TITLE

Branch IT security

PUB. DATE
August 2004
SOURCE
Management Services;Aug2004, Vol. 48 Issue 8, p31
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
This article reports on the launch of Crossbeam Systems' C10, an information technology security switch designed for remote and branch offices. It delivers two gigabits of internal or external firewall performance plus up to 150 megabyte per second of Internal Data Store and 50 megabyte per second of anti-virus on wireless access network links, in effect T3-level wire speed content scanning for remote offices. It also has its own integrated security applications at a price that is, claim Unipalm, about half that of competitive single-application products. It forms part of a series of offerings from Crossbeam that form a network-wide security solution for the perimeter, interior and data centre of the corporate network out, now, to every branch office. The switch addresses two specific security issues, secure containment zones and multi-layer perimeter defence. Branch offices can use it as a perimeter security solution to consolidate several security functions, such as firewall and Internal Data Store, into a single high performance platform. And unlike many of its contemporaries, the C10 does not deliver only one ISV application nor does it use several proprietary ones; rather it delivers trusted security from independent software vendors and an option to keep the switches updated automatically with all software grades. Applications it supports include VPN-1 Pro NG, Internet Security Systems, RealSecure Network Sensor, Aladdin eSafe, Secure Computing, SmartFilter, Trend Micro InterScan, and Websense.
ACCESSION #
14147425

 

Related Articles

  • DISTRIBUTED FIREWALLS AND IDS INTEROPERABILITY CHECKING BASED ON A FORMAL APPROACH. Karoui, Kamel; Ben Ftima, Fakher; Ben Ghezala, Henda // International Journal of Computer Networks & Communications;Sep2013, Vol. 5 Issue 5, p95 

    To supervise and guarantee a network security, the administrator uses different security components, such as firewalls, IDS and IPS. For a perfect interoperability between these components, they must be configured properly to avoid misconfiguration between them. Nevertheless, the existence of a...

  • ActiveScout nips attacks in the bud. Chu, Francis // eWeek;4/1/2002, Vol. 19 Issue 13, p46 

    ForeScout Technologies Inc.'s ActiveScout 2.1 IDS provides an extra layer of protection from attackers and certain viruses that will be appreciated at security-conscious sites. ActiveScout can help stop distributed-denial-of-service attacks from propagating by returning spoofed data to prevent...

  • CROSSBEAM SYSTEMS HELPS BT STRENGTHEN VIRTUAL SECURITY.  // Computer Security Update;Jul2008, Vol. 9 Issue 7, p4 

    The article offers information on Crossbeam Systems Inc., a leading provider of security platforms for high performance networks located in Boxborough, Massachusetts. Crossbeam Systems Inc. has announced that BT has deployed Crossbeam's X-Series Next Generation Security Platform to protect its...

  • ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN. Muraleedharan, N.; Parmar, Arun // International Journal of Network Security & Its Applications;Oct2010, Vol. 2 Issue 4, p234 

    Attackers perform port scan to find reachability, liveness and running services in a system or network. Current day scanning tools provide different scanning options and capable of evading various security tools like firewall, IDS and IPS. So in order to detect and prevent attacks in the early...

  • Build a firewall to protect your network. Mie-Yun Lee // Business Journal (Central New York);3/1/2002, Vol. 19 Issue 9, p16 

    Provides information on the importance of building a firewall to protect computer networks from hackers. Function of a firewall; Tips on installing a firewall; Risk of having a firewall installed.

  • Brainstorm reverses the proxy solution.  // Communications News;Jul2001, Vol. 38 Issue 7, p30 

    Discusses how the proxy server works when all pertinent information about customers, distributors and partners are all inside the firewall. How the data flow takes place; Architecture of the proxy server that provides levels of security.

  • Reduce firewall complexity. Muller, Nathan // Communications News;Jan2003, Vol. 40 Issue 1, p6 

    Suggests firewall for network security for businesses. Complexity of firewall operation; Benefits of carrier-managed firewall solution; Details on how a managed service works.

  • Firewall `racks up' security. Surkan, Michael // PC Week;1/13/97, Vol. 14 Issue 2, p45 

    Evaluates the PIX Firewall 3.0 from Cisco Systems Inc. Usability; Capability; Performance; Interoperability; Manageability; Pros and cons; Price information; Contact point.

  • Intrusion Detection System Methodologies Based on Data Analysis.  // International Journal of Computer Applications;Aug2010, Vol. 5, p10 

    The article presents a study on the methodologies for intrusion detection system that is based on data analysis. It explores the different types of attacks utilized in KDD99CUP Data Set and evaluates the classification of integral data store (IDS). It also highlights Denial of Service (DOS)...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics