Attack repeller

January 2004
Management Services;Jan2004, Vol. 48 Issue 1, p29
Academic Journal
The article presents information on the Proventia G Series of intrusion prevention appliances for computer networks from ISS. Offering inline protection, rather than waiting for an online attack to occur, the system immediately intervenes and stops attacks before damage is done without blocking legitimate traffic, providing an automated emergency response capability that requires minimal human intervention. It proactively blocks known and unknown attacks including denial-of-service, Trojans and worms like the recent MS Blast. It uses several blocking techniques to address each individual threat appropriately, rather than a blanket approach to blocking that could hinder legitimate traffic. While other products detect and block only known attacks, the Proventia G Series also protects customers from future attacks before they occur because the appliances have the intelligence to block attempts targeting critical vulnerabilities. The system is simple to deploy with three flexible modes of operation allowing customers to switch easily from detection to prevention without disrupting network traffic. A built-in bypass feature also offers reliability by allowing traffic to pass in the event of a power loss. The Proventia G200 is available at prices starting from £8,610. Maintenance is additional but it includes the SiteProtector centralized management system.


Related Articles

  • At-your-service academy.  // Buildings;Jun94, Vol. 88 Issue 6, p1 

    Reports on the opening of the ISS International Service System, Inc.'s ISS Service Academy on April 5, 1994.

  • Ambitious cleaner can't sweep up city. Breznick, Alan // Crain's New York Business;9/20/93, Vol. 9 Issue 38, p17 

    Reports on ISS International Service System Inc. head Henrik Slipsager's plans for his cleaning business. Purchase of ISS rival National Cleaning Group Inc.; Financial incentive due to New York city and state's application of sales tax to cleaning services; ISS's promotion as greenest Mr. Clean...

  • Firewalls and security. Gilmer, Brad // Broadcast Engineering;Jul2001, Vol. 43 Issue 8, p36 

    Focuses on firewalls and security tools used in computers and networks. Things to consider in protecting a computer or network from a security problem; Pieces of advice about preventing computer viruses; Information on how a firewall can conceal the address of an internal computer.

  • Adaptive Cyberdefense for Survival and Intrusion Tolerance. Atighetchi, Michael; Pal, Partha; Webber, Franklin; Schantz, Richard; Jones, Christopher; Loyall, Joseph // IEEE Internet Computing;Nov/Dec2004, Vol. 8 Issue 6, p25 

    While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and tend to provide brittle, all-or-nothing...

  • Technology advances may lead to laws on minimum security levels. Goodwin, Bill // Computer Weekly;4/15/2003, p8 

    This article reports that the government needs to start planning now for developments in computer technology that will pose new threats to the Great Britain's critical national infrastructure and render existing security systems obsolete. The government may need to introduce new laws to protect...

  • It's time to redefine identity. Schwartau, Winn // Network World;3/28/2005, Vol. 22 Issue 12, p43 

    A U.S. survey data shows that a considerable portion of identification (ID) theft cases occur online. Yet, people still rely no static data as ID proof positive. This article asserts the need to legally redefine what is meant by proof of identity to deal with the problem of ID theft cases. It...

  • TOWARDS STRUCTURED IMPLEMENTATION OF NETWORK SECURITY POLICIES. Shropshire, Jordan; Gowan, Art // Journal of Information System Security;2015, Vol. 11 Issue 1, p3 

    Modern enterprises are organic, changing structures with dynamic computing needs. In order to keep up with these changes, information resources are under constant revision. Besides changing functional aspects of computer systems, information security features must also be updated on a regular...

  • APSR.  // Network Dictionary;2007, p41 

    A definition of the term "APSR" is presented. It refers to a network testing tool that can send and receive arbitrary packets. APSR is divided into two main programs, the apsend for creating packets and the aprecv for sniffing packets. Based on the entry, the main objective of the APSR project...

  • Business Impact Analysis.  // Network Dictionary;2007, p79 

    A definition of the term "business impact analysis," is presented. In the context of computer security, this method determines the levels of impact that business operations can tolerate resulting from information security disaster. It is required that the impact of network and information...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics