Secure in cyber space

October 2004
Management Services;Oct2004, Vol. 48 Issue 10, p30
Academic Journal
This article presents information on Total Stream Protection (TSP) family of firewall and virtual product network appliances from CyberGuard. Built on a new Linux-based secure operating environment (OE), the TSP family consists of the 1000, 3000, and 5000 series. TSP appliances enable user and application-specific security policies so that organizations can customize their information security rules and practices to the level of an individual user as well as by the various applications used throughout an enterprise and the specific needs of an organization. The TSP models are invulnerable to attacks against the firewall OE. Mandatory access control and multi-level security technologies completely insulate the OE layers used to inspect and transport packets from those that allow the firewall to be configured and managed. TSP enhances CyberGuard's FS, KS, and SL appliances with broader application layer protection capabilities. Many of today's most damaging viruses, worms, and vulnerabilities are introduced at the application level. That is where user data resides and it is a favorite target of the black hat community because the complexity of the various protocols in use makes it very difficult to protect. TSP extends the application layer security protection with a new algorithm called contextual aggregation that is used to assemble packets into session-aware contexts. This enables TSP series appliances to identify and control the use of restricted commands and unauthorized use of applications and content. Once the entire message has been assembled, TSP inspects the data stream at all seven layers of the Open System Interconnection networking model.


Related Articles

  • Securing your system.  // Australian PC User;Jan2008, Vol. 20 Issue 1, p66 

    The article offers a practical guide to keeping one's computer system safe. A firewall is the traffic cop on one's network. It decides what data makes it through and what does not. Modern firewalls can block specific ports and they can block specific applications. Port blocking is rather more...

  • Spyware is a virus. Arquette, Brett // eWeek;11/1/2004, Vol. 21 Issue 44, p39 

    This article presents information on software parasites. Software parasites have become a big problem that the $200,000 worth of firewall, anti-virus, Web content and anti-spam tools can't protect. Spyware is a virus. Spyware loads without the user's permission, it runs invasive processes and it...

  • Hands-Free Host Protection. Dineley, Doug; Garza, Victor R. // InfoWorld;12/6/2004, Vol. 26 Issue 49, p16 

    Evaluates the SecureCore "memory firewall" from Determina. Key features of the device that promises a no-fuss approach to thwarting the most dangerous types of computer virus attacks; Key features; Cost.

  • Network Firewall Basics--Part 1. Kabachinski, Jeff // Biomedical Instrumentation & Technology;Sep/Oct2004, Vol. 38 Issue 5, p375 

    Provides information on computer network firewalls. Computer-related problems prevented through network firewalls; Definition of firewall; Application of the open systems interconnection to determine firewall depth; Types of firewalls. INSETS: Firewall Tips;Acronyms & Glossary.

  • Editor's Note. Depperschmidt, Nick // Remote Site & Equipment Management;Oct/Nov2009, Vol. 9 Issue 6, p3 

    The article discusses various reports published within the issue, including one on how the smart grid is being enabled through cutting edge electrical load management, another on overpressure protection through wireless communications and data driven device management, and an article on...

  • Safety and Security on the Internet.  // World Almanac & Book of Facts;2004, p714 

    Discusses safety and security on the Internet. Basic security rules, such as using caution when giving out personal information; Computer viruses; Importance of installing antivirus software on computers; How protective firewall software guards against hacker attacks; Browsers which allow the...

  • Untitled. Winder, Davey // MicroScope;3/31/2008, p8 

    The article explores issues surrounding the computer security industry. Margins on traditional security products such as anti-virus and firewalls are being pushed lower and they have become a commodity item which internal technology departments are comfortable managing. There is an upturn in...

  • Protecting Your Craft Business--Antivirus Programs. Jones, Petra // Crafts Report;Jun2008, Vol. 34 Issue 386, p62 

    The article offers tips for protecting craft business from virus, worm or trojan horse. It advises to use antivirus software, regular scanning of computers and to use separate memory to store important data. It suggests to scan all attachments before opening them and to delete all e-mails with...

  • Some Further Theoretical Results about Computer Viruses. ZHIHONG ZUO; MINGTIAN ZHOU // Computer Journal;2004, Vol. 47 Issue 6, p627 

    In this paper we give some general definitions of computer viruses which comply with our common understanding of computer viruses. Based on these definitions, we prove theoretically that there may exist some special kinds of computer viruses that have not been found in the real world yet....


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics