is present and informing you of which device(s) the unknown entity is communicating with. If run in standalone mode, the security logs can be accessed via a convenient and intuitive web interface. If run in managed mode, the Red Detect server handles the logs.
This is a flexible, robust, very scalable and multi-purpose wireless security solution. It provides rogue detection, troubleshooting, vulnerability assessment, intrusion detection, performance management and usage accounting. It has a standard Windows GUI with an open source Firebird database that includes a secure, password-protected interface, and can be easily configured both for a small business or a large enterprise.
BlueSecure from Bluesocket is a leader in its field. Why? Because while most wireless security products are not able to detect anyone walking up with a wireless capable computer and connecting to their network, BlueSecure detects computers, access points, or any other type of wireless connection device.